skip to main content
10.1145/3434770.3459735acmconferencesArticle/Chapter ViewAbstractPublication PageseurosysConference Proceedingsconference-collections
research-article
Open access

Privacy-Preserving Crowd-Monitoring Using Bloom Filters and Homomorphic Encryption

Published: 26 April 2021 Publication History
  • Get Citation Alerts
  • Abstract

    This paper introduces an architecture for crowd-monitoring which allows statistical counting for pedestrian dynamics while considering privacy-preservation for the individuals being sensed. Monitoring crowds of pedestrians has been an interesting area of study for many years. The recent prevalence of mobile devices paved the way for wide-scale deployments of infrastructures which perform automated sensing. Suddenly, people could be discreetly monitored by leveraging radio signals such as Wi-Fi probe requests periodically sent by their devices. However, this monitoring process implies dealing with sensitive data which is prone to privacy infringement by nature. While routinely performing their tasks, parties involved in this process can try to infer private information about individuals from the data they handle. Following privacy by design principles, we envision a construction which protects the short-term storage and processing of the collected privacy-sensitive sensor readings with strong cryptographic guarantees such that only the end-result (i.e. a statistical count) becomes available in the clear. We combine Bloom filters, to facilitate set membership testing for counting, with homomorphic encryption, to allow the oblivious performance of operations under encryption. We carry out an implementation of our solution using a resource-constrained device as a sensor and perform experiments which demonstrate its feasibility in practice.

    References

    [1]
    Mehmet Adalier and Antara Teknik. 2015. Efficient and secure elliptic curve cryptography implementation of Curve P-256. In Workshop on Elliptic Curve Cryptography Standards, Vol. 66.
    [2]
    Mohammad Alaggan, Mathieu Cunche, and Sébastien Gambs. 2018. Privacy-preserving wi-fi analytics. Proceedings on Privacy Enhancing Technologies 2018, 2 (2018), 4--26.
    [3]
    Austin Appleby. 2016. MurmurHash3. (2016). https://github.com/aappleby/smhasher/wiki/MurmurHash3
    [4]
    Giuseppe Bianchi, Lorenzo Bracciale, and Pierpaolo Loreti. 2012. "Better Than Nothing" Privacy with Bloom Filters: To What Extent?. In International Conference on Privacy in Statistical Databases. Springer, 348--363.
    [5]
    Burton H Bloom. 1970. Space/time trade-offs in hash coding with allowable errors. Commun. ACM 13, 7 (1970), 422--426.
    [6]
    Bram Bonné, Arno Barzan, Peter Quax, and Wim Lamotte. 2013. WiFiPi: Involuntary tracking of visitors at mass events. In 2013 IEEE 14th International Symposium on" A World of Wireless, Mobile and Multimedia Networks"(WoWMoM). IEEE, 1--6.
    [7]
    Prosenjit Bose, Hua Guo, Evangelos Kranakis, Anil Maheshwari, Pat Morin, Jason Morrison, Michiel Smid, and Yihui Tang. 2008. On the false-positive rate of Bloom filters. Inform. Process. Lett. 108, 4 (2008), 210--213.
    [8]
    Mathieu Cunche. 2014. I know your MAC Address: Targeted tracking of individual using Wi-Fi. Journal of Computer Virology and Hacking Techniques 10, 4 (2014), 219--227.
    [9]
    Mathieu Cunche, Mohamed-Ali Kaafar, and Roksana Boreli. 2014. Linking wireless devices using information contained in Wi-Fi probe requests. Pervasive and Mobile Computing 11 (2014), 56--69.
    [10]
    Levent Demir, Mathieu Cunche, and Cédric Lauradoux. 2014. Analysing the privacy policies of Wi-Fi trackers. In Proceedings of the 2014 workshop on physical analytics. 39--44.
    [11]
    Levent Demir, Amrit Kumar, Mathieu Cunche, and Cedric Lauradoux. 2017. The pitfalls of hashing for privacy. IEEE Communications Surveys & Tutorials 20, 1 (2017), 551--565.
    [12]
    Yael Ejgenberg, Moriya Farbstein, Meital Levy, and Yehuda Lindell. 2012. SCAPI: The Secure Computation Application Programming Interface. IACR Cryptol. ePrint Arch. 2012 (2012), 629.
    [13]
    Taher ElGamal. 1985. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE transactions on information theory 31, 4 (1985), 469--472.
    [14]
    Michael Kamp, Christine Kopp, Michael Mock, Mario Boley, and Michael May. 2013. Privacy-preserving mobility monitoring using sketches of stationary sensor readings. In Joint European Conference on Machine Learning and Knowledge Discovery in Databases. Springer, 370--386.
    [15]
    Jeremy Martin, Travis Mayberry, Collin Donahue, Lucas Foppe, Lamont Brown, Chadwick Riggins, Erik C Rye, and Dane Brown. 2017. A study of MAC address randomization in mobile devices and when it fails. Proceedings on Privacy Enhancing Technologies 2017, 4 (2017), 365--383.
    [16]
    Matthias Marx, Ephraim Zimmer, Tobias Mueller, Maximilian Blochberger, and Hannes Federrath. 2018. Hashing of personally identifiable information is not sufficient. SICHERHEIT 2018 (2018).
    [17]
    ABM Musa and Jakob Eriksson. 2012. Tracking unmodified smartphones using wi-fi monitors. In Proceedings of the 10th ACM conference on embedded network sensor systems. 281--294.
    [18]
    Ronald L Rivest, Len Adleman, Michael L Dertouzos, et al. 1978. On data banks and privacy homomorphisms. Foundations of secure computation 4, 11 (1978), 169--180.
    [19]
    Florin Rusu and Alin Dobra. 2007. Statistical analysis of sketch estimators. In Proceedings of the 2007 ACM SIGMOD international conference on Management of data. 187--198.
    [20]
    Lorenz Schauer, Martin Werner, and Philipp Marcus. 2014. Estimating crowd densities and pedestrian flows using wi-fi and bluetooth. In Proceedings of the 11th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services. 171--177.
    [21]
    Mathy Vanhoef, Célestin Matte, Mathieu Cunche, Leonardo S Cardoso, and Frank Piessens. 2016. Why MAC address randomization is not enough: An analysis of Wi-Fi network discovery mechanisms. In Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security. 413--424.

    Cited By

    View all
    • (2022)Anonymized Counting of Nonstationary Wi-Fi Devices When Monitoring CrowdsProceedings of the 25th International ACM Conference on Modeling Analysis and Simulation of Wireless and Mobile Systems10.1145/3551659.3559042(213-222)Online publication date: 24-Oct-2022
    • (2022)Towards Trustworthy Edge Intelligence: Insights from Voice-Activated Services2022 IEEE International Conference on Services Computing (SCC)10.1109/SCC55611.2022.00043(239-248)Online publication date: Jul-2022
    • (2022)Challenges in Automated Measurement of Pedestrian DynamicsDistributed Applications and Interoperable Systems10.1007/978-3-031-16092-9_12(187-199)Online publication date: 13-Jun-2022

    Index Terms

    1. Privacy-Preserving Crowd-Monitoring Using Bloom Filters and Homomorphic Encryption

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image ACM Conferences
        EdgeSys '21: Proceedings of the 4th International Workshop on Edge Systems, Analytics and Networking
        April 2021
        84 pages
        ISBN:9781450382915
        DOI:10.1145/3434770
        This work is licensed under a Creative Commons Attribution International 4.0 License.

        Sponsors

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 26 April 2021

        Permissions

        Request permissions for this article.

        Check for updates

        Author Tags

        1. Bloom filters
        2. crowd-monitoring
        3. homomorphic encryption
        4. pedestrian dynamics
        5. privacy-preservation
        6. statistical counting

        Qualifiers

        • Research-article
        • Research
        • Refereed limited

        Conference

        EuroSys '21
        Sponsor:

        Acceptance Rates

        Overall Acceptance Rate 10 of 23 submissions, 43%

        Upcoming Conference

        EuroSys '25
        Twentieth European Conference on Computer Systems
        March 30 - April 3, 2025
        Rotterdam , Netherlands

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)209
        • Downloads (Last 6 weeks)34

        Other Metrics

        Citations

        Cited By

        View all
        • (2022)Anonymized Counting of Nonstationary Wi-Fi Devices When Monitoring CrowdsProceedings of the 25th International ACM Conference on Modeling Analysis and Simulation of Wireless and Mobile Systems10.1145/3551659.3559042(213-222)Online publication date: 24-Oct-2022
        • (2022)Towards Trustworthy Edge Intelligence: Insights from Voice-Activated Services2022 IEEE International Conference on Services Computing (SCC)10.1109/SCC55611.2022.00043(239-248)Online publication date: Jul-2022
        • (2022)Challenges in Automated Measurement of Pedestrian DynamicsDistributed Applications and Interoperable Systems10.1007/978-3-031-16092-9_12(187-199)Online publication date: 13-Jun-2022

        View Options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Get Access

        Login options

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media