Encrypting wireless network traces to protect user privacy: A case study for smart campus

L. Zhang, O. Oksuz, L. Nazaryan, C. Yue, B. Wang, A. Kiayias, A. Bamis

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Wireless network traces have been widely used to understand human behaviors and provide value-added services. Sanitization based techniques have been shown to be severely lacking in protecting sensitive user information embedded in such traces. In this paper, we take an encryption based approach that provides much stronger protection of user privacy. One challenge in encrypting wireless network traces is how to encrypt time range while maintaining the utility of the traces. We propose two practical encryption techniques to support queries that involve time range. These two techniques provide much stronger security guarantee than existing order preserving encryption schemes, and present different tradeoffs in complexity, as well as storage and network bandwidth requirement. Last, we quantify the performance of the proposed approach using a smart campus prototype. The results show that our approach only leads to moderate increase in storage, network bandwidth and computation overhead, demonstrating the practicality of our approach.
Original languageEnglish
Title of host publication2016 IEEE 12th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)
PublisherInstitute of Electrical and Electronics Engineers (IEEE)
Pages1-8
Number of pages8
ISBN (Electronic)978-1-5090-0724-0
DOIs
Publication statusPublished - 1 Oct 2016
Event2016 IEEE 12th International Conference on Wireless and Mobile Computing, Networking and Communications - New York City, United States
Duration: 17 Oct 201719 Oct 2017
http://conferences.computer.org/wimob2016/

Conference

Conference2016 IEEE 12th International Conference on Wireless and Mobile Computing, Networking and Communications
Abbreviated titleWMOB 2017
Country/TerritoryUnited States
CityNew York City
Period17/10/1719/10/17
Internet address

Fingerprint

Dive into the research topics of 'Encrypting wireless network traces to protect user privacy: A case study for smart campus'. Together they form a unique fingerprint.

Cite this