SlideShare uma empresa Scribd logo
1 de 19
Participatory Sensing through Social NetworksThe tension between Participation and Privacy ITWDC6-8 September, 2010 I. Krontiris,  Chair of Mobile Business Goethe University Frankfurt ioannis.krontiris@m-chair.net F.C. Freiling,  LehrstuhlPraktischeInformatik I University of Mannheim
 Paper outline What are the benefits and drawbacks of connecting social network with participatory sensing?  We study this relation in 2 dimensions that conflict with each other:  Social translucence (visibility) and Privacy Goal: Identify and discuss research challenges that arise in this new setting.
 Available Sensors Today
 Available Sensors Tomorrow
 External Sensors
NoiseTube
 Architecture Overview
 Research Questions Share – How will collected data be shared? What practices of individual ownership will be appropriate and how will privacy be addressed? How can data best be shared with non-experts, urban planers, decision and policy makers, etc.? Change – What tools or frameworks best invite and encourage active participation? What tools and techniques will facilitate the most productive debate and ultimate positive social benefit?
 Utilizing Social Networks Benefit 1: Recruitment (getting people to join) identify and reach well-suited participants for data collections based on their geographic availability as well as their interests and habits. allow existing participants to invite their friends to join a group, or see what their friends are doing (which group they joined, in which groups they are most active), etc.
 Utilizing Social Networks Benefit 2: Participation (getting people to participate) No direct benefits for participants. Why should those who can produce the sensing data take the time to engage in such interactions? Why should they wish to? Sense of Community Sense of efficacy: a sense that they have had some effect on the group.
 Utilizing Social Networks RecognitionReputation Points a user, after submitting a report from his mobile phone, is given a reputation point.  reputation points are public and appear on the public profile of that user.
 Utilizing Social Networks Benefit 3: Acting on the data Not all data are equally useful / important People could also intentionally submit fault data        Pre-evaluation by the users Example: A system that allows users to submit images of potholes on the street
location privacy
 Privacy vs. Visibility Knowing when a particular person was at a particular point in time can be used to infer a lot of personal information Allow users to make their contributions visible to the online community Anonymity Social Translucence
 Research question System model: Users submitting data are anonymous, but at the same time they maintain a public profile in the social network, where they provide details about themselves (e.g. reputation, etc.) Is it possible to offer anonymity to the user, who submits sensing data from the physical environment, while at the same time we maintain properties connected with his public profile, like  Reputation and User revocation?
br /> Anonymity Let’s assume we provide anonymity to protect user’s privacy Data are anonymized Hide network identifiers
 Reputation Giving reputation points to an anonymous user is not possible Need two independent processes: A pseudonymous user acquires reputation points (one-time pseudonym) A known user updates its reputation in his public profile Solution direction: Use e-cash systems A pseudonymous user obtains e-coins from the bank for a report submission, which corresponds to a reputation point At a later point in time, the user logs-in using his public profile and redeems the e-coin to increase his reputation. Hard: Repetitions of this process should not be linkable!
 User revocation Before submit, user authenticates anonymously to the service provider  This encourages user misbehavior        need for user revocation Revocation depends on anonymous authentication mechanism: If use group signatures:  A Trusted-Third-Party manages user accounts and has the ability to revoke user’s anonymity at any time. No assurances that TTP is reliable! If use e-cash: Anonymity is revoked if spent an e-coin twice If use k-Times Anonymous Authentication: Anonymity is revoked if user authenticates more than k times.  None of this appropriate. Need a d-strikes-out revocation system When users are judged to have misbehaved d times, they are revoked by the system Some protocols exist, but very expensive for power-limited mobile phones
 Conclusions Utilization of social networks could provide many benefits in urban sensing recruit more citizens in campaigns and boost their active participation. Example: use of reputation systems It is also important to preserve the anonymity of the users submitting data Anonymity makes it hard to revoke misbehaving users or compute their accumulated reputation points Acknowledgment: Thanks to Nicolas Maisonneuve for the inspiring conversations

Mais conteúdo relacionado

Mais procurados

Microsoft Research Cambridge 20071207 Workshop On Online Social Networks (T...
Microsoft Research Cambridge 20071207   Workshop On Online Social Networks (T...Microsoft Research Cambridge 20071207   Workshop On Online Social Networks (T...
Microsoft Research Cambridge 20071207 Workshop On Online Social Networks (T...Tin180 VietNam
 
Social Networks and Social Capital
Social Networks and Social CapitalSocial Networks and Social Capital
Social Networks and Social CapitalGiorgos Cheliotis
 
Social network websites: best practices from leading services
Social network websites: best practices from leading servicesSocial network websites: best practices from leading services
Social network websites: best practices from leading servicesFabernovel
 
The Credibility of Digital Identity Information on the Social Web: A User Study
The Credibility of Digital Identity Information on the Social Web: A User StudyThe Credibility of Digital Identity Information on the Social Web: A User Study
The Credibility of Digital Identity Information on the Social Web: A User StudyMatthew Rowe
 
Multiparty Access Control For Online Social Networks : Model and Mechanisms.
Multiparty Access Control For Online Social Networks : Model and Mechanisms.Multiparty Access Control For Online Social Networks : Model and Mechanisms.
Multiparty Access Control For Online Social Networks : Model and Mechanisms.Kiran K.V.S.
 
INFO4990_Hossain
INFO4990_HossainINFO4990_Hossain
INFO4990_Hossainwebuploader
 
Selfie Deaths (KillFies) and Distracted Driving: Social Computing, Machine L...
Selfie Deaths (KillFies) and Distracted Driving: Social Computing, Machine L...Selfie Deaths (KillFies) and Distracted Driving: Social Computing, Machine L...
Selfie Deaths (KillFies) and Distracted Driving: Social Computing, Machine L...IIIT Hyderabad
 
Dan Trottier
Dan TrottierDan Trottier
Dan Trottiercitasa
 
Ass a koene_ca_sma
Ass a koene_ca_smaAss a koene_ca_sma
Ass a koene_ca_smaAnsgar Koene
 
Candidates' Communication patterns on Twitter
Candidates' Communication patterns on TwitterCandidates' Communication patterns on Twitter
Candidates' Communication patterns on TwitterMaurice Vergeer
 
Social Network Analysis (SNA) and its implications for knowledge discovery in...
Social Network Analysis (SNA) and its implications for knowledge discovery in...Social Network Analysis (SNA) and its implications for knowledge discovery in...
Social Network Analysis (SNA) and its implications for knowledge discovery in...ACMBangalore
 
Cl15 a koene_ca_sma
Cl15 a koene_ca_smaCl15 a koene_ca_sma
Cl15 a koene_ca_smaAnsgar Koene
 
Unfollowing on twitter
Unfollowing on twitterUnfollowing on twitter
Unfollowing on twittermor
 
Donate Mate App In HackathonBd 2012
Donate Mate App In HackathonBd 2012Donate Mate App In HackathonBd 2012
Donate Mate App In HackathonBd 2012sadasidha08
 
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACYMUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACYpaperpublications3
 
2013 NodeXL Social Media Network Analysis
2013 NodeXL Social Media Network Analysis2013 NodeXL Social Media Network Analysis
2013 NodeXL Social Media Network AnalysisMarc Smith
 
RESOLVING MULTI-PARTY PRIVACY CONFLICTS IN SOCIAL MEDIA
RESOLVING MULTI-PARTY PRIVACY CONFLICTS IN SOCIAL MEDIARESOLVING MULTI-PARTY PRIVACY CONFLICTS IN SOCIAL MEDIA
RESOLVING MULTI-PARTY PRIVACY CONFLICTS IN SOCIAL MEDIANexgen Technology
 

Mais procurados (20)

Microsoft Research Cambridge 20071207 Workshop On Online Social Networks (T...
Microsoft Research Cambridge 20071207   Workshop On Online Social Networks (T...Microsoft Research Cambridge 20071207   Workshop On Online Social Networks (T...
Microsoft Research Cambridge 20071207 Workshop On Online Social Networks (T...
 
Social Networks and Social Capital
Social Networks and Social CapitalSocial Networks and Social Capital
Social Networks and Social Capital
 
Social network websites: best practices from leading services
Social network websites: best practices from leading servicesSocial network websites: best practices from leading services
Social network websites: best practices from leading services
 
Ucs813 syllabus
Ucs813 syllabusUcs813 syllabus
Ucs813 syllabus
 
The Credibility of Digital Identity Information on the Social Web: A User Study
The Credibility of Digital Identity Information on the Social Web: A User StudyThe Credibility of Digital Identity Information on the Social Web: A User Study
The Credibility of Digital Identity Information on the Social Web: A User Study
 
Multiparty Access Control For Online Social Networks : Model and Mechanisms.
Multiparty Access Control For Online Social Networks : Model and Mechanisms.Multiparty Access Control For Online Social Networks : Model and Mechanisms.
Multiparty Access Control For Online Social Networks : Model and Mechanisms.
 
INFO4990_Hossain
INFO4990_HossainINFO4990_Hossain
INFO4990_Hossain
 
Selfie Deaths (KillFies) and Distracted Driving: Social Computing, Machine L...
Selfie Deaths (KillFies) and Distracted Driving: Social Computing, Machine L...Selfie Deaths (KillFies) and Distracted Driving: Social Computing, Machine L...
Selfie Deaths (KillFies) and Distracted Driving: Social Computing, Machine L...
 
Dan Trottier
Dan TrottierDan Trottier
Dan Trottier
 
Ass a koene_ca_sma
Ass a koene_ca_smaAss a koene_ca_sma
Ass a koene_ca_sma
 
Seminar Report Mine
Seminar Report MineSeminar Report Mine
Seminar Report Mine
 
Candidates' Communication patterns on Twitter
Candidates' Communication patterns on TwitterCandidates' Communication patterns on Twitter
Candidates' Communication patterns on Twitter
 
Social Network Analysis (SNA) and its implications for knowledge discovery in...
Social Network Analysis (SNA) and its implications for knowledge discovery in...Social Network Analysis (SNA) and its implications for knowledge discovery in...
Social Network Analysis (SNA) and its implications for knowledge discovery in...
 
Cl15 a koene_ca_sma
Cl15 a koene_ca_smaCl15 a koene_ca_sma
Cl15 a koene_ca_sma
 
Unfollowing on twitter
Unfollowing on twitterUnfollowing on twitter
Unfollowing on twitter
 
Donate Mate App In HackathonBd 2012
Donate Mate App In HackathonBd 2012Donate Mate App In HackathonBd 2012
Donate Mate App In HackathonBd 2012
 
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACYMUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
 
2013 NodeXL Social Media Network Analysis
2013 NodeXL Social Media Network Analysis2013 NodeXL Social Media Network Analysis
2013 NodeXL Social Media Network Analysis
 
RESOLVING MULTI-PARTY PRIVACY CONFLICTS IN SOCIAL MEDIA
RESOLVING MULTI-PARTY PRIVACY CONFLICTS IN SOCIAL MEDIARESOLVING MULTI-PARTY PRIVACY CONFLICTS IN SOCIAL MEDIA
RESOLVING MULTI-PARTY PRIVACY CONFLICTS IN SOCIAL MEDIA
 
FAKE NEWS DETECTION PPT
FAKE NEWS DETECTION PPT FAKE NEWS DETECTION PPT
FAKE NEWS DETECTION PPT
 

Destaque

Sensing City Potential through Social Data @ ICMU2014 Panel
Sensing City Potential through Social Data @ ICMU2014 PanelSensing City Potential through Social Data @ ICMU2014 Panel
Sensing City Potential through Social Data @ ICMU2014 PanelYutaka Arakawa
 
Gamification-based Incentive Mechanism for Participatory Sensing
Gamification-based Incentive Mechanism for Participatory SensingGamification-based Incentive Mechanism for Participatory Sensing
Gamification-based Incentive Mechanism for Participatory SensingUbi NAIST
 
Sensing Mobile Devices talk from QCon London 2013
Sensing Mobile Devices talk from QCon London 2013Sensing Mobile Devices talk from QCon London 2013
Sensing Mobile Devices talk from QCon London 2013Adam Blum
 
Scg skyfollow social media sensing for skydeck part2
Scg skyfollow social media sensing for skydeck part2Scg skyfollow social media sensing for skydeck part2
Scg skyfollow social media sensing for skydeck part2Chris Rigatuso
 
Privacy-respecting Auctions as Incentive Mechanisms in Mobile Crowd Sensing
Privacy-respecting Auctions as Incentive Mechanisms in Mobile Crowd SensingPrivacy-respecting Auctions as Incentive Mechanisms in Mobile Crowd Sensing
Privacy-respecting Auctions as Incentive Mechanisms in Mobile Crowd SensingIoannis Krontiris
 
User privacy and data trustworthiness in mobile crowd sensing
User privacy and data trustworthiness in mobile crowd sensingUser privacy and data trustworthiness in mobile crowd sensing
User privacy and data trustworthiness in mobile crowd sensingLeMeniz Infotech
 

Destaque (8)

Sensing City Potential through Social Data @ ICMU2014 Panel
Sensing City Potential through Social Data @ ICMU2014 PanelSensing City Potential through Social Data @ ICMU2014 Panel
Sensing City Potential through Social Data @ ICMU2014 Panel
 
Gamification-based Incentive Mechanism for Participatory Sensing
Gamification-based Incentive Mechanism for Participatory SensingGamification-based Incentive Mechanism for Participatory Sensing
Gamification-based Incentive Mechanism for Participatory Sensing
 
Sensing Mobile Devices talk from QCon London 2013
Sensing Mobile Devices talk from QCon London 2013Sensing Mobile Devices talk from QCon London 2013
Sensing Mobile Devices talk from QCon London 2013
 
Scg skyfollow social media sensing for skydeck part2
Scg skyfollow social media sensing for skydeck part2Scg skyfollow social media sensing for skydeck part2
Scg skyfollow social media sensing for skydeck part2
 
Privacy-respecting Auctions as Incentive Mechanisms in Mobile Crowd Sensing
Privacy-respecting Auctions as Incentive Mechanisms in Mobile Crowd SensingPrivacy-respecting Auctions as Incentive Mechanisms in Mobile Crowd Sensing
Privacy-respecting Auctions as Incentive Mechanisms in Mobile Crowd Sensing
 
On Crowd-sensing back-end
On Crowd-sensing back-endOn Crowd-sensing back-end
On Crowd-sensing back-end
 
141060753008 vrajesh parikh_slides
141060753008 vrajesh parikh_slides141060753008 vrajesh parikh_slides
141060753008 vrajesh parikh_slides
 
User privacy and data trustworthiness in mobile crowd sensing
User privacy and data trustworthiness in mobile crowd sensingUser privacy and data trustworthiness in mobile crowd sensing
User privacy and data trustworthiness in mobile crowd sensing
 

Semelhante a Participatory Sensing through Social Networks: The Tension between Participation and Privacy

IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...IRJET Journal
 
Authorization mechanism for multiparty data sharing in social network
Authorization mechanism for multiparty data sharing in social networkAuthorization mechanism for multiparty data sharing in social network
Authorization mechanism for multiparty data sharing in social networkeSAT Publishing House
 
Web 2.0 Collective Intelligence - How to use collective intelligence techniqu...
Web 2.0 Collective Intelligence - How to use collective intelligence techniqu...Web 2.0 Collective Intelligence - How to use collective intelligence techniqu...
Web 2.0 Collective Intelligence - How to use collective intelligence techniqu...Paul Gilbreath
 
The Web and the Collective Intelligence - How to use Collective Intelligence ...
The Web and the Collective Intelligence - How to use Collective Intelligence ...The Web and the Collective Intelligence - How to use Collective Intelligence ...
The Web and the Collective Intelligence - How to use Collective Intelligence ...Hélio Teixeira
 
Trustworthy Sensing for Public Safety in Cloud Centric Things of Internet wit...
Trustworthy Sensing for Public Safety in Cloud Centric Things of Internet wit...Trustworthy Sensing for Public Safety in Cloud Centric Things of Internet wit...
Trustworthy Sensing for Public Safety in Cloud Centric Things of Internet wit...RSIS International
 
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKSSECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKSZac Darcy
 
An Access Control Model for Collaborative Management of Shared Data in OSNS
An Access Control Model for Collaborative Management of Shared Data in OSNSAn Access Control Model for Collaborative Management of Shared Data in OSNS
An Access Control Model for Collaborative Management of Shared Data in OSNSIJMER
 
Social computing, sustainability and energy and the environment.
Social computing, sustainability and energy and the environment.Social computing, sustainability and energy and the environment.
Social computing, sustainability and energy and the environment.Thomas Erickson
 
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...ijtsrd
 
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Editor IJCATR
 
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Editor IJCATR
 
Intelligent access control policies for Social network site
Intelligent access control policies for Social network siteIntelligent access control policies for Social network site
Intelligent access control policies for Social network siteijcsit
 
Privacy Perspectives, Requirements and Design trade-offs of Encounter- based ...
Privacy Perspectives, Requirements and Design trade-offs of Encounter- based ...Privacy Perspectives, Requirements and Design trade-offs of Encounter- based ...
Privacy Perspectives, Requirements and Design trade-offs of Encounter- based ...AM Publications
 
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...ijsptm
 
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...IRJET Journal
 
eGovernance Research Grand Challenges
eGovernance Research Grand ChallengeseGovernance Research Grand Challenges
eGovernance Research Grand ChallengesYannis Charalabidis
 
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACYMUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACYpaperpublications3
 
CS6010 Social Network Analysis Unit IV
CS6010 Social Network Analysis Unit IVCS6010 Social Network Analysis Unit IV
CS6010 Social Network Analysis Unit IVpkaviya
 

Semelhante a Participatory Sensing through Social Networks: The Tension between Participation and Privacy (20)

Socially augmented software empowering software operation through social cont...
Socially augmented software empowering software operation through social cont...Socially augmented software empowering software operation through social cont...
Socially augmented software empowering software operation through social cont...
 
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...
 
Authorization mechanism for multiparty data sharing in social network
Authorization mechanism for multiparty data sharing in social networkAuthorization mechanism for multiparty data sharing in social network
Authorization mechanism for multiparty data sharing in social network
 
Web 2.0 Collective Intelligence - How to use collective intelligence techniqu...
Web 2.0 Collective Intelligence - How to use collective intelligence techniqu...Web 2.0 Collective Intelligence - How to use collective intelligence techniqu...
Web 2.0 Collective Intelligence - How to use collective intelligence techniqu...
 
The Web and the Collective Intelligence - How to use Collective Intelligence ...
The Web and the Collective Intelligence - How to use Collective Intelligence ...The Web and the Collective Intelligence - How to use Collective Intelligence ...
The Web and the Collective Intelligence - How to use Collective Intelligence ...
 
Trustworthy Sensing for Public Safety in Cloud Centric Things of Internet wit...
Trustworthy Sensing for Public Safety in Cloud Centric Things of Internet wit...Trustworthy Sensing for Public Safety in Cloud Centric Things of Internet wit...
Trustworthy Sensing for Public Safety in Cloud Centric Things of Internet wit...
 
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKSSECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
 
An Access Control Model for Collaborative Management of Shared Data in OSNS
An Access Control Model for Collaborative Management of Shared Data in OSNSAn Access Control Model for Collaborative Management of Shared Data in OSNS
An Access Control Model for Collaborative Management of Shared Data in OSNS
 
Social computing, sustainability and energy and the environment.
Social computing, sustainability and energy and the environment.Social computing, sustainability and energy and the environment.
Social computing, sustainability and energy and the environment.
 
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
 
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
 
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
 
Intelligent access control policies for Social network site
Intelligent access control policies for Social network siteIntelligent access control policies for Social network site
Intelligent access control policies for Social network site
 
Privacy Perspectives, Requirements and Design trade-offs of Encounter- based ...
Privacy Perspectives, Requirements and Design trade-offs of Encounter- based ...Privacy Perspectives, Requirements and Design trade-offs of Encounter- based ...
Privacy Perspectives, Requirements and Design trade-offs of Encounter- based ...
 
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
 
Comm tech pw pt
Comm tech pw ptComm tech pw pt
Comm tech pw pt
 
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
 
eGovernance Research Grand Challenges
eGovernance Research Grand ChallengeseGovernance Research Grand Challenges
eGovernance Research Grand Challenges
 
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACYMUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
 
CS6010 Social Network Analysis Unit IV
CS6010 Social Network Analysis Unit IVCS6010 Social Network Analysis Unit IV
CS6010 Social Network Analysis Unit IV
 

Último

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 

Último (20)

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

Participatory Sensing through Social Networks: The Tension between Participation and Privacy

  • 1. Participatory Sensing through Social NetworksThe tension between Participation and Privacy ITWDC6-8 September, 2010 I. Krontiris, Chair of Mobile Business Goethe University Frankfurt ioannis.krontiris@m-chair.net F.C. Freiling, LehrstuhlPraktischeInformatik I University of Mannheim
  • 2. Paper outline What are the benefits and drawbacks of connecting social network with participatory sensing?  We study this relation in 2 dimensions that conflict with each other:  Social translucence (visibility) and Privacy Goal: Identify and discuss research challenges that arise in this new setting.
  • 8. Research Questions Share – How will collected data be shared? What practices of individual ownership will be appropriate and how will privacy be addressed? How can data best be shared with non-experts, urban planers, decision and policy makers, etc.? Change – What tools or frameworks best invite and encourage active participation? What tools and techniques will facilitate the most productive debate and ultimate positive social benefit?
  • 9. Utilizing Social Networks Benefit 1: Recruitment (getting people to join) identify and reach well-suited participants for data collections based on their geographic availability as well as their interests and habits. allow existing participants to invite their friends to join a group, or see what their friends are doing (which group they joined, in which groups they are most active), etc.
  • 10. Utilizing Social Networks Benefit 2: Participation (getting people to participate) No direct benefits for participants. Why should those who can produce the sensing data take the time to engage in such interactions? Why should they wish to? Sense of Community Sense of efficacy: a sense that they have had some effect on the group.
  • 11. Utilizing Social Networks RecognitionReputation Points a user, after submitting a report from his mobile phone, is given a reputation point. reputation points are public and appear on the public profile of that user.
  • 12. Utilizing Social Networks Benefit 3: Acting on the data Not all data are equally useful / important People could also intentionally submit fault data Pre-evaluation by the users Example: A system that allows users to submit images of potholes on the street
  • 14. Privacy vs. Visibility Knowing when a particular person was at a particular point in time can be used to infer a lot of personal information Allow users to make their contributions visible to the online community Anonymity Social Translucence
  • 15. Research question System model: Users submitting data are anonymous, but at the same time they maintain a public profile in the social network, where they provide details about themselves (e.g. reputation, etc.) Is it possible to offer anonymity to the user, who submits sensing data from the physical environment, while at the same time we maintain properties connected with his public profile, like Reputation and User revocation?
  • 16. br /> Anonymity Let’s assume we provide anonymity to protect user’s privacy Data are anonymized Hide network identifiers
  • 17. Reputation Giving reputation points to an anonymous user is not possible Need two independent processes: A pseudonymous user acquires reputation points (one-time pseudonym) A known user updates its reputation in his public profile Solution direction: Use e-cash systems A pseudonymous user obtains e-coins from the bank for a report submission, which corresponds to a reputation point At a later point in time, the user logs-in using his public profile and redeems the e-coin to increase his reputation. Hard: Repetitions of this process should not be linkable!
  • 18. User revocation Before submit, user authenticates anonymously to the service provider This encourages user misbehavior need for user revocation Revocation depends on anonymous authentication mechanism: If use group signatures: A Trusted-Third-Party manages user accounts and has the ability to revoke user’s anonymity at any time. No assurances that TTP is reliable! If use e-cash: Anonymity is revoked if spent an e-coin twice If use k-Times Anonymous Authentication: Anonymity is revoked if user authenticates more than k times. None of this appropriate. Need a d-strikes-out revocation system When users are judged to have misbehaved d times, they are revoked by the system Some protocols exist, but very expensive for power-limited mobile phones
  • 19. Conclusions Utilization of social networks could provide many benefits in urban sensing recruit more citizens in campaigns and boost their active participation. Example: use of reputation systems It is also important to preserve the anonymity of the users submitting data Anonymity makes it hard to revoke misbehaving users or compute their accumulated reputation points Acknowledgment: Thanks to Nicolas Maisonneuve for the inspiring conversations