Abstract
Internet-enabled television systems, often referred to as Smart TVs, are a new development in television and home entertainment technologies. In this work, we propose a new, privacy-preserving, approach for Television Audience Measurement (TAM), utilizing the capabilities of the Smart TV technologies. We propose a novel application to calculate aggregate audience measurements using Smart TV computation capabilities and permanent Internet access. Cryptographic techniques, including homomorphic encryption and zero-knowledge proofs, are used to ensure both that the privacy of the participating individuals is preserved and that the computed results are valid. Additionally, participants can be compensated for sharing their information. Preliminary experimental results on an Android-based Smart TV platform show the viability of the approach.
Chapter PDF
References
Acquisti, A.: Privacy and security of personal information: Technological solutions and economic incentives. In: Camp, J., Lewis, R. (eds.) The Economics of Information Security, pp. 165–178. Kluwer (2004)
Acquisti, A., Gritzalis, S., Lambrinoudakis, C., De Capitani di Vimercati, S.: Digital privacy. Auerbach Publications. Taylor & Francis Group (2008)
Adar, E., Huberman, B.: A market for secrets. First Monday 6(8) (2001)
Baudron, O., Fouque, P.A., Pointcheval, D., Stern, J., Poupard, G.: Practical multi-candidate election system. In: PODC 2001, pp. 274–283. ACM, New York (2001)
Ciriani, V., Capitani di Vimercati, S., Foresti, S., Samarati, P.: κ-anonymity. In: Secure Data Management in Decentralized Systems. Advances in Information Security, vol. 33, pp. 323–353. Springer, Heidelberg (2007)
Damgård, I., Jurik, M.: A Generalisation, a Simplification and Some Applications of Paillier’s Probabilistic Public-Key System. In: Kim, K.-C. (ed.) PKC 2001. LNCS, vol. 1992, pp. 119–136. Springer, Heidelberg (2001)
Eastlake, D.: Publicly Verifiable Nominations Committee (NomCom) Random Selection. RFC 3797 (Informational) (June 2004)
Goldreich, O.: The Foundations of Cryptography, vol. 2. Cambridge University Press (2004)
Karlof, C., Sastry, N., Wagner, D.: Cryptographic voting protocols: a systems perspective. In: 14th USENIX Security Symposium, pp. 33–50 (2005)
Kissner, L., Song, D.: Privacy-Preserving Set Operations. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 241–257. Springer, Heidelberg (2005)
Kleinberg, J., Papadimitriou, C.H., Raghavan, P.: On the value of private information. In: TARK 2001, pp. 249–257. Morgan Kaufmann Publishers Inc. (2001)
Kremer, S., Ryan, M., Smyth, B.: Election Verifiability in Electronic Voting Protocols. In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. LNCS, vol. 6345, pp. 389–404. Springer, Heidelberg (2010)
Nishide, T., Sakurai, K.: Distributed Paillier Cryptosystem without Trusted Dealer. In: Chung, Y., Yung, M. (eds.) WISA 2010. LNCS, vol. 6513, pp. 44–60. Springer, Heidelberg (2011)
Paillier, P.: Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223–238. Springer, Heidelberg (1999)
Pieprzyk, J., Hardjono, T., Seberry, J.: Fundamentals of computer security. Monographs in theoretical computer science, ch. 15. Springer (2003)
Rivest, R.L., Shamir, A.: PayWord and MicroMint: two simple micropayment schemes. In: CryptoBytes, vol. 2, pp. 69–87 (1996)
Shi, J., Zhang, R., Liu, Y., Zhang, Y.: PriSense: Privacy-preserving data aggregation in people-centric urban sensing systems. In: IEEE INFOCOM 2010, pp. 1–9. IEEE (March 2010)
Tasidou, A., Efraimidis, P.S., Katos, V.: Economics of personal data management: Fair personal information trades. In: Next Generation Society. Technological and Legal Issues. LNICST, vol. 26, pp. 151–160. Springer, Heidelberg (2010)
US Government: The cable tv privacy act of 1984. In: 47 USC, Chapter 5, Subchapter V-A, Part IV, Sec. 551. U.S. Gov. Printing Office, Washington, DC (1984)
US Government: Video privacy protection act. In: 18 USC, Part I, Chapter 121, Sec. 2710, Pub.L. 100-618. U.S. Gov. Printing Office, Washington, DC (1988)
UTD Data Security and Privacy Lab: Paillier threshold encryption toolbox (November 2011), http://www.utdallas.edu/~mxk093120/cgi-bin/paillier/
Varian, H.: Economic aspects of personal privacy. In: Privacy and Self-regulation in the Information Age. NTIA, Washington, DC (1997)
Yao, A.C.C.: Protocols for secure computations (extended abstract). In: FOCS 1982, pp. 160–164. IEEE, Los Alamitos (1982)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 IFIP International Federation for Information Processing
About this paper
Cite this paper
Drosatos, G., Tasidou, A., Efraimidis, P.S. (2012). Privacy-Preserving Television Audience Measurement Using Smart TVs. In: Gritzalis, D., Furnell, S., Theoharidou, M. (eds) Information Security and Privacy Research. SEC 2012. IFIP Advances in Information and Communication Technology, vol 376. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-30436-1_19
Download citation
DOI: https://doi.org/10.1007/978-3-642-30436-1_19
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-30435-4
Online ISBN: 978-3-642-30436-1
eBook Packages: Computer ScienceComputer Science (R0)