Managing Privacy in the Internet of Things: DocCloud, a Use Case

  • Juan Vera del CampoEmail author
  • Josep Pegueroles
  • Juan Hernández Serrano
  • Miguel Soriano
Part of the Studies in Computational Intelligence book series (SCI, volume 567)


In this chapter, we describe nodes in the Internet of Things can configure themselves automatically and offer personalized services to the users while protecting their privacy. We will show how privacy protection can be achieved by means of a use case. We describe DocCloud, a recommender system where users get content recommended by other users based on their personal affinities. To do this, their things connect together based on the affinities of their owners, creating a social network of similar things, and then provide the recommender system on top of this network. We present the architecture of DocCloud and analyze the security mechanisms that the system includes. Specifically, we study the properties of plausible deniability and anonymity of the recommenders and intermediate nodes. In this way, nodes can recommend products to the customers while deny any knowledge about the product they are recommending or their participation in the recommendation process.


  1. 1.
    Vera-del-Campo, J., Hernández-Serrano, J., Pegueroles, J., Soriano, M.: Design of a p2p content recommendation system using affinity networks. Comput. Commun. 36(1), 90–104 (2012)CrossRefGoogle Scholar
  2. 2.
    Euster, P., Guerraoui, R., Kermarrec, A.M., Maussoulie, L.: From epidemics to distributed computing. IEEE Comput. 37(5), 60–67 (2004)CrossRefGoogle Scholar
  3. 3.
    Schifanella, R., Panisson, A., Gena, C., Ruffo, G.: Mobhinter: epidemic collaborative filtering and self-organization in mobile ad-hoc networks. In: ACM Conference on Recommender Systems pp. 27–34. ACM, New York (2008)Google Scholar
  4. 4.
    Hernández-Serrano, J., Vera-del-Campo, J., Pegueroles, J., Gañán, C.: Low-cost group rekeying for unattended wireless sensor networks. Wireless Netw. 19(2), 1–21 (2012)Google Scholar
  5. 5.
    Pouwelse, J., Yang, J., Meulpolder, M., Epema, D., Sips, H.: Buddycast: An operational peer-to-peer epidemoc protocol stack. In: 14th Annual Conference of the Advanced School for Computing and Imaging (2008)Google Scholar
  6. 6.
    Anglade, A., Tiemann, M., Vignoli, F.: Complex-network theoretic clustering for identifying groups of similar listeners in p2p systems. In: RecSys ’07: Proceedings of the ACM Conference on Recommender Systems pp. 41–48. ACM, New York (2007)Google Scholar
  7. 7.
    Vera-del-Campo, J., Hernández-Serrano, J., Pegueroles, J.: Profile-based searches on p2p social networks. In: The Ninth International Conference on Networks, ICN. (2010)Google Scholar
  8. 8.
    Gentry, C., Ramzan, Z.: Single-database private information retrieval with constant communication rate. In: Automata, Languages and Programming. Lecture Notes in Computer Science, vol. 3580/2005, pp. 803–815. Springer, Berlin Heidelberg (2005)Google Scholar
  9. 9.
    Vera-del-Campo, J., Hernández-Serrano, J., Pegueroles, J.: Scfs: Design and implementation of a secure distributed filesystem. SECRYPT. (2008)Google Scholar
  10. 10.
    Manning, C.D., Raghadan, P., Schütze, H.: An Introduction to Information Retrieval. Cambridge University Press, Cambridge (2009)Google Scholar
  11. 11.
    Achlioptas, D.: Database-friendly random projections: Johnson-lindenstrauss with binary coins. J. Comput. Syst. Sci. 66(4), 671–687 (2003)Google Scholar
  12. 12.
    Liu, K., Kargupta, H., Ryan, J.: Random projection-based multiplicative data perturbation for privacy preserving distributed data mining. IEEE Trans. Knowl. Data Eng. 18(1), 92–106 (2006) (Senior Member-Kargupta, Hillol)Google Scholar
  13. 13.
    Vera-del-Campo, J., Hernández-Serrano, J., Pegueroles, J., Soriano, M.: Doccloud: a document recommender system on cloud computing with plausible deniability. Inform. Sci. 258, 387–402 (2014)CrossRefGoogle Scholar
  14. 14.
    del Campo, J.V.: In: Semantic overlay networks for P2P systems. Ph.D. Dissertation, Universitat Politecnica de Catalunya (2012)Google Scholar
  15. 15.
    Jaynes, E.T.: Probability Theory: The Logic of Science: Principles and Elementary Applications. Cambridge University Press, Cambridge (2003)Google Scholar
  16. 16.
    Ostrovsky, R., Skeith, I.W.E.: A survey of single-database private information retrieval: techniques and applications. In: Proceedings of the 10th International Conference on Practice and Theory in Public-Key Cryptography PKC’07, pp. 393–411. Springer-Verlag, Berlin, Heidelberg (2007)Google Scholar
  17. 17.
    Vera-del Campo, J., González-Muro, A., Soriano, M.: Private Audio Streaming for an Automated Phone Assistance System. In: Sixth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (2011)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  • Juan Vera del Campo
    • 1
    Email author
  • Josep Pegueroles
    • 1
  • Juan Hernández Serrano
    • 1
  • Miguel Soriano
    • 1
  1. 1.Universitat Politècnica de CatalunyaBarcelonaSpain

Personalised recommendations