Query Privacy in Sensing-as-a-Service Platforms
The Internet of Things (IoT) promises to revolutionize the way we interact with the physical world. Even though this paradigm is still far from being completely realized, there already exist Sensing-as-a-Service (S\(^2\)aaS) platforms that allow users to query for IoT data. While this model offers tremendous benefits, it also entails increasingly challenging privacy issues. In this paper, we concentrate on the protection of user privacy when querying sensing devices through a semi-trusted S\(^2\)aaS platform. In particular, we build on techniques inspired by proxy re-encryption and k-anonymity to tackle two intertwined problems, namely query privacy and query confidentiality. The feasibility of our solution is validated both analytically and empirically.
This paper has been partially supported by the Junta de Andalucía through the project FISICCO (P11-TIC-07223) and the Spanish Ministry of Economy and Competitiveness through the PERSIST (TIN2013-41739-R) and SMOG (TIN2016-79095-C2-1-R) projects.
- 1.Amazon Web Services: How the AWS IoT Platform Works. https://aws.amazon.com/iot/how-it-works/. Accessed Nov 2016
- 2.Milagro, A.: Apache Milagro Crypto Library. https://milagro.apache.org/
- 5.Ateniese, G., Camenisch, J., De Medeiros, B.: Untraceable RFID tags via insubvertible encryption. In: Proceedings of the 12th ACM Conference on Computer and Communications Security, pp. 92–101. ACM (2005)Google Scholar
- 7.Carbunar, B., Yang, Y., Shi, W., Pearce, M., Vasudevan, V.: Query privacy in wireless sensor networks. ACM Trans. Sen. Netw. 6(2), 14:1–14:34 (2010)Google Scholar
- 12.De Cristofaro, E., Ding, X., Tsudik, G.: Privacy-preserving querying in sensor networks. In: 18th International Conference on Computer Communications and Networks, ICCCN 2009, San Francisco, CA, 3–6 August 2009, pp. 1–6. IEEE Computer Society, Washington, DC (2009)Google Scholar
- 14.Dimitriou, T., Sabouri, A.: Privacy preservation schemes for querying wireless sensor networks. In: IEEE International Conference on Pervasive Computing and Communications Workshops, pp. 178–183 (2011)Google Scholar
- 17.Kiraz, M.S., Uzunkol, O.: Still wrong use of pairings in cryptography. Cryptology ePrint Archive, Report 2016/223 (2016). http://eprint.iacr.org/
- 18.Li, N., Li, T., Venkatasubramanian, S.: t-closeness: Privacy beyond k-anonymity and l-diversity. In: IEEE 23rd International Conference on Data Engineering, ICDE 2007, pp. 106–115, April 2007Google Scholar
- 19.Liao, X., Li, J.: Privacy-preserving and secure top-k query in two-tier wireless sensor network. In: 2012 IEEE Global Communications Conference (GLOBECOM), pp. 335–341, December 2012Google Scholar
- 23.Willard, T.: Sensors as a Service on the Internet of Things. White paper, ARM Ltd., January 2014Google Scholar
- 24.Zhang, X., Dong, L., Peng, H., Chen, H., Li, D., Li, C.: Achieving efficient and secure range query in two-tiered wireless sensor networks. In: 2014 IEEE 22nd International Symposium of Quality of Service (IWQoS), pp. 380–388, May 2014Google Scholar