[en] Given the trend towards mobile computing, the next generation
of ubiquitous “smart” services will have to continuously
analyze surrounding sensor data. More than ever, such
services will rely on data potentially related to personal activities
to perform their tasks, e.g. to predict urban traffic
or local weather conditions. However, revealing personal
data inevitably entails privacy risks, especially when data is
shared with high precision and frequency. For example, by
analyzing the precise electric consumption data, it can be inferred
if a person is currently at home, however this can empower
new services such as a smart heating system. Access
control (forbid or grant access) or anonymization techniques
are not able to deal with such trade-off because whether
they completely prohibit access to data or lose source traceability.
Blurring techniques, by tuning data quality, offer
a wide range of trade-offs between privacy and utility for
services. However, the amount of ubiquitous services and
their data quality requirements lead to an explosion of possible
configurations of blurring algorithms. To manage this
complexity, in this paper we propose a platform that automatically
adapts (at runtime) blurring components between
data owners and data consumers (services). The platform
searches the optimal trade-off between service utility and
privacy risks using multi-objective evolutionary algorithms
to adapt the underlying communication platform. We evaluate
our approach on a sensor network gateway and show its
suitability in terms of i) effectiveness to find an appropriate
solution, ii) efficiency and scalability.
Disciplines :
Sciences informatiques
Auteur, co-auteur :
MOAWAD, Assaad ; University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT)
HARTMANN, Thomas ; University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT)
FOUQUET, François ; University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT)
KLEIN, Jacques ; University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC)
LE TRAON, Yves ; University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC)
Co-auteurs externes :
no
Langue du document :
Anglais
Titre :
Adaptive Blurring of Sensor Data to balance Privacy and Utility for Ubiquitous Services
Date de publication/diffusion :
avril 2015
Nom de la manifestation :
SAC 2015 - The 30th ACM/SIGAPP Symposium On Applied Computing
Lieu de la manifestation :
Salamanca, Espagne
Date de la manifestation :
from 13-04-2015 to 17-04-2015
Manifestation à portée :
International
Titre de l'ouvrage principal :
The 30th Annual ACM Symposium on Applied Computing
S. Alcalde Bagues, J. Mitic, and E.-A. Emberger. The connect platform: An architecture for context-aware privacy in pervasive environments. In Security and Privacy in Communications Networks and the Workshops. SecureComm 2007. Third International Conference on, pages 117-126. IEEE, 2007.
L. Bhuvanagiri and S. Ganguly. Estimating entropy over data streams. In Algorithms-ESA 2006, pages 148-159. Springer, 2006.
L. BROWN, Y.-L. TIAN, A. EKIN, C. F. SHU, and M. LU. Enabling video privacy through computer vision. 2005.
K. Deb, A. Pratap, S. Agarwal, and T. Meyarivan. A fast and elitist multiobjective genetic algorithm: Nsga-ii. Evolutionary Computation, IEEE Transactions on, 6(2):182-197, 2002.
C. Dwork, K. Kenthapadi, F. McSherry, I. Mironov, and M. Naor. Our data, ourselves: Privacy via distributed noise generation. In Advances in Cryptology-EUROCRYPT 2006, pages 486-503.
F. Fouquet, O. Barais, N. Plouzeau, J.-M. Jézéquel, B. Morin, and F. Fleurey. A Dynamic Component Model for Cyber Physical Systems. In 15th International Symposium on Component Based Software Engineering, Italy, July 2012.
M. Friedewald, E. Vildjiounaite, Y. Punie, and D. Wright. Privacy, identity and security in ambient intelligence: A scenario analysis. Telematics and Informatics, 24(1):15-29, 2007.
B. Hoh, M. Gruteser, R. Herring, J. Ban, D. Work, J.-C. Herrera, A. M. Bayen, M. Annavaram, and Q. Jacobson. Virtual trip lines for distributed privacy-preserving traffic monitoring. In Proceedings of the 6th international conference on Mobile systems, applications, and services, pages 15-28. ACM, 2008.
A. Juels. Rfid security and privacy: A research survey. Journal of Selected Areas in Communication, 2006.
G. Kalogridis, Z. Fan, and S. Basutkar. Affordable privacy for home smart meters. In Parallel and Distributed Processing with Applications Workshops (ISPAW), 2011 Ninth IEEE International Symposium on, pages 77-84. IEEE, 2011.
D. A. Kelly. Disaggregating smart meter readings using device signatures. 2011.
N. Li, T. Li, and S. Venkatasubramanian. t-closeness: Privacy beyond k-anonymity and l-diversity. In ICDE, volume 7, pages 106-115, 2007.
A. Machanavajjhala, D. Kifer, J. Gehrke, and M. Venkitasubramaniam. l-diversity: Privacy beyond k-anonymity. ACM Transactions on Knowledge Discovery from Data (TKDD), 1(1):3, 2007.
M. Madden. Privacy management on social media sites. Pew Internet Report, pages 1-20, 2012.
P. McDaniel and S. McLaughlin. Security and privacy challenges in the smart grid. IEEE Security and Privacy, 7(3):75-77, May 2009.
M. F. Mokbel, C.-Y. Chow, and W. G. Aref. The new casper: query processing for location services without compromising privacy. In Proceedings of the 32nd international conference on Very large data bases, pages 763-774. VLDB Endowment, 2006.
C. Neustaedter, S. Greenberg, and M. Boyle. Balancing privacy and awareness for telecommuters using blur filtration. Technical report, Report 2003-719-22, Department of Computer Science, University of Calgary, 2003.
S. R. Rajagopalan, L. Sankar, S. Mohajer, and H. V. Poor. Smart meter privacy: A utility-privacy framework. In Smart Grid Communications (SmartGridComm), 2011 IEEE International Conference on, pages 190-195. IEEE, 2011.
O. Standard. extensible access control markup language (xacml) version 2.0, 2005.
L. Sweeney. k-anonymity: A model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2002.
X. Wei, L. Gomez, I. Neamtiu, and M. Faloutsos. Permission evolution in the android ecosystem. In Proceedings of the 28th Annual Computer Security Applications Conference, pages 31-40. ACM, 2012.
J. Wickramasuriya, M. Alhazzazi, M. Datt, S. Mehrotra, and N. Venkatasubramanian. Privacy-protecting video surveillance. In Electronic Imaging 2005, pages 64-75. International Society for Optics and Photonics, 2005.
E. Zitzler, D. Brockhoff, and L. Thiele. The hypervolume indicator revisited: On the design of pareto-compliant indicators via weighted integration. In Evolutionary multi-criterion optimization, pages 862-876. Springer, 2007.