{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T18:53:13Z","timestamp":1742928793572,"version":"3.40.3"},"publisher-location":"Cham","reference-count":47,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030992026"},{"type":"electronic","value":"9783030992033"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-99203-3_2","type":"book-chapter","created":{"date-parts":[[2022,3,23]],"date-time":"2022-03-23T16:06:49Z","timestamp":1648051609000},"page":"19-41","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Privacy-Preserving Sharing of\u00a0Mobile Sensor Data"],"prefix":"10.1007","author":[{"given":"Yin","family":"Liu","sequence":"first","affiliation":[]},{"given":"Breno Dantas","family":"Cruz","sequence":"additional","affiliation":[]},{"given":"Eli","family":"Tilevich","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,3,24]]},"reference":[{"key":"2_CR1","unstructured":"CVE-2016-6540 (2016). https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2016-6540"},{"issue":"2","key":"2_CR2","doi-asserted-by":"publisher","first-page":"442","DOI":"10.1257\/jel.54.2.442","volume":"54","author":"A Acquisti","year":"2016","unstructured":"Acquisti, A., Taylor, C., Wagman, L.: The economics of privacy. J. Econ. Lit. 54(2), 442\u201392 (2016)","journal-title":"J. Econ. Lit."},{"key":"2_CR3","doi-asserted-by":"crossref","unstructured":"Almuhimedi, H., et al.: Your location has been shared 5,398 times! a field study on mobile app privacy nudging. In: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, pp. 787\u2013796 (2015)","DOI":"10.1145\/2702123.2702210"},{"key":"2_CR4","unstructured":"Anderson, C., Andersson, M.P.: Long tail (2004)"},{"key":"2_CR5","unstructured":"Apple Inc.: App groups entitlement (2017). https:\/\/developer.apple.com\/documentation\/bundleresources\/entitlements\/com_apple_security_application-groups"},{"key":"2_CR6","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/978-3-642-30436-1_2","volume-title":"Information Security and Privacy Research","author":"A Armando","year":"2012","unstructured":"Armando, A., Merlo, A., Migliardi, M., Verderame, L.: Would you mind forking this process? A denial of service attack on android (and some countermeasures). In: Gritzalis, D., Furnell, S., Theoharidou, M. (eds.) SEC 2012. IAICT, vol. 376, pp. 13\u201324. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-30436-1_2"},{"key":"2_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1007\/978-3-642-38980-1_27","volume-title":"Applied Cryptography and Network Security","author":"N Asokan","year":"2013","unstructured":"Asokan, N., et al.: CrowdShare: secure mobile resource sharing. In: Jacobson, M., Locasto, M., Mohassel, P., Safavi-Naini, R. (eds.) ACNS 2013. LNCS, vol. 7954, pp. 432\u2013440. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-38980-1_27"},{"key":"2_CR8","doi-asserted-by":"crossref","unstructured":"Binns, R., Lyngs, U., Van Kleek, M., Zhao, J., Libert, T., Shadbolt, N.: Third party tracking in the mobile ecosystem. In: Proceedings of the 10th ACM Conference on Web Science, pp. 23\u201331 (2018)","DOI":"10.1145\/3201064.3201089"},{"issue":"1","key":"2_CR9","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/s001459910006","volume":"13","author":"R Canetti","year":"2000","unstructured":"Canetti, R.: Security and composition of multiparty cryptographic protocols. J. Cryptol. 13(1), 143\u2013202 (2000)","journal-title":"J. Cryptol."},{"key":"2_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-79228-4_1","volume-title":"Theory and Applications of Models of Computation","author":"C Dwork","year":"2008","unstructured":"Dwork, C.: Differential privacy: a survey of results. In: Agrawal, M., Du, D., Duan, Z., Li, A. (eds.) TAMC 2008. LNCS, vol. 4978, pp. 1\u201319. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-79228-4_1"},{"key":"2_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/11681878_14","volume-title":"Theory of Cryptography","author":"C Dwork","year":"2006","unstructured":"Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 265\u2013284. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11681878_14"},{"key":"2_CR12","unstructured":"Gaboardi, M., Honaker, J., King, G., Nissim, K., Ullman, J., Vadhan, S.: PSI: a private data sharing interface. arXiv:1609.04340 (2016)"},{"key":"2_CR13","unstructured":"GlobalPlatform: GlobalPlatform, TEE system architecture, technical report (2011). www.globalplatform.org\/specificationsdevice.asp"},{"key":"2_CR14","unstructured":"Google: Android studio - select the minimum API level (2018). https:\/\/developer.android.com\/studio\/projects\/create-project"},{"key":"2_CR15","unstructured":"Google: Distribution dashboard (2018). https:\/\/developer.android.com\/about\/dashboards"},{"key":"2_CR16","unstructured":"Google: Connect to the network (2019). https:\/\/developer.android.com\/training\/basics\/network-ops\/connecting"},{"key":"2_CR17","unstructured":"Google Play Store: Noroot firewall (2019). https:\/\/play.google.com\/store\/apps\/details?id=app.greyshirts.firewall&hl=en"},{"key":"2_CR18","unstructured":"Han, S., Philipose, M.: The case for onloading continuous high-datarate perception to the phone. In: Presented as Part of the 14th Workshop on Hot Topics in Operating Systems (2013)"},{"key":"2_CR19","unstructured":"Hendrycks, D., Mazeika, M., Dietterich, T.G.: Deep anomaly detection with outlier exposure. arXiv preprint arXiv:1812.04606 (2018)"},{"key":"2_CR20","doi-asserted-by":"crossref","unstructured":"Huberman, B.A., Franklin, M., Hogg, T.: Enhancing privacy and trust in electronic communities. In: Proceedings of the 1st ACM Conference on Electronic Commerce, pp. 78\u201386. ACM (1999)","DOI":"10.1145\/336992.337012"},{"key":"2_CR21","unstructured":"IDC: Smartphone OS market share (2017). https:\/\/www.idc.com\/promo\/smartphone-market-share\/os"},{"issue":"4","key":"2_CR22","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1515\/popets-2017-0044","volume":"2017","author":"\u00c1 Kiss","year":"2017","unstructured":"Kiss, \u00c1., Liu, J., Schneider, T., Asokan, N., Pinkas, B.: Private set intersection for unequal set sizes with mobile applications. Proc. Priv. Enhancing Technol. 2017(4), 177\u2013197 (2017)","journal-title":"Proc. Priv. Enhancing Technol."},{"key":"2_CR23","unstructured":"KQED Science: Scientists looked at DNA supposedly from a Yeti and here\u2019s what they found, December 2017. https:\/\/goo.gl\/uDvypP"},{"key":"2_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1007\/978-3-642-24861-0_22","volume-title":"Information Security","author":"J Lee","year":"2011","unstructured":"Lee, J., Clifton, C.: How much is enough? Choosing $$\\varepsilon $$ for differential privacy. In: Lai, X., Zhou, J., Li, H. (eds.) ISC 2011. LNCS, vol. 7001, pp. 325\u2013340. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-24861-0_22"},{"key":"2_CR25","unstructured":"Malkhi, D., Nisan, N., Pinkas, B., Sella, Y., et al.: Fairplay-secure two-party computation system. In: USENIX Security Symposium (2004)"},{"key":"2_CR26","doi-asserted-by":"crossref","unstructured":"McGillion, B., Dettenborn, T., Nyman, T., Asokan, N.: Open-TEE-an open virtual trusted execution environment. In: 2015 IEEE Trustcom\/BigDataSE\/ISPA, vol. 1, pp. 400\u2013407. IEEE (2015)","DOI":"10.1109\/Trustcom.2015.400"},{"key":"2_CR27","doi-asserted-by":"crossref","unstructured":"McSherry, F.D.: Privacy integrated queries: an extensible platform for privacy-preserving data analysis. In: Proceedings of the 2009 ACM SIGMOD International Conference on Management of Data, pp. 19\u201330. ACM (2009)","DOI":"10.1145\/1559845.1559850"},{"key":"2_CR28","doi-asserted-by":"crossref","unstructured":"Miller, A., Hicks, M., Katz, J., Shi, E.: Authenticated data structures, generically. In: ACM SIGPLAN Notices, vol. 49, pp. 411\u2013423. ACM (2014)","DOI":"10.1145\/2578855.2535851"},{"key":"2_CR29","doi-asserted-by":"crossref","unstructured":"Miller, R.B.: Response time in man-computer conversational transactions. In: Proceedings of the December 9\u201311, 1968, Fall Joint Computer Conference, Part I, pp. 267\u2013277. ACM (1968)","DOI":"10.1145\/1476589.1476628"},{"key":"2_CR30","unstructured":"Minitab: Proceed with the analysis if the sample is large enough (2020). https:\/\/support.minitab.com\/en-us\/minitab\/19\/help-and-how-to\/statistics\/basic-statistics\/supporting-topics\/normality\/what-to-do-with-nonnormal-data\/"},{"key":"2_CR31","unstructured":"MOCACARE: Blood pressure monitor (2020). https:\/\/www.mocacare.com\/mocacuff\/"},{"key":"2_CR32","doi-asserted-by":"crossref","unstructured":"Mohan, P., Thakurta, A., Shi, E., Song, D., Culler, D.: GUPT: privacy preserving data analysis made easy. In: Proceedings of the 2012 ACM SIGMOD International Conference on Management of Data, pp. 349\u2013360. ACM (2012)","DOI":"10.1145\/2213836.2213876"},{"key":"2_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"458","DOI":"10.1007\/11745853_30","volume-title":"Public Key Cryptography - PKC 2006","author":"P Mohassel","year":"2006","unstructured":"Mohassel, P., Franklin, M.: Efficiency tradeoffs for malicious two-party computation. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.) PKC 2006. LNCS, vol. 3958, pp. 458\u2013473. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11745853_30"},{"key":"2_CR34","unstructured":"Nguyen, N.: A lot of apps sell your data. here\u2019s what you can do about it (2018). https:\/\/www.buzzfeednews.com\/article\/nicolenguyen\/how-apps-take-your-data-and-sell-it-without-you-even"},{"key":"2_CR35","unstructured":"Omron: Omron wearable blood pressure monitor (2020). https:\/\/omronhealthcare.com\/products\/heartguide-wearable-blood-pressure-monitor-bp8000m\/"},{"key":"2_CR36","unstructured":"O\u2019Sullivan, D.: Cloud leak: how a Verizon partner exposed millions of customer accounts (2017). https:\/\/www.upguard.com\/breaches\/verizon-cloud-leak"},{"key":"2_CR37","doi-asserted-by":"crossref","unstructured":"Pang, G., Cao, L., Chen, L., Liu, H.: Unsupervised feature selection for outlier detection by modelling hierarchical value-feature couplings. In: 2016 IEEE 16th International Conference on Data Mining (ICDM), pp. 410\u2013419. IEEE (2016)","DOI":"10.1109\/ICDM.2016.0052"},{"key":"2_CR38","unstructured":"Paverd, A., Martin, A., Brown, I.: Modelling and automatically analysing privacy properties for honest-but-curious adversaries. Technical report (2014)"},{"key":"2_CR39","unstructured":"Roy, I., Setty, S.T.V., Kilzer, A., Shmatikov, V., Witchel, E.: Airavat: security and privacy for MapReduce. In: Proceedings of the 7th USENIX Conference on Networked Systems Design and Implementation, NSDI 2010, p. 20. USENIX Association, Berkeley (2010). http:\/\/dl.acm.org\/citation.cfm?id=1855711.1855731"},{"key":"2_CR40","unstructured":"Singer, N.: New data rules could empower patients but undermine their privacy (2020). https:\/\/www.nytimes.com\/2020\/03\/09\/technology\/medical-app-patients-data-privacy.html"},{"key":"2_CR41","unstructured":"Statt, N.: Some major android apps are still sending data directly to Facebook (2019). https:\/\/www.theverge.com\/2019\/3\/5\/18252397\/facebook-android-apps-sending-data-user-privacy-developer-tools-violation"},{"key":"2_CR42","unstructured":"F. Marketing Team: How much money can you earn with an app in 2019 (2019). https:\/\/fueled.com\/blog\/much-money-can-earn-app\/"},{"key":"2_CR43","unstructured":"The New Daily: Federal government to force tech giants to reveal user data (2018). https:\/\/thenewdaily.com.au\/news\/national\/2018\/08\/14\/tech-surveillance-laws\/"},{"key":"2_CR44","doi-asserted-by":"crossref","unstructured":"Vallina-Rodriguez, N., et al.: When David helps goliath: the case for 3G onloading. In: Proceedings of the 11th ACM Workshop on Hot Topics in Networks, pp. 85\u201390. ACM (2012)","DOI":"10.1145\/2390231.2390246"},{"key":"2_CR45","unstructured":"VARONIS: 2018 VARONIS global data risk report (2018). https:\/\/www.varonis.com\/2018-data-risk-report\/"},{"key":"2_CR46","unstructured":"Vu, X.S., Jiang, L.: Self-adaptive privacy concern detection for user-generated content. arXiv preprint arXiv:1806.07221 (2018)"},{"issue":"9","key":"2_CR47","doi-asserted-by":"publisher","first-page":"2127","DOI":"10.1109\/TMC.2018.2795604","volume":"17","author":"N Wendt","year":"2018","unstructured":"Wendt, N., Julien, C.: PACO: a system-level abstraction for on-loading contextual data to mobile devices. IEEE Trans. Mob. Comput. 17(9), 2127\u20132140 (2018)","journal-title":"IEEE Trans. Mob. Comput."}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Mobile Computing, Applications, and Services"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-99203-3_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,23]],"date-time":"2022-03-23T16:07:26Z","timestamp":1648051646000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-99203-3_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030992026","9783030992033"],"references-count":47,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-99203-3_2","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"24 March 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MobiCASE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Mobile Computing, Applications, and Services","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 November 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 November 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"mobicase2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Confy+","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"21","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"9","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"43% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}