{"title":"Backward Thinking of Routing with High Uncertainties: Causal Entropy Based Routing in Multi-Agent Networks","authors":"Zhonghu Xu, Kai Xing, Xuefeng Liu, Jiannong Cao","doi":"10.1109/PAC.2018.00021","DOIUrl":"https://doi.org/10.1109/PAC.2018.00021","url":null,"abstract":"This paper is motivated by the task of modeling routing decisions with sequential forwarding interactions in multi-agent networks with topology uncertainties, e.g., agents' mobility traces with uncertain speed and direction, links to someone unknown in stranger social networks, both making their interactions come across at uncertain time and location. Since most routing designs assume that agents' behaviors be regular or with known probability distribution and envision the future of topology as stable/predictable (namely limited uncertainty), these approaches may suffer the difficulty dealing with the networks with high uncertainties. The proposed research aims to provide an effective solution for message routing among agents in such networks. Specifically, we introduce a new principle of causal entropy force in multi-agent networks for routing with high uncertainties, provide a new thinking way of routing, backward thinking, and build connections between individual intelligence, topology uncertainties, and message routing through path entropy in phase space. The experiment results with real dataset (30K taxies) indicate that the proposed method could achieve 83% message delivery rate, compared with 20%-25% of traditional approaches, and generally achieve much less latency compared with typical methods.","PeriodicalId":208309,"journal":{"name":"2018 IEEE Symposium on Privacy-Aware Computing (PAC)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121332602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Privacy-Preserving POI Recommendation Using Nonnegative Matrix Factorization","authors":"Xiwei Wang, Hao Yang, Kiho Lim","doi":"10.1109/PAC.2018.00018","DOIUrl":"https://doi.org/10.1109/PAC.2018.00018","url":null,"abstract":"Location based social networks (LBSNs) have become an essential part of life for many smartphone users. With the sheer volume of new information in LBSNs produced every day, people can easily feel overwhelmed when deciding which places to visit, e.g., restaurants, grocery stores, bars. Point-of-interest (POI) recommender systems are there to help people find their favorite places. To make recommendations, the system needs to learn users' preference, which usually requires their check-in data. This can potentially deter people from using the system because personal location and check-in data are considered as users' privacy and many do not feel comfortable sharing the information with other parties. In this paper, we propose a nonnegative matrix factorization (NMF) based privacy-preserving POI recommendation framework, in which the latent factors in NMF are learned on user group preference instead of individual user preference. Recommendations are made by personalizing the group preference on user's local devices. There are no location or check-in data collected from the users anywhere throughout the learning and recommendation processes.","PeriodicalId":208309,"journal":{"name":"2018 IEEE Symposium on Privacy-Aware Computing (PAC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128984133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Privacy, Polarization, and Passage of Divisive Laws","authors":"Benjamin Johnson, Paul Laskowski","doi":"10.1109/PAC.2018.00007","DOIUrl":"https://doi.org/10.1109/PAC.2018.00007","url":null,"abstract":"Notions of privacy are particularly salient to marginalized groups of people, especially when they find themselves disproportionately affected by the enforcement of laws. We use game theoretic modeling to explore the connections between privacy, polarization, and the divisiveness of laws. Our framework is based on a population of citizens that may be more or less polarized. A law is defined in terms of its effect on each citizen and must gain support from a majority in order to pass. We define a notion of divisiveness which allows us to measure the extent to which a law disproportionately affects different groups of citizens. Our framework allows us to explore four distinct notions of privacy, two that result from technological measures and two that emerge from legal theory. We find that privacy can prevent the passage of certain divisive laws, but the effects depend strongly on which type of privacy is in use.","PeriodicalId":208309,"journal":{"name":"2018 IEEE Symposium on Privacy-Aware Computing (PAC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126741009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Harsimran Singh, Shamik Sarkar, Anuj Dimri, Aditya Bhaskara, Neal Patwari, S. Kasera, Samuel Ramirez, K. Derr
{"title":"Privacy Enabled Crowdsourced Transmitter Localization Using Adjusted Measurements","authors":"Harsimran Singh, Shamik Sarkar, Anuj Dimri, Aditya Bhaskara, Neal Patwari, S. Kasera, Samuel Ramirez, K. Derr","doi":"10.1109/PAC.2018.00016","DOIUrl":"https://doi.org/10.1109/PAC.2018.00016","url":null,"abstract":"We address the problem of location privacy in the context of crowdsourced localization of spectrum offenders where participating receivers report received signal strength (RSS) measurements and their location to a central controller. We present a novel approach, that we call the adjusted measurement approach, in which we generate pseudo-locations for participating receivers and report these pseudo-locations along with adjusted RSS measurements as if the measurements were made at the pseudo-locations. The RSS values are adjusted by representing those as a weighted linear combination of the RSS values at the receivers, where receivers closer to the false location have a higher weight than those far away. We use two RSS datasets, one from a cluttered office (indoor) and another from roadways in Phoenix, Arizona (outdoor) to evaluate our approach. We compare the localization error of our approach with that of the naive approach that simply adds noise to locations. Our results demonstrate that location privacy can be preserved without a significant increase in the localization error. We also formulate an adversary attack that attempts to solve the inverse problem of determining the true locations of the receivers from their false locations. Our evaluations show that the adversary does no better than random guessing of true locations in the monitored area.","PeriodicalId":208309,"journal":{"name":"2018 IEEE Symposium on Privacy-Aware Computing (PAC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128411644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Privacy-Preserving Data Collection in Context-Aware Applications","authors":"Wei Li, Chun-qiang Hu, Tianyi Song, Jiguo Yu, Xiaoshuang Xing, Zhipeng Cai","doi":"10.1109/PAC.2018.00014","DOIUrl":"https://doi.org/10.1109/PAC.2018.00014","url":null,"abstract":"Thanks to the development and popularity of context-aware applications, the quality of users' life has been improved through a wide variety of customized services. Meanwhile, users are suffering severe risk of privacy leakage and their privacy concerns are growing over time. To tackle the contradiction between the serious privacy issues and the growing privacy concerns in context-aware applications, in this paper, we propose a privacy-preserving data collection scheme by incorporating the complicated interactions among user, attacker, and service provider into a three-antithetic-party game. Under such a novel game model, we identify and rigorously prove the best strategies of the three parties and the equilibriums of the games. Furthermore, we evaluate the performance of our proposed data collection game by performing extensive numerical experiments, confirming that the user's data privacy can be effective preserved.","PeriodicalId":208309,"journal":{"name":"2018 IEEE Symposium on Privacy-Aware Computing (PAC)","volume":"171 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132360448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Epsilon Voting: Mechanism Design for Parameter Selection in Differential Privacy","authors":"Nitin Kohli, Paul Laskowski","doi":"10.1109/PAC.2018.00009","DOIUrl":"https://doi.org/10.1109/PAC.2018.00009","url":null,"abstract":"The behavior of a differentially private system is governed by a parameter epsilon which sets a balance between protecting the privacy of individuals and returning accurate results. While a system owner may use a number of heuristics to select epsilon, existing techniques may be unresponsive to the needs of the users who's data is at risk. A promising alternative is to allow users to express their preferences for epsilon. In a system we call epsilon voting, users report the parameter values they want to a chooser mechanism, which aggregates them into a single value. We apply techniques from mechanism design to ask whether such a chooser mechanism can itself be truthful, private, anonymous, and also responsive to users. Without imposing restrictions on user preferences, the only feasible mechanisms belong to a class we call randomized dictatorships with phantoms. This is a restrictive class in which at most one user has any effect on the chosen epsilon. On the other hand, when users exhibit single-peaked preferences, a broader class of mechanisms - ones that generalize the median and other order statistics - becomes possible.","PeriodicalId":208309,"journal":{"name":"2018 IEEE Symposium on Privacy-Aware Computing (PAC)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122298435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Reputation Management Framework for MANETs","authors":"Shiwen Wang, Hui Xia","doi":"10.1109/PAC.2018.00019","DOIUrl":"https://doi.org/10.1109/PAC.2018.00019","url":null,"abstract":"Resistance to malicious attacks and assessment of the trust value of nodes are important aspects of trusted mobile ad hoc networks (MANETs), and it is therefore necessary to establish an effective reputation management system. Previous studies have relied on the direct monitoring of nodes, recommendations from neighbors or a combination of these two methods to calculate a reputation value. However, these models can neither collect trust information effectively, nor cooperate to resist an attack, instead increasing the network load. To solve these problems, this paper proposes a novel reputation management framework that collects trust information and calculates the reputation value of nodes by selecting special nodes as management nodes. This framework can effectively identify malicious information and improve the credibility of a reputation value.","PeriodicalId":208309,"journal":{"name":"2018 IEEE Symposium on Privacy-Aware Computing (PAC)","volume":"109 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117316460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"BigBing: Privacy-Preserving Cloud-Based Malware Classification Service","authors":"Y. Kucuk, Nikhil Patil, Zhan Shu, Guanhua Yan","doi":"10.1109/PAC.2018.00011","DOIUrl":"https://doi.org/10.1109/PAC.2018.00011","url":null,"abstract":"Although cloud-based malware defense services have made significant contributions to thwarting malware attacks, there have been privacy concern over using these services to analyze suspicious files which may contain user-sensitive data. We develop a new platform called BigBing (a big data approach to binary code genomics) to offer a privacy-preserving cloud-based malware classification service. BigBing relies on a community of contributors who would like to share their binary executables, and uses a novel blockchain-based scheme to ensure the privacy of possibly user-sensitive data contained within these files. To scale up malware defense services, BigBing trains user-specific classification models to detect malware attacks seen in their environments. We have implemented a prototype of BigBing, comprised of a big data cluster, a pool of servers for feature extraction, and a frontend gateway that facilitates the interaction between users and the BigBing backend. Using a real-world malware dataset, we evaluate both execution and classification performances of the service offered by BigBing. Our experimental results demonstrate that BigBing offers a useful privacy-preserving cloud-based malware classification service to fight against the ever-growing malware attacks.","PeriodicalId":208309,"journal":{"name":"2018 IEEE Symposium on Privacy-Aware Computing (PAC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126838066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}