Meetings through the cloud: Privacy-preserving scheduling on mobile devices

被引:19
作者
Bilogrevic, Igor [1 ]
Jadliwala, Murtuza [1 ]
Kumar, Praveen [2 ]
Walia, Sudeep Singh [2 ]
Hubaux, Jean-Pierre [1 ]
Aad, Imad [3 ]
Niemi, Valtteri [3 ]
机构
[1] Ecole Polytech Fed Lausanne, Lab Commun & Applicat 1, CH-1015 Lausanne, Switzerland
[2] IIT, Dept Comp Sci & Engn, Kharagpur, W Bengal, India
[3] Nokia Res Ctr, Lausanne, Switzerland
关键词
Activity scheduling; Mobile devices; Client-server architecture; Homomorphic encryption;
D O I
10.1016/j.jss.2011.04.027
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Mobile devices are increasingly being used to store and manage users' personal information, as well as to access popular third-party context-based services. Very often, these applications need to determine common availabilities among a set of user schedules, in order to allow colleagues, business partners and people to meet. The privacy of the scheduling operation is paramount to the success of such applications, as often users do not want to share their personal schedule details with other users or third-parties. In this paper, we propose practical and privacy-preserving solutions for mobile devices to the server-based scheduling problem. Our three novel algorithms take advantage of the homomorphic properties of well-known cryptosystems in order to privately and efficiently compute common user availabilities. We also formally outline the privacy requirements in such scheduling applications and we implement our solutions on real mobile devices. The experimental measurements and analytical results show that the proposed solutions not only satisfy the privacy properties but also fare better, in regard to computation and communication efficiency, compared to other well-known solutions. Finally, we assess the utility and expectations, in terms of privacy and usability, of the proposed solutions by means of a targeted survey and user-study of mobile-phone users. (C) 2011 Elsevier Inc. All rights reserved.
引用
收藏
页码:1910 / 1927
页数:18
相关论文
共 29 条
[1]  
[Anonymous], 2001, FDN CRYPTOGRAPHY
[2]  
[Anonymous], DOODL EAS SCHED
[3]  
[Anonymous], IEEE T INFORM THEORY
[4]  
*APPL, APPL ICAL
[5]   A note on negligible functions [J].
Bellare, M .
JOURNAL OF CRYPTOLOGY, 2002, 15 (04) :271-284
[6]  
Cachin Christian., 2004, PODC, P357, DOI DOI 10.1145/1011767.1011820
[7]   GAnGS: Gather, Authenticate 'n Group Securely [J].
Chen, Chia-Hsin Owen ;
Chen, Chung-Wei ;
Kuo, Cynthia ;
Lai, Yan-Hao ;
McCune, Jonathan M. ;
Studer, Ahren ;
Perrig, Adrian ;
Yang, Bo-Yin ;
Wu, Tzong-Chen .
MOBICOM'08: PROCEEDINGS OF THE FOURTEENTH ACM INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND NETWORKING, 2008, :92-+
[8]  
Chignell M., 2003, P HUM FACT ERG SOC A, V47, DOI [10.1177/154193120304701102, DOI 10.1177/154193120304701102]
[9]  
De Cristofaro E., 2010, FINANCIAL CRYPTOGRAP
[10]  
Du W., 2001, P 2001 WORKSH NEW SE, P13, DOI 10.1145/508171.508174