Skip to main content

Managing Privacy in the Internet of Things: DocCloud, a Use Case

  • Chapter
  • First Online:
Book cover Advanced Research in Data Privacy

Part of the book series: Studies in Computational Intelligence ((SCI,volume 567))

Abstract

In this chapter, we describe nodes in the Internet of Things can configure themselves automatically and offer personalized services to the users while protecting their privacy. We will show how privacy protection can be achieved by means of a use case. We describe DocCloud, a recommender system where users get content recommended by other users based on their personal affinities. To do this, their things connect together based on the affinities of their owners, creating a social network of similar things, and then provide the recommender system on top of this network. We present the architecture of DocCloud and analyze the security mechanisms that the system includes. Specifically, we study the properties of plausible deniability and anonymity of the recommenders and intermediate nodes. In this way, nodes can recommend products to the customers while deny any knowledge about the product they are recommending or their participation in the recommendation process.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Vera-del-Campo, J., Hernández-Serrano, J., Pegueroles, J., Soriano, M.: Design of a p2p content recommendation system using affinity networks. Comput. Commun. 36(1), 90–104 (2012)

    Article  Google Scholar 

  2. Euster, P., Guerraoui, R., Kermarrec, A.M., Maussoulie, L.: From epidemics to distributed computing. IEEE Comput. 37(5), 60–67 (2004)

    Article  Google Scholar 

  3. Schifanella, R., Panisson, A., Gena, C., Ruffo, G.: Mobhinter: epidemic collaborative filtering and self-organization in mobile ad-hoc networks. In: ACM Conference on Recommender Systems pp. 27–34. ACM, New York (2008)

    Google Scholar 

  4. Hernández-Serrano, J., Vera-del-Campo, J., Pegueroles, J., Gañán, C.: Low-cost group rekeying for unattended wireless sensor networks. Wireless Netw. 19(2), 1–21 (2012)

    Google Scholar 

  5. Pouwelse, J., Yang, J., Meulpolder, M., Epema, D., Sips, H.: Buddycast: An operational peer-to-peer epidemoc protocol stack. In: 14th Annual Conference of the Advanced School for Computing and Imaging (2008)

    Google Scholar 

  6. Anglade, A., Tiemann, M., Vignoli, F.: Complex-network theoretic clustering for identifying groups of similar listeners in p2p systems. In: RecSys ’07: Proceedings of the ACM Conference on Recommender Systems pp. 41–48. ACM, New York (2007)

    Google Scholar 

  7. Vera-del-Campo, J., Hernández-Serrano, J., Pegueroles, J.: Profile-based searches on p2p social networks. In: The Ninth International Conference on Networks, ICN. (2010)

    Google Scholar 

  8. Gentry, C., Ramzan, Z.: Single-database private information retrieval with constant communication rate. In: Automata, Languages and Programming. Lecture Notes in Computer Science, vol. 3580/2005, pp. 803–815. Springer, Berlin Heidelberg (2005)

    Google Scholar 

  9. Vera-del-Campo, J., Hernández-Serrano, J., Pegueroles, J.: Scfs: Design and implementation of a secure distributed filesystem. SECRYPT. (2008)

    Google Scholar 

  10. Manning, C.D., Raghadan, P., Schütze, H.: An Introduction to Information Retrieval. Cambridge University Press, Cambridge (2009)

    Google Scholar 

  11. Achlioptas, D.: Database-friendly random projections: Johnson-lindenstrauss with binary coins. J. Comput. Syst. Sci. 66(4), 671–687 (2003)

    Google Scholar 

  12. Liu, K., Kargupta, H., Ryan, J.: Random projection-based multiplicative data perturbation for privacy preserving distributed data mining. IEEE Trans. Knowl. Data Eng. 18(1), 92–106 (2006) (Senior Member-Kargupta, Hillol)

    Google Scholar 

  13. Vera-del-Campo, J., Hernández-Serrano, J., Pegueroles, J., Soriano, M.: Doccloud: a document recommender system on cloud computing with plausible deniability. Inform. Sci. 258, 387–402 (2014)

    Article  Google Scholar 

  14. del Campo, J.V.: In: Semantic overlay networks for P2P systems. Ph.D. Dissertation, Universitat Politecnica de Catalunya (2012)

    Google Scholar 

  15. Jaynes, E.T.: Probability Theory: The Logic of Science: Principles and Elementary Applications. Cambridge University Press, Cambridge (2003)

    Google Scholar 

  16. Ostrovsky, R., Skeith, I.W.E.: A survey of single-database private information retrieval: techniques and applications. In: Proceedings of the 10th International Conference on Practice and Theory in Public-Key Cryptography PKC’07, pp. 393–411. Springer-Verlag, Berlin, Heidelberg (2007)

    Google Scholar 

  17. Vera-del Campo, J., González-Muro, A., Soriano, M.: Private Audio Streaming for an Automated Phone Assistance System. In: Sixth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Juan Vera del Campo .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this chapter

Cite this chapter

del Campo, J.V., Pegueroles, J., Hernández Serrano, J., Soriano, M. (2015). Managing Privacy in the Internet of Things: DocCloud, a Use Case. In: Navarro-Arribas, G., Torra, V. (eds) Advanced Research in Data Privacy. Studies in Computational Intelligence, vol 567. Springer, Cham. https://doi.org/10.1007/978-3-319-09885-2_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-09885-2_24

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-09884-5

  • Online ISBN: 978-3-319-09885-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics