SlideShare ist ein Scribd-Unternehmen logo
1 von 23
Downloaden Sie, um offline zu lesen
Privacy-Respecting Auctions in Mobile Crowd Sensing
Tassos Dimitriou & Ioannis Krontiris
1
Privacy-Respecting Auctions as
Incentive Mechanisms in Mobile
Crowd Sensing
Tassos Dimitriou and Ioannis Krontiris
9th WISTP International Conference on Information
Security Theory and Practice (WISTP'2015).
August 24 - 25, 2015
Heraklion, Crete, Greece
Privacy-Respecting Auctions in Mobile Crowd Sensing
Tassos Dimitriou & Ioannis Krontiris
2
Outline
Motivation
Auction mechanism for mobile sensing
Security and privacy requirements
Privacy-respecting auction and Rewarding mechanism
Privacy-Respecting Auctions in Mobile Crowd Sensing
Tassos Dimitriou & Ioannis Krontiris
3
Picture from: D. Christin, A. Reinhardt, S.S. Kanhere, M. Hollick, A Survey on Privacy in Mobile Participatory Sensing Applications,
Journal of Systems & Software 2011.
Mobile Sensing - Old Style
Participants proactively sending data.
How to motivate contribution and better quality of data? Protect privacy?
Privacy-Respecting Auctions in Mobile Crowd Sensing
Tassos Dimitriou & Ioannis Krontiris
4
Information Discovery
Here data consumers are interested in retrieving information
according to some requirements from multiple data
contributors that satisfy these requirements.
Define:
Specific geographic area
Sensor types, time frame
Quality criteria
Post task on public domain
Download task and respond
Privacy-Respecting Auctions in Mobile Crowd Sensing
Tassos Dimitriou & Ioannis Krontiris
5
Incentives to participation
Why would mobile users contribute data?
Need incentives: monetary, social, gaming
Micro-payments work! But how much is enough?
Depends on personal preferences, perceived cost of
participation, context
It should be the data provider to set the price!
Apply reverse-auctions: n users with lowest prices win the
auction and contribute data
Privacy-Respecting Auctions in Mobile Crowd Sensing
Tassos Dimitriou & Ioannis Krontiris
6
Multi-attributive auctions
Most suitable kind: multi-attributive auctions
Allow integration of quality attributes into the auction bidding,
besides the price.
Privacy-Respecting Auctions in Mobile Crowd Sensing
Tassos Dimitriou & Ioannis Krontiris
7
Privacy concerns
The widespread deployment of mobile sensors
introduces serious privacy risks since the
frequent collection of personal data may reveal
considerable information about location, personal
preferences, social relationships, etc...
Imperative to address privacy in mobile crowd-
sensing systems
It still remains an open problem on how to provide privacy protection
when incentive mechanisms are also incorporated in the system.
Privacy-Respecting Auctions in Mobile Crowd Sensing
Tassos Dimitriou & Ioannis Krontiris
8
Our contribution
Incentives + Privacy
A privacy-respecting protocol that allows anonymous users to
participate in reverse auctions employed by an MCS system.
Two main parts.
Provide bidders’ anonymity for the auction
Reward users and enable winners of the auction to claim their
rewards without being linked to their contributed data.
Privacy-Respecting Auctions in Mobile Crowd Sensing
Tassos Dimitriou & Ioannis Krontiris
9
Model
Service Providers:
• requesters of sensing data
• have fixed budget
Users: owners of mobile devices with sensors
Auction Infrastructure:
• Task Server - publishing the sensing tasks,
• Auction Server - running the auction process
• Report Server - collects the reports from the auction
winners and forwards them to the Service Provider.
Privacy-Respecting Auctions in Mobile Crowd Sensing
Tassos Dimitriou & Ioannis Krontiris
10
A generic auction mechanism
Bid = Utility Score Si
computed based also on quality factors 

(e.g. distance from the desired location, the location accuracy, the sampling frequency, …)
Privacy-Respecting Auctions in Mobile Crowd Sensing
Tassos Dimitriou & Ioannis Krontiris
11
Security and Privacy Requirements
Correctness and Fairness: Winners get reward. No bidder can obtain
an unfair advantage based on information revealed about other bids
Bidders’ privacy: Bidders remain anonymous throughout the whole
process of the auction -> Unlinkability between (a) identity of bidders
and their bids, (b) two bids from the same bidder
Confidentiality of bids: All bids remain secret until the opening phase.
Applies for all parties including Auction Server.
Public verifiability: The correctness of the auction process should be
easy to verify by any interested party.
Non-repudiation: No bidder should be able to change its mind (e.g.
deny or modify its bid) once the bid is submitted.
Privacy-Respecting Auctions in Mobile Crowd Sensing
Tassos Dimitriou & Ioannis Krontiris
12
Auction protocol
Two main phases Bidding and Opening. However, there exists
an implicit setup phase: Registration
During registration,
• Auction Server (AS) sets up the bulletin
board, publishes its public key and announces
parameters of the auction
− Auction ID, starting/ending time, duration of
each phase, and so on.
• Each bidder i creates a pseudonymous ID
(BidderID) to represent its identity during the
auction along with a one-time public key Ki.
• AS publishes this information to the bulletin
board
Privacy-Respecting Auctions in Mobile Crowd Sensing
Tassos Dimitriou & Ioannis Krontiris
13
Auction protocol - Bidding
During the bidding phase, each bidder i
• computes its utility score Si,
• masks it with a random number ri and
• sends a commitment Ci of for the bid, where 

hi = H(Si || ri).
Note: Auction server receives a bid, however it cannot read this
bid before the opening phase. Commitments are published in
the bulletin board so that anybody can verify that its bid has
been correctly accounted for.
Privacy-Respecting Auctions in Mobile Crowd Sensing
Tassos Dimitriou & Ioannis Krontiris
14
Auction protocol - Opening
When bidding phase is over, each bidder reveals utility
score Si
and ri
that have been used in computing Ci
.
Auction server announces n highest utility scores as the
winners of the auction
Note: Any participant can verify correctness by computing 

H(Si || ri) and comparing with the commitment Ci received
during the bidding phase.
Privacy-Respecting Auctions in Mobile Crowd Sensing
Tassos Dimitriou & Ioannis Krontiris
15
Incentives for participation - Rewarding
The previous protocol can be extended to support
a privacy-preserving credit reward mechanism for
users submitting data reports.
• This can be achieved using a 

(i) a central bank system, or 

(ii) a decentralized digital payment system
(method developed here).
(i) While the e-cash scheme (not shown here) may
be easier conceptually, it suffers from a potential loss
of privacy if the report server and the Bank collude
together to reveal the bidder’s identity.
Privacy-Respecting Auctions in Mobile Crowd Sensing
Tassos Dimitriou & Ioannis Krontiris
16
Anonymous reward tokens
To eliminate the need for a centralized payment service, we
can use the Report Server as an issuer of reward tokens that
can be redeemed by the bidder.
The token
• Corresponds to an amount commensurate to the data
provided by the user.
• It reveals no information about the underlying user.
• The recipient (RS) has first to verify their validity
and then verify whether the tokens have been spent
before.
This approach can still be thought as a lightweight
e-cash scheme, yet without the requirement of a
trusted payment service
Privacy-Respecting Auctions in Mobile Crowd Sensing
Tassos Dimitriou & Ioannis Krontiris
17
Token generation
Winning Bidder Bi Report Server RS
Privacy-Respecting Auctions in Mobile Crowd Sensing
Tassos Dimitriou & Ioannis Krontiris
18
Token spending
Winning Bidder Bi Report Server RS
Submission of tokens
(User must prove knowledge of secret values r and s used in the creation of token T)
Set h = H(Token, date/time)
Set y = r + hs mod q.
Token T, y
Verify signature. Is T a valid token?
Verify token has not been used before
by searching database of used tokens.
Note: The protocol ensures that i) tokens are not tied to bidder identities, and
ii) the RS is protected by malicious bidders who try to double-spend tokens.
Privacy-Respecting Auctions in Mobile Crowd Sensing
Tassos Dimitriou & Ioannis Krontiris
19
Security Analysis (1)
Confidentiality of bids. Since bids are opened only after the bidding
phase, nobody can compute the bids before they are opened. Recall
commitment H(Si || ri).
Correctness & Verifiability. All values are published in the bulletin
board.
• Anybody can verify correctness of the auction as all bidders reveal their
utility scores Si and the random numbers ri used in signed commitment.
Unlinkability between bids. Not possible to relate two bids submitted
at different auctions by the same bidder.
• Bidders participate in auctions using different pseudonyms and public
keys.
• Important to use an anonymity service so that bid submissions cannot be
linked to an internet identifier such as the IP address of the bidder.
Privacy-Respecting Auctions in Mobile Crowd Sensing
Tassos Dimitriou & Ioannis Krontiris
20
Security Analysis (2)
Unforgeability/Unreusability of tokens. The zero knowledge
proofs used during token spending ensure that only a bidder
who knows the representation of u and v in the token ID can
supply these proofs.
Bidder privacy/Unlinkability of tokens. When a user tries to
redeem a token and provides the server (directly or indirectly
through a proxy) the zero knowledge proof, the server cannot
tell which bidder created the token as the only visible part
during the token construction is the public part Val, Exp of the
token
Privacy-Respecting Auctions in Mobile Crowd Sensing
Tassos Dimitriou & Ioannis Krontiris
21
Token indistinguishability experiment
Privacy-Respecting Auctions in Mobile Crowd Sensing
Tassos Dimitriou & Ioannis Krontiris
22
Conclusions
Users of mobile devices can participate anonymously in the
auctions and define the price they expect for contributing
sensing data.
Τhe buyer of the data can select the winners based not only
on the price, but also on the quality of the offered data.
The winners of the auction can then collect their price without
linking their real identity to the data they contributed.
Our solution uses a lightweight rewarding scheme eliminating
the need for a single trusted payment system.
Future work: integrate anonymous reputation mechanism
Privacy-Respecting Auctions in Mobile Crowd Sensing
Tassos Dimitriou & Ioannis Krontiris
23

Weitere ähnliche Inhalte

Was ist angesagt?

Using big data and open source for smart city planning
Using big data and open source for smart city planningUsing big data and open source for smart city planning
Using big data and open source for smart city planningGuy Hadash
 
SmarterBham Kickoff and Overview
SmarterBham Kickoff and OverviewSmarterBham Kickoff and Overview
SmarterBham Kickoff and OverviewNathan McMinn
 
FIWARE - Driving the standards and helping cities to become enablers of the D...
FIWARE - Driving the standards and helping cities to become enablers of the D...FIWARE - Driving the standards and helping cities to become enablers of the D...
FIWARE - Driving the standards and helping cities to become enablers of the D...Juanjo Hierro
 
FIWARE Overview presentation
FIWARE Overview presentationFIWARE Overview presentation
FIWARE Overview presentationJuanjo Hierro
 
FIWARE - Can connected objects dream with Smart Cities, Smart places?
FIWARE - Can connected objects dream with Smart Cities, Smart places?FIWARE - Can connected objects dream with Smart Cities, Smart places?
FIWARE - Can connected objects dream with Smart Cities, Smart places?Juanjo Hierro
 
IoT Standards for Smart Nation
IoT Standards for Smart NationIoT Standards for Smart Nation
IoT Standards for Smart NationCK Toh
 
FIWARE Global Summit - The Role of Open Platforms in Digital Transformation o...
FIWARE Global Summit - The Role of Open Platforms in Digital Transformation o...FIWARE Global Summit - The Role of Open Platforms in Digital Transformation o...
FIWARE Global Summit - The Role of Open Platforms in Digital Transformation o...FIWARE
 
Internet of Things Environment for Service Creation and Testing (IoT.est)
Internet of Things Environment for Service Creation and Testing (IoT.est)Internet of Things Environment for Service Creation and Testing (IoT.est)
Internet of Things Environment for Service Creation and Testing (IoT.est)iotest
 
What type of (smart) city do we want to live in?
What type of (smart) city do we want to live in?What type of (smart) city do we want to live in?
What type of (smart) city do we want to live in?Peter Bihr
 
Creating The World’s First
Creating The World’s First Creating The World’s First
Creating The World’s First Bristol Is Open
 
Knowage & FIWARE: the new ecosystem for Smart Applications, Alessandro Portos...
Knowage & FIWARE: the new ecosystem for Smart Applications, Alessandro Portos...Knowage & FIWARE: the new ecosystem for Smart Applications, Alessandro Portos...
Knowage & FIWARE: the new ecosystem for Smart Applications, Alessandro Portos...OW2
 
Interplay of Big Data and IoT - StampedeCon 2016
Interplay of Big Data and IoT - StampedeCon 2016Interplay of Big Data and IoT - StampedeCon 2016
Interplay of Big Data and IoT - StampedeCon 2016StampedeCon
 
FIWARE Tech Summit - Smart Cities – SmartSDK
FIWARE Tech Summit - Smart Cities – SmartSDKFIWARE Tech Summit - Smart Cities – SmartSDK
FIWARE Tech Summit - Smart Cities – SmartSDKFIWARE
 
ETSI IoT keynote (2016)
ETSI IoT keynote (2016)ETSI IoT keynote (2016)
ETSI IoT keynote (2016)Marc Jadoul
 
FIWARE Tech Summit - How to Enable Industrial Data Platforms: Regulations, In...
FIWARE Tech Summit - How to Enable Industrial Data Platforms: Regulations, In...FIWARE Tech Summit - How to Enable Industrial Data Platforms: Regulations, In...
FIWARE Tech Summit - How to Enable Industrial Data Platforms: Regulations, In...FIWARE
 
Cosimo Accoto - Auditing Innovation - 30 6-2011 - A+ Conference
Cosimo Accoto - Auditing Innovation - 30 6-2011 - A+ ConferenceCosimo Accoto - Auditing Innovation - 30 6-2011 - A+ Conference
Cosimo Accoto - Auditing Innovation - 30 6-2011 - A+ ConferenceA+
 
Bristol is Open Introduction
Bristol is Open IntroductionBristol is Open Introduction
Bristol is Open IntroductionBristol Is Open
 
FIWARE Global Summit - The Smart City Program in Japan: Cities as Enablers of...
FIWARE Global Summit - The Smart City Program in Japan: Cities as Enablers of...FIWARE Global Summit - The Smart City Program in Japan: Cities as Enablers of...
FIWARE Global Summit - The Smart City Program in Japan: Cities as Enablers of...FIWARE
 

Was ist angesagt? (20)

Using big data and open source for smart city planning
Using big data and open source for smart city planningUsing big data and open source for smart city planning
Using big data and open source for smart city planning
 
SmarterBham Kickoff and Overview
SmarterBham Kickoff and OverviewSmarterBham Kickoff and Overview
SmarterBham Kickoff and Overview
 
FIWARE - Driving the standards and helping cities to become enablers of the D...
FIWARE - Driving the standards and helping cities to become enablers of the D...FIWARE - Driving the standards and helping cities to become enablers of the D...
FIWARE - Driving the standards and helping cities to become enablers of the D...
 
FIWARE Overview presentation
FIWARE Overview presentationFIWARE Overview presentation
FIWARE Overview presentation
 
FIWARE - Can connected objects dream with Smart Cities, Smart places?
FIWARE - Can connected objects dream with Smart Cities, Smart places?FIWARE - Can connected objects dream with Smart Cities, Smart places?
FIWARE - Can connected objects dream with Smart Cities, Smart places?
 
IoT Standards for Smart Nation
IoT Standards for Smart NationIoT Standards for Smart Nation
IoT Standards for Smart Nation
 
FIWARE Global Summit - The Role of Open Platforms in Digital Transformation o...
FIWARE Global Summit - The Role of Open Platforms in Digital Transformation o...FIWARE Global Summit - The Role of Open Platforms in Digital Transformation o...
FIWARE Global Summit - The Role of Open Platforms in Digital Transformation o...
 
Internet of Things Environment for Service Creation and Testing (IoT.est)
Internet of Things Environment for Service Creation and Testing (IoT.est)Internet of Things Environment for Service Creation and Testing (IoT.est)
Internet of Things Environment for Service Creation and Testing (IoT.est)
 
What type of (smart) city do we want to live in?
What type of (smart) city do we want to live in?What type of (smart) city do we want to live in?
What type of (smart) city do we want to live in?
 
Creating The World’s First
Creating The World’s First Creating The World’s First
Creating The World’s First
 
Knowage & FIWARE: the new ecosystem for Smart Applications, Alessandro Portos...
Knowage & FIWARE: the new ecosystem for Smart Applications, Alessandro Portos...Knowage & FIWARE: the new ecosystem for Smart Applications, Alessandro Portos...
Knowage & FIWARE: the new ecosystem for Smart Applications, Alessandro Portos...
 
Interplay of Big Data and IoT - StampedeCon 2016
Interplay of Big Data and IoT - StampedeCon 2016Interplay of Big Data and IoT - StampedeCon 2016
Interplay of Big Data and IoT - StampedeCon 2016
 
Meetup 25/04/19: Big Data
Meetup 25/04/19: Big Data Meetup 25/04/19: Big Data
Meetup 25/04/19: Big Data
 
FIWARE Tech Summit - Smart Cities – SmartSDK
FIWARE Tech Summit - Smart Cities – SmartSDKFIWARE Tech Summit - Smart Cities – SmartSDK
FIWARE Tech Summit - Smart Cities – SmartSDK
 
ETSI IoT keynote (2016)
ETSI IoT keynote (2016)ETSI IoT keynote (2016)
ETSI IoT keynote (2016)
 
FIWARE Tech Summit - How to Enable Industrial Data Platforms: Regulations, In...
FIWARE Tech Summit - How to Enable Industrial Data Platforms: Regulations, In...FIWARE Tech Summit - How to Enable Industrial Data Platforms: Regulations, In...
FIWARE Tech Summit - How to Enable Industrial Data Platforms: Regulations, In...
 
Cosimo Accoto - Auditing Innovation - 30 6-2011 - A+ Conference
Cosimo Accoto - Auditing Innovation - 30 6-2011 - A+ ConferenceCosimo Accoto - Auditing Innovation - 30 6-2011 - A+ Conference
Cosimo Accoto - Auditing Innovation - 30 6-2011 - A+ Conference
 
Bristol is Open Introduction
Bristol is Open IntroductionBristol is Open Introduction
Bristol is Open Introduction
 
IoT soup!
IoT soup!IoT soup!
IoT soup!
 
FIWARE Global Summit - The Smart City Program in Japan: Cities as Enablers of...
FIWARE Global Summit - The Smart City Program in Japan: Cities as Enablers of...FIWARE Global Summit - The Smart City Program in Japan: Cities as Enablers of...
FIWARE Global Summit - The Smart City Program in Japan: Cities as Enablers of...
 

Andere mochten auch

The Concept of Sensing as a Service Using Mobile Crowdsensing
The Concept of Sensing as a Service Using Mobile CrowdsensingThe Concept of Sensing as a Service Using Mobile Crowdsensing
The Concept of Sensing as a Service Using Mobile CrowdsensingDr. Mazlan Abbas
 
Crowd sensing, mobiles and feedback
Crowd sensing, mobiles and feedbackCrowd sensing, mobiles and feedback
Crowd sensing, mobiles and feedbackChristian Glahn
 
On Internet of Things programming models
On Internet of Things programming modelsOn Internet of Things programming models
On Internet of Things programming modelsColdbeans Software
 
Mobile Crowdsensing with Mobile Agents
Mobile Crowdsensing with Mobile AgentsMobile Crowdsensing with Mobile Agents
Mobile Crowdsensing with Mobile AgentsTeemu Leppänen
 
Master in Big Data Analytics and Social Mining 20015
Master in Big Data Analytics and Social Mining 20015Master in Big Data Analytics and Social Mining 20015
Master in Big Data Analytics and Social Mining 20015Andrea Gigli
 
Infusing social innovation in FI for Manufacturing-FIA Athens
Infusing social innovation in FI for Manufacturing-FIA AthensInfusing social innovation in FI for Manufacturing-FIA Athens
Infusing social innovation in FI for Manufacturing-FIA AthensFITMAN FI
 
Fiware Platform
Fiware PlatformFiware Platform
Fiware PlatformHerbertt
 
2016.07.05 Talk @Ciência 2016, Lisbon
2016.07.05 Talk @Ciência 2016, Lisbon2016.07.05 Talk @Ciência 2016, Lisbon
2016.07.05 Talk @Ciência 2016, LisbonAna Aguiar
 
The Night is Young: Urban Crowdsourcing of Nightlife Patterns
The Night is Young: Urban Crowdsourcing of Nightlife PatternsThe Night is Young: Urban Crowdsourcing of Nightlife Patterns
The Night is Young: Urban Crowdsourcing of Nightlife PatternsDarshan Santani
 
Internet of Things - Preparing Yourself for a Smart Nation
Internet of Things - Preparing Yourself for a Smart NationInternet of Things - Preparing Yourself for a Smart Nation
Internet of Things - Preparing Yourself for a Smart NationDr. Mazlan Abbas
 
Crowdsourcing - an overview
Crowdsourcing - an overviewCrowdsourcing - an overview
Crowdsourcing - an overviewMirko Presser
 
The Connected World - A Future of Possibilities
The Connected World - A Future of Possibilities The Connected World - A Future of Possibilities
The Connected World - A Future of Possibilities Dr. Mazlan Abbas
 
Building Smart Cities with Smart Citizens
Building Smart Cities with Smart CitizensBuilding Smart Cities with Smart Citizens
Building Smart Cities with Smart CitizensDr. Mazlan Abbas
 
Sensing as-a-Service - The New Internet of Things (IOT) Business Model
Sensing as-a-Service - The New Internet of Things (IOT) Business ModelSensing as-a-Service - The New Internet of Things (IOT) Business Model
Sensing as-a-Service - The New Internet of Things (IOT) Business ModelDr. Mazlan Abbas
 
REDtone IOT Smart City Solutions - CitiAct and CitiSense
REDtone IOT Smart City Solutions - CitiAct and CitiSenseREDtone IOT Smart City Solutions - CitiAct and CitiSense
REDtone IOT Smart City Solutions - CitiAct and CitiSenseDr. Mazlan Abbas
 

Andere mochten auch (20)

PhD Defense Talk - Near-Optimal Mobile Crowdsensing: Design Framework and Alg...
PhD Defense Talk - Near-Optimal Mobile Crowdsensing: Design Framework and Alg...PhD Defense Talk - Near-Optimal Mobile Crowdsensing: Design Framework and Alg...
PhD Defense Talk - Near-Optimal Mobile Crowdsensing: Design Framework and Alg...
 
The Concept of Sensing as a Service Using Mobile Crowdsensing
The Concept of Sensing as a Service Using Mobile CrowdsensingThe Concept of Sensing as a Service Using Mobile Crowdsensing
The Concept of Sensing as a Service Using Mobile Crowdsensing
 
Crowd sensing, mobiles and feedback
Crowd sensing, mobiles and feedbackCrowd sensing, mobiles and feedback
Crowd sensing, mobiles and feedback
 
Apisense
Apisense Apisense
Apisense
 
On Internet of Things programming models
On Internet of Things programming modelsOn Internet of Things programming models
On Internet of Things programming models
 
Mobile Crowdsensing with Mobile Agents
Mobile Crowdsensing with Mobile AgentsMobile Crowdsensing with Mobile Agents
Mobile Crowdsensing with Mobile Agents
 
Master in Big Data Analytics and Social Mining 20015
Master in Big Data Analytics and Social Mining 20015Master in Big Data Analytics and Social Mining 20015
Master in Big Data Analytics and Social Mining 20015
 
Infusing social innovation in FI for Manufacturing-FIA Athens
Infusing social innovation in FI for Manufacturing-FIA AthensInfusing social innovation in FI for Manufacturing-FIA Athens
Infusing social innovation in FI for Manufacturing-FIA Athens
 
Sensing
SensingSensing
Sensing
 
Fiware Platform
Fiware PlatformFiware Platform
Fiware Platform
 
2016.07.05 Talk @Ciência 2016, Lisbon
2016.07.05 Talk @Ciência 2016, Lisbon2016.07.05 Talk @Ciência 2016, Lisbon
2016.07.05 Talk @Ciência 2016, Lisbon
 
APISENSE - ISM 2013
APISENSE - ISM 2013APISENSE - ISM 2013
APISENSE - ISM 2013
 
The Night is Young: Urban Crowdsourcing of Nightlife Patterns
The Night is Young: Urban Crowdsourcing of Nightlife PatternsThe Night is Young: Urban Crowdsourcing of Nightlife Patterns
The Night is Young: Urban Crowdsourcing of Nightlife Patterns
 
Internet of Things - Preparing Yourself for a Smart Nation
Internet of Things - Preparing Yourself for a Smart NationInternet of Things - Preparing Yourself for a Smart Nation
Internet of Things - Preparing Yourself for a Smart Nation
 
On Crowd-sensing back-end
On Crowd-sensing back-endOn Crowd-sensing back-end
On Crowd-sensing back-end
 
Crowdsourcing - an overview
Crowdsourcing - an overviewCrowdsourcing - an overview
Crowdsourcing - an overview
 
The Connected World - A Future of Possibilities
The Connected World - A Future of Possibilities The Connected World - A Future of Possibilities
The Connected World - A Future of Possibilities
 
Building Smart Cities with Smart Citizens
Building Smart Cities with Smart CitizensBuilding Smart Cities with Smart Citizens
Building Smart Cities with Smart Citizens
 
Sensing as-a-Service - The New Internet of Things (IOT) Business Model
Sensing as-a-Service - The New Internet of Things (IOT) Business ModelSensing as-a-Service - The New Internet of Things (IOT) Business Model
Sensing as-a-Service - The New Internet of Things (IOT) Business Model
 
REDtone IOT Smart City Solutions - CitiAct and CitiSense
REDtone IOT Smart City Solutions - CitiAct and CitiSenseREDtone IOT Smart City Solutions - CitiAct and CitiSense
REDtone IOT Smart City Solutions - CitiAct and CitiSense
 

Ähnlich wie Privacy-respecting Auctions as Incentive Mechanisms in Mobile Crowd Sensing

A Comprehensive Guide of KYC in Crypto Exchanges in 2023.pdf
A Comprehensive Guide of KYC in Crypto Exchanges in 2023.pdfA Comprehensive Guide of KYC in Crypto Exchanges in 2023.pdf
A Comprehensive Guide of KYC in Crypto Exchanges in 2023.pdfIDMERIT IDMERIT
 
Trends and Future of Crypto Payment Gateway Development
Trends and Future of Crypto Payment Gateway DevelopmentTrends and Future of Crypto Payment Gateway Development
Trends and Future of Crypto Payment Gateway DevelopmentITIO Innovex
 
ANONYMOUS AUCTION PROTOCOL BASED ON TIME-RELEASED ENCRYPTION ATOP CONSORTIUM ...
ANONYMOUS AUCTION PROTOCOL BASED ON TIME-RELEASED ENCRYPTION ATOP CONSORTIUM ...ANONYMOUS AUCTION PROTOCOL BASED ON TIME-RELEASED ENCRYPTION ATOP CONSORTIUM ...
ANONYMOUS AUCTION PROTOCOL BASED ON TIME-RELEASED ENCRYPTION ATOP CONSORTIUM ...ijait
 
ANONYMOUS AUCTION PROTOCOL BASED ON TIMED-RELEASE ENCRYPTION ATOP CONSORTIUM ...
ANONYMOUS AUCTION PROTOCOL BASED ON TIMED-RELEASE ENCRYPTION ATOP CONSORTIUM ...ANONYMOUS AUCTION PROTOCOL BASED ON TIMED-RELEASE ENCRYPTION ATOP CONSORTIUM ...
ANONYMOUS AUCTION PROTOCOL BASED ON TIMED-RELEASE ENCRYPTION ATOP CONSORTIUM ...ijait
 
ANONYMOUS AUCTION PROTOCOL BASED ON TIMED-RELEASE ENCRYPTION ATOP CONSORTIUM ...
ANONYMOUS AUCTION PROTOCOL BASED ON TIMED-RELEASE ENCRYPTION ATOP CONSORTIUM ...ANONYMOUS AUCTION PROTOCOL BASED ON TIMED-RELEASE ENCRYPTION ATOP CONSORTIUM ...
ANONYMOUS AUCTION PROTOCOL BASED ON TIMED-RELEASE ENCRYPTION ATOP CONSORTIUM ...ijait
 
The Integration of Credit Card.pdf
The Integration of Credit Card.pdfThe Integration of Credit Card.pdf
The Integration of Credit Card.pdfOffshore Gateways
 
WF-IOT-2014, Seoul, Korea, 06 March 2014
WF-IOT-2014, Seoul, Korea, 06 March 2014WF-IOT-2014, Seoul, Korea, 06 March 2014
WF-IOT-2014, Seoul, Korea, 06 March 2014Charith Perera
 
Future of digital identity programme summary - 19 mar 2019 lr
Future of digital identity   programme summary - 19 mar 2019 lrFuture of digital identity   programme summary - 19 mar 2019 lr
Future of digital identity programme summary - 19 mar 2019 lrFuture Agenda
 
Crypto Payment Gateway Development: Facilitating Secure Transactions
Crypto Payment Gateway Development: Facilitating Secure TransactionsCrypto Payment Gateway Development: Facilitating Secure Transactions
Crypto Payment Gateway Development: Facilitating Secure TransactionsTess Casali
 
Security Architecture for On-Line Mutual Funds Trading With Multiple Mobile A...
Security Architecture for On-Line Mutual Funds Trading With Multiple Mobile A...Security Architecture for On-Line Mutual Funds Trading With Multiple Mobile A...
Security Architecture for On-Line Mutual Funds Trading With Multiple Mobile A...CSCJournals
 
Future of digital identity Programme summary - 15 dec 2018 lr
Future of digital identity  Programme summary - 15 dec 2018 lrFuture of digital identity  Programme summary - 15 dec 2018 lr
Future of digital identity Programme summary - 15 dec 2018 lrFuture Agenda
 
Insight Into Cryptocurrencies - Methods and Tools for Analyzing Blockchain-ba...
Insight Into Cryptocurrencies - Methods and Tools for Analyzing Blockchain-ba...Insight Into Cryptocurrencies - Methods and Tools for Analyzing Blockchain-ba...
Insight Into Cryptocurrencies - Methods and Tools for Analyzing Blockchain-ba...Bernhard Haslhofer
 
Analysis of Security Algorithms used in E-Commerce and ATM Transactions
Analysis of Security Algorithms used in E-Commerce and ATM TransactionsAnalysis of Security Algorithms used in E-Commerce and ATM Transactions
Analysis of Security Algorithms used in E-Commerce and ATM TransactionsIJERD Editor
 
The Insurance IoT Opportunity
The Insurance IoT Opportunity The Insurance IoT Opportunity
The Insurance IoT Opportunity Matteo Carbone
 
Cost Of A Breach Case Study and PCI Prioritization
Cost Of A Breach Case Study  and PCI PrioritizationCost Of A Breach Case Study  and PCI Prioritization
Cost Of A Breach Case Study and PCI PrioritizationJan Carroza
 
International Blockchain Conference in Groningen, Nov. 30, 2018
International Blockchain Conference in Groningen, Nov. 30, 2018International Blockchain Conference in Groningen, Nov. 30, 2018
International Blockchain Conference in Groningen, Nov. 30, 2018Vlad Burilov
 
Charity System using Blockchain Technology
Charity System using Blockchain TechnologyCharity System using Blockchain Technology
Charity System using Blockchain TechnologyIRJET Journal
 

Ähnlich wie Privacy-respecting Auctions as Incentive Mechanisms in Mobile Crowd Sensing (20)

A Comprehensive Guide of KYC in Crypto Exchanges in 2023.pdf
A Comprehensive Guide of KYC in Crypto Exchanges in 2023.pdfA Comprehensive Guide of KYC in Crypto Exchanges in 2023.pdf
A Comprehensive Guide of KYC in Crypto Exchanges in 2023.pdf
 
Trends and Future of Crypto Payment Gateway Development
Trends and Future of Crypto Payment Gateway DevelopmentTrends and Future of Crypto Payment Gateway Development
Trends and Future of Crypto Payment Gateway Development
 
ANONYMOUS AUCTION PROTOCOL BASED ON TIME-RELEASED ENCRYPTION ATOP CONSORTIUM ...
ANONYMOUS AUCTION PROTOCOL BASED ON TIME-RELEASED ENCRYPTION ATOP CONSORTIUM ...ANONYMOUS AUCTION PROTOCOL BASED ON TIME-RELEASED ENCRYPTION ATOP CONSORTIUM ...
ANONYMOUS AUCTION PROTOCOL BASED ON TIME-RELEASED ENCRYPTION ATOP CONSORTIUM ...
 
ANONYMOUS AUCTION PROTOCOL BASED ON TIMED-RELEASE ENCRYPTION ATOP CONSORTIUM ...
ANONYMOUS AUCTION PROTOCOL BASED ON TIMED-RELEASE ENCRYPTION ATOP CONSORTIUM ...ANONYMOUS AUCTION PROTOCOL BASED ON TIMED-RELEASE ENCRYPTION ATOP CONSORTIUM ...
ANONYMOUS AUCTION PROTOCOL BASED ON TIMED-RELEASE ENCRYPTION ATOP CONSORTIUM ...
 
ANONYMOUS AUCTION PROTOCOL BASED ON TIMED-RELEASE ENCRYPTION ATOP CONSORTIUM ...
ANONYMOUS AUCTION PROTOCOL BASED ON TIMED-RELEASE ENCRYPTION ATOP CONSORTIUM ...ANONYMOUS AUCTION PROTOCOL BASED ON TIMED-RELEASE ENCRYPTION ATOP CONSORTIUM ...
ANONYMOUS AUCTION PROTOCOL BASED ON TIMED-RELEASE ENCRYPTION ATOP CONSORTIUM ...
 
The Integration of Credit Card.pdf
The Integration of Credit Card.pdfThe Integration of Credit Card.pdf
The Integration of Credit Card.pdf
 
WF-IOT-2014, Seoul, Korea, 06 March 2014
WF-IOT-2014, Seoul, Korea, 06 March 2014WF-IOT-2014, Seoul, Korea, 06 March 2014
WF-IOT-2014, Seoul, Korea, 06 March 2014
 
Fintech & Blockchain
Fintech & BlockchainFintech & Blockchain
Fintech & Blockchain
 
Sovereign identity
Sovereign identitySovereign identity
Sovereign identity
 
Future of digital identity programme summary - 19 mar 2019 lr
Future of digital identity   programme summary - 19 mar 2019 lrFuture of digital identity   programme summary - 19 mar 2019 lr
Future of digital identity programme summary - 19 mar 2019 lr
 
Crypto Payment Gateway Development: Facilitating Secure Transactions
Crypto Payment Gateway Development: Facilitating Secure TransactionsCrypto Payment Gateway Development: Facilitating Secure Transactions
Crypto Payment Gateway Development: Facilitating Secure Transactions
 
Security Architecture for On-Line Mutual Funds Trading With Multiple Mobile A...
Security Architecture for On-Line Mutual Funds Trading With Multiple Mobile A...Security Architecture for On-Line Mutual Funds Trading With Multiple Mobile A...
Security Architecture for On-Line Mutual Funds Trading With Multiple Mobile A...
 
Future of digital identity Programme summary - 15 dec 2018 lr
Future of digital identity  Programme summary - 15 dec 2018 lrFuture of digital identity  Programme summary - 15 dec 2018 lr
Future of digital identity Programme summary - 15 dec 2018 lr
 
Insight Into Cryptocurrencies - Methods and Tools for Analyzing Blockchain-ba...
Insight Into Cryptocurrencies - Methods and Tools for Analyzing Blockchain-ba...Insight Into Cryptocurrencies - Methods and Tools for Analyzing Blockchain-ba...
Insight Into Cryptocurrencies - Methods and Tools for Analyzing Blockchain-ba...
 
Analysis of Security Algorithms used in E-Commerce and ATM Transactions
Analysis of Security Algorithms used in E-Commerce and ATM TransactionsAnalysis of Security Algorithms used in E-Commerce and ATM Transactions
Analysis of Security Algorithms used in E-Commerce and ATM Transactions
 
The Insurance IoT Opportunity
The Insurance IoT Opportunity The Insurance IoT Opportunity
The Insurance IoT Opportunity
 
Cost Of A Breach Case Study and PCI Prioritization
Cost Of A Breach Case Study  and PCI PrioritizationCost Of A Breach Case Study  and PCI Prioritization
Cost Of A Breach Case Study and PCI Prioritization
 
International Blockchain Conference in Groningen, Nov. 30, 2018
International Blockchain Conference in Groningen, Nov. 30, 2018International Blockchain Conference in Groningen, Nov. 30, 2018
International Blockchain Conference in Groningen, Nov. 30, 2018
 
Charity System using Blockchain Technology
Charity System using Blockchain TechnologyCharity System using Blockchain Technology
Charity System using Blockchain Technology
 
Crypto Tracing.pdf
Crypto Tracing.pdfCrypto Tracing.pdf
Crypto Tracing.pdf
 

Mehr von Ioannis Krontiris

Trustworthy Infrastructure for Personal Data Management
Trustworthy Infrastructure for Personal Data ManagementTrustworthy Infrastructure for Personal Data Management
Trustworthy Infrastructure for Personal Data ManagementIoannis Krontiris
 
ABC4Trust Architecture and the Benefits for eID Schemes
ABC4Trust Architecture and the Benefits for eID SchemesABC4Trust Architecture and the Benefits for eID Schemes
ABC4Trust Architecture and the Benefits for eID SchemesIoannis Krontiris
 
Integrating Anonymous Credentials with eIDs for Privacy-respecting Online Au...
Integrating Anonymous Credentials with eIDs for Privacy-respecting Online Au...Integrating Anonymous Credentials with eIDs for Privacy-respecting Online Au...
Integrating Anonymous Credentials with eIDs for Privacy-respecting Online Au...Ioannis Krontiris
 
Participatory Sensing through Social Networks: The Tension between Participat...
Participatory Sensing through Social Networks: The Tension between Participat...Participatory Sensing through Social Networks: The Tension between Participat...
Participatory Sensing through Social Networks: The Tension between Participat...Ioannis Krontiris
 
Participatory Sensing through Social Networks
Participatory Sensing through Social NetworksParticipatory Sensing through Social Networks
Participatory Sensing through Social NetworksIoannis Krontiris
 

Mehr von Ioannis Krontiris (6)

APF2015-slides-general
APF2015-slides-generalAPF2015-slides-general
APF2015-slides-general
 
Trustworthy Infrastructure for Personal Data Management
Trustworthy Infrastructure for Personal Data ManagementTrustworthy Infrastructure for Personal Data Management
Trustworthy Infrastructure for Personal Data Management
 
ABC4Trust Architecture and the Benefits for eID Schemes
ABC4Trust Architecture and the Benefits for eID SchemesABC4Trust Architecture and the Benefits for eID Schemes
ABC4Trust Architecture and the Benefits for eID Schemes
 
Integrating Anonymous Credentials with eIDs for Privacy-respecting Online Au...
Integrating Anonymous Credentials with eIDs for Privacy-respecting Online Au...Integrating Anonymous Credentials with eIDs for Privacy-respecting Online Au...
Integrating Anonymous Credentials with eIDs for Privacy-respecting Online Au...
 
Participatory Sensing through Social Networks: The Tension between Participat...
Participatory Sensing through Social Networks: The Tension between Participat...Participatory Sensing through Social Networks: The Tension between Participat...
Participatory Sensing through Social Networks: The Tension between Participat...
 
Participatory Sensing through Social Networks
Participatory Sensing through Social NetworksParticipatory Sensing through Social Networks
Participatory Sensing through Social Networks
 

Kürzlich hochgeladen

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 

Kürzlich hochgeladen (20)

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 

Privacy-respecting Auctions as Incentive Mechanisms in Mobile Crowd Sensing

  • 1. Privacy-Respecting Auctions in Mobile Crowd Sensing Tassos Dimitriou & Ioannis Krontiris 1 Privacy-Respecting Auctions as Incentive Mechanisms in Mobile Crowd Sensing Tassos Dimitriou and Ioannis Krontiris 9th WISTP International Conference on Information Security Theory and Practice (WISTP'2015). August 24 - 25, 2015 Heraklion, Crete, Greece
  • 2. Privacy-Respecting Auctions in Mobile Crowd Sensing Tassos Dimitriou & Ioannis Krontiris 2 Outline Motivation Auction mechanism for mobile sensing Security and privacy requirements Privacy-respecting auction and Rewarding mechanism
  • 3. Privacy-Respecting Auctions in Mobile Crowd Sensing Tassos Dimitriou & Ioannis Krontiris 3 Picture from: D. Christin, A. Reinhardt, S.S. Kanhere, M. Hollick, A Survey on Privacy in Mobile Participatory Sensing Applications, Journal of Systems & Software 2011. Mobile Sensing - Old Style Participants proactively sending data. How to motivate contribution and better quality of data? Protect privacy?
  • 4. Privacy-Respecting Auctions in Mobile Crowd Sensing Tassos Dimitriou & Ioannis Krontiris 4 Information Discovery Here data consumers are interested in retrieving information according to some requirements from multiple data contributors that satisfy these requirements. Define: Specific geographic area Sensor types, time frame Quality criteria Post task on public domain Download task and respond
  • 5. Privacy-Respecting Auctions in Mobile Crowd Sensing Tassos Dimitriou & Ioannis Krontiris 5 Incentives to participation Why would mobile users contribute data? Need incentives: monetary, social, gaming Micro-payments work! But how much is enough? Depends on personal preferences, perceived cost of participation, context It should be the data provider to set the price! Apply reverse-auctions: n users with lowest prices win the auction and contribute data
  • 6. Privacy-Respecting Auctions in Mobile Crowd Sensing Tassos Dimitriou & Ioannis Krontiris 6 Multi-attributive auctions Most suitable kind: multi-attributive auctions Allow integration of quality attributes into the auction bidding, besides the price.
  • 7. Privacy-Respecting Auctions in Mobile Crowd Sensing Tassos Dimitriou & Ioannis Krontiris 7 Privacy concerns The widespread deployment of mobile sensors introduces serious privacy risks since the frequent collection of personal data may reveal considerable information about location, personal preferences, social relationships, etc... Imperative to address privacy in mobile crowd- sensing systems It still remains an open problem on how to provide privacy protection when incentive mechanisms are also incorporated in the system.
  • 8. Privacy-Respecting Auctions in Mobile Crowd Sensing Tassos Dimitriou & Ioannis Krontiris 8 Our contribution Incentives + Privacy A privacy-respecting protocol that allows anonymous users to participate in reverse auctions employed by an MCS system. Two main parts. Provide bidders’ anonymity for the auction Reward users and enable winners of the auction to claim their rewards without being linked to their contributed data.
  • 9. Privacy-Respecting Auctions in Mobile Crowd Sensing Tassos Dimitriou & Ioannis Krontiris 9 Model Service Providers: • requesters of sensing data • have fixed budget Users: owners of mobile devices with sensors Auction Infrastructure: • Task Server - publishing the sensing tasks, • Auction Server - running the auction process • Report Server - collects the reports from the auction winners and forwards them to the Service Provider.
  • 10. Privacy-Respecting Auctions in Mobile Crowd Sensing Tassos Dimitriou & Ioannis Krontiris 10 A generic auction mechanism Bid = Utility Score Si computed based also on quality factors 
 (e.g. distance from the desired location, the location accuracy, the sampling frequency, …)
  • 11. Privacy-Respecting Auctions in Mobile Crowd Sensing Tassos Dimitriou & Ioannis Krontiris 11 Security and Privacy Requirements Correctness and Fairness: Winners get reward. No bidder can obtain an unfair advantage based on information revealed about other bids Bidders’ privacy: Bidders remain anonymous throughout the whole process of the auction -> Unlinkability between (a) identity of bidders and their bids, (b) two bids from the same bidder Confidentiality of bids: All bids remain secret until the opening phase. Applies for all parties including Auction Server. Public verifiability: The correctness of the auction process should be easy to verify by any interested party. Non-repudiation: No bidder should be able to change its mind (e.g. deny or modify its bid) once the bid is submitted.
  • 12. Privacy-Respecting Auctions in Mobile Crowd Sensing Tassos Dimitriou & Ioannis Krontiris 12 Auction protocol Two main phases Bidding and Opening. However, there exists an implicit setup phase: Registration During registration, • Auction Server (AS) sets up the bulletin board, publishes its public key and announces parameters of the auction − Auction ID, starting/ending time, duration of each phase, and so on. • Each bidder i creates a pseudonymous ID (BidderID) to represent its identity during the auction along with a one-time public key Ki. • AS publishes this information to the bulletin board
  • 13. Privacy-Respecting Auctions in Mobile Crowd Sensing Tassos Dimitriou & Ioannis Krontiris 13 Auction protocol - Bidding During the bidding phase, each bidder i • computes its utility score Si, • masks it with a random number ri and • sends a commitment Ci of for the bid, where 
 hi = H(Si || ri). Note: Auction server receives a bid, however it cannot read this bid before the opening phase. Commitments are published in the bulletin board so that anybody can verify that its bid has been correctly accounted for.
  • 14. Privacy-Respecting Auctions in Mobile Crowd Sensing Tassos Dimitriou & Ioannis Krontiris 14 Auction protocol - Opening When bidding phase is over, each bidder reveals utility score Si and ri that have been used in computing Ci . Auction server announces n highest utility scores as the winners of the auction Note: Any participant can verify correctness by computing 
 H(Si || ri) and comparing with the commitment Ci received during the bidding phase.
  • 15. Privacy-Respecting Auctions in Mobile Crowd Sensing Tassos Dimitriou & Ioannis Krontiris 15 Incentives for participation - Rewarding The previous protocol can be extended to support a privacy-preserving credit reward mechanism for users submitting data reports. • This can be achieved using a 
 (i) a central bank system, or 
 (ii) a decentralized digital payment system (method developed here). (i) While the e-cash scheme (not shown here) may be easier conceptually, it suffers from a potential loss of privacy if the report server and the Bank collude together to reveal the bidder’s identity.
  • 16. Privacy-Respecting Auctions in Mobile Crowd Sensing Tassos Dimitriou & Ioannis Krontiris 16 Anonymous reward tokens To eliminate the need for a centralized payment service, we can use the Report Server as an issuer of reward tokens that can be redeemed by the bidder. The token • Corresponds to an amount commensurate to the data provided by the user. • It reveals no information about the underlying user. • The recipient (RS) has first to verify their validity and then verify whether the tokens have been spent before. This approach can still be thought as a lightweight e-cash scheme, yet without the requirement of a trusted payment service
  • 17. Privacy-Respecting Auctions in Mobile Crowd Sensing Tassos Dimitriou & Ioannis Krontiris 17 Token generation Winning Bidder Bi Report Server RS
  • 18. Privacy-Respecting Auctions in Mobile Crowd Sensing Tassos Dimitriou & Ioannis Krontiris 18 Token spending Winning Bidder Bi Report Server RS Submission of tokens (User must prove knowledge of secret values r and s used in the creation of token T) Set h = H(Token, date/time) Set y = r + hs mod q. Token T, y Verify signature. Is T a valid token? Verify token has not been used before by searching database of used tokens. Note: The protocol ensures that i) tokens are not tied to bidder identities, and ii) the RS is protected by malicious bidders who try to double-spend tokens.
  • 19. Privacy-Respecting Auctions in Mobile Crowd Sensing Tassos Dimitriou & Ioannis Krontiris 19 Security Analysis (1) Confidentiality of bids. Since bids are opened only after the bidding phase, nobody can compute the bids before they are opened. Recall commitment H(Si || ri). Correctness & Verifiability. All values are published in the bulletin board. • Anybody can verify correctness of the auction as all bidders reveal their utility scores Si and the random numbers ri used in signed commitment. Unlinkability between bids. Not possible to relate two bids submitted at different auctions by the same bidder. • Bidders participate in auctions using different pseudonyms and public keys. • Important to use an anonymity service so that bid submissions cannot be linked to an internet identifier such as the IP address of the bidder.
  • 20. Privacy-Respecting Auctions in Mobile Crowd Sensing Tassos Dimitriou & Ioannis Krontiris 20 Security Analysis (2) Unforgeability/Unreusability of tokens. The zero knowledge proofs used during token spending ensure that only a bidder who knows the representation of u and v in the token ID can supply these proofs. Bidder privacy/Unlinkability of tokens. When a user tries to redeem a token and provides the server (directly or indirectly through a proxy) the zero knowledge proof, the server cannot tell which bidder created the token as the only visible part during the token construction is the public part Val, Exp of the token
  • 21. Privacy-Respecting Auctions in Mobile Crowd Sensing Tassos Dimitriou & Ioannis Krontiris 21 Token indistinguishability experiment
  • 22. Privacy-Respecting Auctions in Mobile Crowd Sensing Tassos Dimitriou & Ioannis Krontiris 22 Conclusions Users of mobile devices can participate anonymously in the auctions and define the price they expect for contributing sensing data. Τhe buyer of the data can select the winners based not only on the price, but also on the quality of the offered data. The winners of the auction can then collect their price without linking their real identity to the data they contributed. Our solution uses a lightweight rewarding scheme eliminating the need for a single trusted payment system. Future work: integrate anonymous reputation mechanism
  • 23. Privacy-Respecting Auctions in Mobile Crowd Sensing Tassos Dimitriou & Ioannis Krontiris 23