SlideShare a Scribd company logo
Participatory Sensing through Social NetworksThe tension between Participation and PrivacyITWDC6-8 September, 2010I. Krontiris, Chair of Mobile BusinessGoethe University Frankfurtioannis.krontiris@m-chair.netF.C. Freiling, LehrstuhlPraktischeInformatik IUniversity of Mannheim
 Paper outlineWhat are the benefits and drawbacks of connecting social network with participatory sensing? We study this relation in 2 dimensions that conflict with each other:  Social translucence (visibility) and PrivacyGoal: Identify and discuss research challenges that arise in this new setting.
 Available Sensors Today
 Available Sensors Tomorrow
 External Sensors
NoiseTube
 Architecture Overview
 Research QuestionsShare – How will collected data be shared? What practices of individual ownership will be appropriate and how will privacy be addressed? How can data best be shared with non-experts, urban planers, decision and policy makers, etc.?Change – What tools or frameworks best invite and encourage active participation? What tools and techniques will facilitate the most productive debate and ultimate positive social benefit?
 Utilizing Social NetworksBenefit 1: Recruitment (getting people to join)identify and reach well-suited participants for data collections based on their geographic availability as well as their interests and habits.allow existing participants to invite their friends to join a group, or see what their friends are doing (which group they joined, in which groups they are most active), etc.
 Utilizing Social NetworksBenefit 2: Participation (getting people to participate)No direct benefits for participants. Why should those who can produce the sensing data take the time to engage in such interactions? Why should they wish to?Sense of CommunitySense of efficacy: a sense that they have had some effect on the group.
 Utilizing Social NetworksRecognitionReputation Pointsa user, after submitting a report from his mobile phone, is given a reputation point. reputation points are public and appear on the public profile of that user.
 Utilizing Social NetworksBenefit 3: Acting on the dataNot all data are equally useful / importantPeople could also intentionally submit fault data       Pre-evaluation by the usersExample: A system that allows users to submit images of potholes on the street
location privacy
 Privacy vs. VisibilityKnowing when a particular person was at a particular point in time can be used to infer a lot of personal informationAllow users to make their contributions visible to the online communityAnonymitySocial Translucence
 Research questionSystem model: Users submitting data are anonymous, but at the same time they maintain a public profile in the social network, where they provide details about themselves (e.g. reputation, etc.)Is it possible to offer anonymity to the user, who submits sensing data from the physical environment, while at the same time we maintain properties connected with his public profile, like Reputation andUser revocation?
\ AnonymityLet’s assume we provide anonymity to protect user’s privacyData are anonymizedHide network identifiers
 ReputationGiving reputation points to an anonymous user is not possibleNeed two independent processes:A pseudonymous user acquires reputation points (one-time pseudonym)A known user updates its reputation in his public profileSolution direction: Use e-cash systemsA pseudonymous user obtains e-coins from the bank for a report submission, which corresponds to a reputation pointAt a later point in time, the user logs-in using his public profile and redeems the e-coin to increase his reputation.Hard: Repetitions of this process should not be linkable!
 User revocationBefore submit, user authenticates anonymously to the service provider This encourages user misbehavior        need for user revocationRevocation depends on anonymous authentication mechanism:If use group signatures:  A Trusted-Third-Party manages user accounts and has the ability to revoke user’s anonymity at any time. No assurances that TTP is reliable!If use e-cash: Anonymity is revoked if spent an e-coin twiceIf use k-Times Anonymous Authentication: Anonymity is revoked if user authenticates more than k times. None of this appropriate. Need a d-strikes-out revocation systemWhen users are judged to have misbehaved d times, they are revoked by the systemSome protocols exist, but very expensive for power-limited mobile phones
 ConclusionsUtilization of social networks could provide many benefits in urban sensingrecruit more citizens in campaigns and boost their active participation. Example: use of reputation systemsIt is also important to preserve the anonymity of the users submitting dataAnonymity makes it hard to revoke misbehaving users or compute their accumulated reputation pointsAcknowledgment: Thanks to Nicolas Maisonneuve for the inspiring conversations

More Related Content

PPT
Analytics for Virtual Worlds
PDF
Social Interaction and the Power of Mobility Estimation (2013)
PPTX
Researching Social Media – Big Data and Social Media Analysis
PPT
Adaptive Design implications for Knowledge Organization and Information Retri...
PPT
Footprints: History-Rich Tools for Information Foraging (Wexelblat & Maes, 1999)
PPT
Open Social Networking
 
PAGES
Usability Review of Mashup Tools
PDF
Stanford Info Seminar: Unfollowing and Emotion on Twitter
 
Analytics for Virtual Worlds
Social Interaction and the Power of Mobility Estimation (2013)
Researching Social Media – Big Data and Social Media Analysis
Adaptive Design implications for Knowledge Organization and Information Retri...
Footprints: History-Rich Tools for Information Foraging (Wexelblat & Maes, 1999)
Open Social Networking
 
Usability Review of Mashup Tools
Stanford Info Seminar: Unfollowing and Emotion on Twitter
 

What's hot (20)

PPT
Microsoft Research Cambridge 20071207 Workshop On Online Social Networks (T...
PDF
Social Networks and Social Capital
PDF
Social network websites: best practices from leading services
PDF
Ucs813 syllabus
PPTX
The Credibility of Digital Identity Information on the Social Web: A User Study
PPTX
Multiparty Access Control For Online Social Networks : Model and Mechanisms.
PPT
INFO4990_Hossain
PPTX
Selfie Deaths (KillFies) and Distracted Driving: Social Computing, Machine L...
PPT
Dan Trottier
PPT
Ass a koene_ca_sma
DOC
Seminar Report Mine
PPTX
Candidates' Communication patterns on Twitter
PPT
Social Network Analysis (SNA) and its implications for knowledge discovery in...
PPTX
Cl15 a koene_ca_sma
PDF
Unfollowing on twitter
 
PPTX
Donate Mate App In HackathonBd 2012
PDF
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
PPTX
2013 NodeXL Social Media Network Analysis
PDF
RESOLVING MULTI-PARTY PRIVACY CONFLICTS IN SOCIAL MEDIA
PPTX
FAKE NEWS DETECTION PPT
Microsoft Research Cambridge 20071207 Workshop On Online Social Networks (T...
Social Networks and Social Capital
Social network websites: best practices from leading services
Ucs813 syllabus
The Credibility of Digital Identity Information on the Social Web: A User Study
Multiparty Access Control For Online Social Networks : Model and Mechanisms.
INFO4990_Hossain
Selfie Deaths (KillFies) and Distracted Driving: Social Computing, Machine L...
Dan Trottier
Ass a koene_ca_sma
Seminar Report Mine
Candidates' Communication patterns on Twitter
Social Network Analysis (SNA) and its implications for knowledge discovery in...
Cl15 a koene_ca_sma
Unfollowing on twitter
 
Donate Mate App In HackathonBd 2012
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
2013 NodeXL Social Media Network Analysis
RESOLVING MULTI-PARTY PRIVACY CONFLICTS IN SOCIAL MEDIA
FAKE NEWS DETECTION PPT
Ad

Viewers also liked (8)

PPTX
Sensing City Potential through Social Data @ ICMU2014 Panel
PPTX
Gamification-based Incentive Mechanism for Participatory Sensing
PPT
Sensing Mobile Devices talk from QCon London 2013
PPTX
Scg skyfollow social media sensing for skydeck part2
PDF
Privacy-respecting Auctions as Incentive Mechanisms in Mobile Crowd Sensing
PDF
On Crowd-sensing back-end
PDF
141060753008 vrajesh parikh_slides
PDF
User privacy and data trustworthiness in mobile crowd sensing
Sensing City Potential through Social Data @ ICMU2014 Panel
Gamification-based Incentive Mechanism for Participatory Sensing
Sensing Mobile Devices talk from QCon London 2013
Scg skyfollow social media sensing for skydeck part2
Privacy-respecting Auctions as Incentive Mechanisms in Mobile Crowd Sensing
On Crowd-sensing back-end
141060753008 vrajesh parikh_slides
User privacy and data trustworthiness in mobile crowd sensing
Ad

Similar to Participatory Sensing through Social Networks: The Tension between Participation and Privacy (20)

PPT
Data protection and social networks
PDF
Social network privacy guide
PPT
Jessica Vitak, "When Contexts Collapse: Managing Self-Presentation Across Soc...
PDF
How Important Social Graphs are for DTN Routing
PDF
Social network privacy.
PDF
Nethood Tlabs09 Berlin
DOCX
Social networks
PDF
Enhancement of Privacy and User Interaction in a Social Network with the Aid ...
PDF
Simulating online privacy. Ethno-computational insights
ODP
Web2.0.2012 - lesson 9 - social networks
PDF
Book
PDF
Social network privacy
PDF
Social network privacy.
PPTX
Niche online social networks
PDF
Social Networking Websites and Image Privacy
PDF
Detecting and Resolving Privacy Conflicts in Online Social Networks
PDF
The Social Context of Online Research
PPTX
social network
PDF
LSS'09 Keynote Making Sense Of The Networked Audience, Dr B Hogan
PPT
Facebook and twitter
Data protection and social networks
Social network privacy guide
Jessica Vitak, "When Contexts Collapse: Managing Self-Presentation Across Soc...
How Important Social Graphs are for DTN Routing
Social network privacy.
Nethood Tlabs09 Berlin
Social networks
Enhancement of Privacy and User Interaction in a Social Network with the Aid ...
Simulating online privacy. Ethno-computational insights
Web2.0.2012 - lesson 9 - social networks
Book
Social network privacy
Social network privacy.
Niche online social networks
Social Networking Websites and Image Privacy
Detecting and Resolving Privacy Conflicts in Online Social Networks
The Social Context of Online Research
social network
LSS'09 Keynote Making Sense Of The Networked Audience, Dr B Hogan
Facebook and twitter

Recently uploaded (20)

PDF
August Patch Tuesday
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
Zenith AI: Advanced Artificial Intelligence
PPTX
Benefits of Physical activity for teenagers.pptx
PDF
Architecture types and enterprise applications.pdf
PDF
A novel scalable deep ensemble learning framework for big data classification...
PDF
STKI Israel Market Study 2025 version august
PPTX
Tartificialntelligence_presentation.pptx
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PDF
Unlock new opportunities with location data.pdf
DOCX
search engine optimization ppt fir known well about this
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
August Patch Tuesday
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Getting started with AI Agents and Multi-Agent Systems
Zenith AI: Advanced Artificial Intelligence
Benefits of Physical activity for teenagers.pptx
Architecture types and enterprise applications.pdf
A novel scalable deep ensemble learning framework for big data classification...
STKI Israel Market Study 2025 version august
Tartificialntelligence_presentation.pptx
Univ-Connecticut-ChatGPT-Presentaion.pdf
1 - Historical Antecedents, Social Consideration.pdf
Hindi spoken digit analysis for native and non-native speakers
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
sustainability-14-14877-v2.pddhzftheheeeee
Unlock new opportunities with location data.pdf
search engine optimization ppt fir known well about this
Group 1 Presentation -Planning and Decision Making .pptx
From MVP to Full-Scale Product A Startup’s Software Journey.pdf

Participatory Sensing through Social Networks: The Tension between Participation and Privacy

  • 1. Participatory Sensing through Social NetworksThe tension between Participation and PrivacyITWDC6-8 September, 2010I. Krontiris, Chair of Mobile BusinessGoethe University Frankfurtioannis.krontiris@m-chair.netF.C. Freiling, LehrstuhlPraktischeInformatik IUniversity of Mannheim
  • 2. Paper outlineWhat are the benefits and drawbacks of connecting social network with participatory sensing? We study this relation in 2 dimensions that conflict with each other:  Social translucence (visibility) and PrivacyGoal: Identify and discuss research challenges that arise in this new setting.
  • 8. Research QuestionsShare – How will collected data be shared? What practices of individual ownership will be appropriate and how will privacy be addressed? How can data best be shared with non-experts, urban planers, decision and policy makers, etc.?Change – What tools or frameworks best invite and encourage active participation? What tools and techniques will facilitate the most productive debate and ultimate positive social benefit?
  • 9. Utilizing Social NetworksBenefit 1: Recruitment (getting people to join)identify and reach well-suited participants for data collections based on their geographic availability as well as their interests and habits.allow existing participants to invite their friends to join a group, or see what their friends are doing (which group they joined, in which groups they are most active), etc.
  • 10. Utilizing Social NetworksBenefit 2: Participation (getting people to participate)No direct benefits for participants. Why should those who can produce the sensing data take the time to engage in such interactions? Why should they wish to?Sense of CommunitySense of efficacy: a sense that they have had some effect on the group.
  • 11. Utilizing Social NetworksRecognitionReputation Pointsa user, after submitting a report from his mobile phone, is given a reputation point. reputation points are public and appear on the public profile of that user.
  • 12. Utilizing Social NetworksBenefit 3: Acting on the dataNot all data are equally useful / importantPeople could also intentionally submit fault data Pre-evaluation by the usersExample: A system that allows users to submit images of potholes on the street
  • 14. Privacy vs. VisibilityKnowing when a particular person was at a particular point in time can be used to infer a lot of personal informationAllow users to make their contributions visible to the online communityAnonymitySocial Translucence
  • 15. Research questionSystem model: Users submitting data are anonymous, but at the same time they maintain a public profile in the social network, where they provide details about themselves (e.g. reputation, etc.)Is it possible to offer anonymity to the user, who submits sensing data from the physical environment, while at the same time we maintain properties connected with his public profile, like Reputation andUser revocation?
  • 16. \ AnonymityLet’s assume we provide anonymity to protect user’s privacyData are anonymizedHide network identifiers
  • 17. ReputationGiving reputation points to an anonymous user is not possibleNeed two independent processes:A pseudonymous user acquires reputation points (one-time pseudonym)A known user updates its reputation in his public profileSolution direction: Use e-cash systemsA pseudonymous user obtains e-coins from the bank for a report submission, which corresponds to a reputation pointAt a later point in time, the user logs-in using his public profile and redeems the e-coin to increase his reputation.Hard: Repetitions of this process should not be linkable!
  • 18. User revocationBefore submit, user authenticates anonymously to the service provider This encourages user misbehavior need for user revocationRevocation depends on anonymous authentication mechanism:If use group signatures: A Trusted-Third-Party manages user accounts and has the ability to revoke user’s anonymity at any time. No assurances that TTP is reliable!If use e-cash: Anonymity is revoked if spent an e-coin twiceIf use k-Times Anonymous Authentication: Anonymity is revoked if user authenticates more than k times. None of this appropriate. Need a d-strikes-out revocation systemWhen users are judged to have misbehaved d times, they are revoked by the systemSome protocols exist, but very expensive for power-limited mobile phones
  • 19. ConclusionsUtilization of social networks could provide many benefits in urban sensingrecruit more citizens in campaigns and boost their active participation. Example: use of reputation systemsIt is also important to preserve the anonymity of the users submitting dataAnonymity makes it hard to revoke misbehaving users or compute their accumulated reputation pointsAcknowledgment: Thanks to Nicolas Maisonneuve for the inspiring conversations