Acta Univ. Agric. Silvic. Mendelianae Brun. 2016, 64(5), 1785-1795 | DOI: 10.11118/actaun201664051785

System for Anonymous Data Collection Based on Group Signature Scheme

David Troják, Dan Komosný
Department of Telecommunications, Faculty of Electrical Engineering an Communication, Brno University of Technology, Technická 3082/12, 616 00, Brno, Czech Republic

This paper deals with an anonymous data collection in the Internet of Things (IoT). the privacy and anonymity of the data source is important for many IoT applications, such as in agriculture, health, and automotive. the proposed data-collection system provides anonymity for the data sources by applying a cooperation group scheme. the group scheme also provides a low power consumption. the system is built upon the Tor (The Onion Router) anonymous network, which is a part of the Internet darknet. the proposed system was designed for the Android devices on the client side and for Java environment on the server side. We evaluated the anonymous data collection in a real-use scenario that covers selected data acquisition (e.g. signal strength) from smartphones triggered by their geographical location change. the results show that the proposed system provides the sufficient data source anonymity, an effective revocation, a low computational cost and a low overhead.

Keywords: anonymity, data collection, sensors, internet of things, tor, group signature, smartphone

Prepublished online: October 31, 2016; Published: November 1, 2016  Show citation

ACS AIP APA ASA Harvard Chicago IEEE ISO690 MLA NLM Turabian Vancouver
Troják, D., & Komosný, D. (2016). System for Anonymous Data Collection Based on Group Signature Scheme. Acta Universitatis Agriculturae et Silviculturae Mendelianae Brunensis64(5), 1785-1795. doi: 10.11118/actaun201664051785
Download citation

References

  1. CERVENKA, V., MRAZ, L. and KOMOSNY, D. 2014. Comprehensive Performance Analysis of Lightweight Mesh and Its Comparison with ZigBee Pro Technology. Wireless Personal Communications, 78(2): 1527 - 1538. DOI: 10.1007/s11277-014-1832-x Go to original source...
  2. MRAZ, L., CERVENKA, V., KOMOSNY, D. et al. 2013. Comprehensive Performance Analysis of ZigBee Technology Based on Real Measurements. Wireless personal communications, 71(4): 2783 - 2803. DOI: 10.1007/s11277-012-0971-1 Go to original source...
  3. DE CRISTOFARO, E. and SORIENTE, C. 2013. Extended capabilities for a privacy-enhanced participatory sensing infrastructure (PEPSI). IEEE Transactions on Information Forensics and Security, 8(12): 2021 - 2033. DOI: 10.1109/TIFS.2013.2287092 Go to original source...
  4. DOMINGO-FERRER, J. and MATEO-SANZ, J. M. 2002. Practical data-oriented microaggregation for statistical disclosure control. IEEE Transactions on Knowledge and Data Engineering, 14(1): 189 - 201. DOI: 10.1109/69.979982 Go to original source...
  5. LASZLO, M. and MUKHERJEE, S. 2005. Minimum spanning tree partitioning algorithm for microaggregation. IEEE Transactions on Knowledge and Data Engineering, 17(7): 902 - 911. DOI: 10.1109/TKDE.2005.112 Go to original source...
  6. SOLANAS, A. and MARTÍNEZ-BALLESTÉ, A. 2006. V-MDAV: A Multivariate Microaggregation with Variable Group Size. In: 17th COMPSTAT Symposium of the IASC.
  7. TRUTA, T. M. and VINAY, B. 2006. Privacy protection: P-sensitive k-anonymity property. In: 22nd International Conference on Data Engineering Workshops (ICDEW'06), 94. Go to original source...
  8. MACHANAVAJJHALA, A., KIFER, D., GEHRKE, J. et al. 2007. L-diversity. ACM Transactions on Knowledge Discovery from Data, 1(1): 3 - es. Go to original source...
  9. KAPADIA, A., TRIANDOPOULOS, N., CORNELIUS, C. et al. 2008. AnonySense: Opportunistic and privacy-preserving context collection. In: Lecture Notes in Computer Science. Springer Science + Business Media, 280 - 297. Go to original source...
  10. HAJNY, J. and MALINA, L. 2013. Unlinkable attribute-based credentials with practical revocation on smart-cards. In: Smart Card Research and Advanced Applications. Springer Science + Business Media, 62 - 76. Go to original source...
  11. PANG, S., KOMOSNY, D., ZHU, L., et al. 2016. Malicious Events Grouping via Behavior Based Darknet Traffic Flow Analysis. Wireless Personal Communications, in print. Go to original source...
  12. ZHANG, R., ZHU, L., LI, X. et al. 2015. Behavior Based Darknet Traffic Decomposition for Malicious Events Identification. In: Lecture Notes in Computer Science. Springer Science + Business Media, 251 - 260. Go to original source...
  13. SIMEK, M., MORAVEK, P., KOMOSNY, D. et al. 2012. Distributed Recognition of Reference Nodes for Wireless Sensor Network Localization. In: Radioengineering, 21(1): 89 - 98.
  14. MORAVEK, P., KOMOSNY, D. and SIMEK, M. 2012. Multilateration and Flip Ambiguity Mitigation in Ad-hoc Networks. In: Przeglad Elektrotechniczny, 2012(05b): 222 - 229.
  15. TANG, K.P., KEYANI, P., FOGARTY, J. et al. 2006. Putting people in their place. In: Proceedings of the SIGCHI conference on Human Factors in computing systems - CHI '06. 93102. Go to original source...
  16. BELLARE, M., MICCIANCIO, D. and WARINSCHI, B. 2003. Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions. In: Advances in Cryptology - EUROCRYPT 2003. Springer Science + Business Media, 614 - 629. Go to original source...
  17. CHAUM, D. and HEYST, E. V. 1991. Group Signatures. In: Advances in Cryptology - EUROCRYPT 91. Lecture Notes in Computer Science. 257 - 265. Go to original source...
  18. ATENIESE, G., CAMENISCH, J., JOYE, M. et al, G. 2000. A Practical and Provably Secure Coalition-Resistant Group Signature Scheme. In: Advances in Cryptology - CRYPTO 00. Lecture Notes in Computer Science. 255 - 270. Go to original source...
  19. BONEH, D., BOYEN, X. and SHACHAM, H. 2004. Short Group Signatures. In: Advances in Cryptology - CRYPTO 04. Lecture Notes in Computer Science. 41 -55. Go to original source...
  20. NGUYEN, L. and SAFAVI-NAINI, R. 2004. Efficient and Provably Secure Trapdoor-Free Group Signature Schemes from Bilinear Pairings. In: Advances in Cryptology - ASIACRYPT 04. Lecture Notes in Computer Science. 372 -386. Go to original source...
  21. MALINA, L., HAJNY, J. and ZEMAN, V. 2013. Trade-off between signature aggregation and batch verification. In: Telecommunications and Signal Processing. 36th International Conference on. IEEE. Go to original source...

This is an open access article distributed under the terms of the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License (CC BY NC ND 4.0), which permits non-comercial use, distribution, and reproduction in any medium, provided the original publication is properly cited. No use, distribution or reproduction is permitted which does not comply with these terms.