Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3600100.3625376acmotherconferencesArticle/Chapter ViewAbstractPublication PagessensysConference Proceedingsconference-collections
research-article

Mitigating Privacy Leakage in Anomalous Building Data Streams

Published: 15 November 2023 Publication History

Abstract

The presence of anomalies in building datasets represents a unique privacy challenge. There is a risk of successful identification within the complex and voluminous data streams for a building’s occupancy, CO2, temperature, humidity and power consumption. This can leak patterns of usage and other derived information that adversaries can leverage for both cyber and real-world attacks. However, this issue needs to be weighed against the indispensable roles that Building Management Systems (BMS) can play in reducing power consumption and, thus, the emissions for commercial buildings. Our initial work attempts to balance these competing demands, by implementing a decentralized Internet of Things (IoT) architecture against the Data Clearing House (DCH), an established repository housing multitudes of live building data streams. The aim is to detect and smooth the presence of anomalies, which would limit the exposure of sensitive information before it reaches the cloud for further analysis. To this end, we began by analyzing the historical streams for CO2, occupancy and temperature for a selected building within DCH. We then applied a fast and lightweight anomaly detection method using the PyOD python library. A privacy-preserving architecture is then described, where a well-known Differential Privacy (DP) technique was also applied and studied.

References

[1]
Ahmed Bali, Mahmud Al-Osta, and Gherbi Abdelouahed. 2017. An Ontology-Based Approach for IoT Data Processing Using Semantic Rules. In SDL 2017: Model-Driven Engineering for Future Internet, Tibor Csöndes, Gábor Kovács, and György Réthy (Eds.). Vol. 10567. Springer International Publishing, Budapest, Hungary, 61–79. https://doi.org/10.1007/978-3-319-68015-6_5 Series Title: Lecture Notes in Computer Science.
[2]
Hongliang Bi, Jiajia Liu, and Nei Kato. 2022-07. Deep Learning-Based Privacy Preservation and Data Analytics for IoT Enabled Healthcare. IEEE Transactions on Industrial Informatics 18, 7 (2022-07), 4798–4807. https://doi.org/10.1109/TII.2021.3117285
[3]
Yan Chen, Ashwin Machanavajjhala, Michael Hay, and Gerome Miklau. 2017-10-30. PeGaSus: Data-Adaptive Differentially Private Stream Processing. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. ACM, Dallas Texas USA, 1375–1388. https://doi.org/10.1145/3133956.3134102
[4]
Department of Climate Change, Energy, the Environment and Water, Australia. 2022. Commercial Buildings Energy Consumption Baseline Study 2022. Technical Report. Department of Climate Change, Energy, the Environment and Water, Australia. 247 pages. https://www.energy.gov.au/publications/commercial-buildings-energy-consumption-baseline-study-2022
[5]
Teklay Gebremichael, Lehlogonolo P. I. Ledwaba, Mohamed H. Eldefrawy, Gerhard P. Hancke, Nuno Pereira, Mikael Gidlund, and Johan Akerberg. 2020. Security and Privacy in the Industrial Internet of Things: Current Standards and Future Challenges. IEEE Access 8 (2020), 152351–152366. https://doi.org/10.1109/ACCESS.2020.3016937
[6]
Sameera Ghayyur, Yan Chen, Roberto Yus, Ashwin Machanavajjhala, Michael Hay, Gerome Miklau, and Sharad Mehrotra. 2018-05-27. IoT-Detective: Analyzing IoT Data Under Differential Privacy. In Proceedings of the 2018 International Conference on Management of Data. ACM, Houston TX USA, 1725–1728. https://doi.org/10.1145/3183713.3193571
[7]
Junqi Guo, Minghui Yang, and Boxin Wan. 2021-06-09. A Practical Privacy-Preserving Publishing Mechanism Based on Personalized k-Anonymity and Temporal Differential Privacy for Wearable IoT Applications. Symmetry 13, 6 (2021-06-09), 1043. https://doi.org/10.3390/sym13061043
[8]
Songqiao Han, Xiyang Hu, Hailiang Huang, Mingqi Jiang, and Yue Zhao. 2022. ADBench: Anomaly Detection Benchmark. Publisher: arXiv Version Number: 2 N/A (2022), 1–45. https://doi.org/10.48550/ARXIV.2206.09426
[9]
Martin Henze, Lars Hermerschmidt, Daniel Kerpen, Roger Häußling, Bernhard Rumpe, and Klaus Wehrle. 2016. A comprehensive approach to privacy in the cloud-based Internet of Things. Future Generation Computer Systems 56 (2016), 701–718. https://doi.org/10.1016/j.future.2015.09.016
[10]
Muhammad Akbar Husnoo, Adnan Anwar, Ripon K. Chakrabortty, Robin Doss, and Mike J. Ryan. 2021. Differential Privacy for IoT-Enabled Critical Infrastructure: A Comprehensive Survey. IEEE Access 9 (2021), 153276–153304. https://doi.org/10.1109/ACCESS.2021.3124309
[11]
Qi Jia, Linke Guo, Zhanpeng Jin, and Yuguang Fang. 2018-08-01. Preserving Model Privacy for Machine Learning in Distributed Systems. IEEE Transactions on Parallel and Distributed Systems 29, 8 (2018-08-01), 1808–1822. https://doi.org/10.1109/TPDS.2018.2809624
[12]
Rafiullah Khan, Kieran McLaughlin, David Laverty, and Sakir Sezer. 2017-09. STRIDE-based threat modeling for cyber-physical systems. In 2017 IEEE PES Innovative Smart Grid Technologies Conference Europe (ISGT-Europe). IEEE, Torino, 1–6. https://doi.org/10.1109/ISGTEurope.2017.8260283
[13]
Randhir Kumar, Prabhat Kumar, Rakesh Tripathi, Govind P. Gupta, Thippa Reddy Gadekallu, and Gautam Srivastava. 2021-03. SP2F: A secured privacy-preserving framework for smart agricultural Unmanned Aerial Vehicles. Computer Networks 187 (2021-03), 107819. https://doi.org/10.1016/j.comnet.2021.107819
[14]
Roxanne Leitão. 2019-06-18. Anticipating Smart Home Security and Privacy Threats with Survivors of Intimate Partner Abuse. In Proceedings of the 2019 on Designing Interactive Systems Conference. ACM, San Diego CA USA, 527–539. https://doi.org/10.1145/3322276.3322366
[15]
Heather Richter Lipford, Madiha Tabassum, Paritosh Bahirat, Yaxing Yao, and Bart P. Knijnenburg. 2022. Privacy and the Internet of Things. In Modern Socio-Technical Perspectives on Privacy, Bart P. Knijnenburg, Xinru Page, Pamela Wisniewski, Heather Richter Lipford, Nicholas Proferes, and Jennifer Romano (Eds.). Springer International Publishing, N/A, 233–264. https://doi.org/10.1007/978-3-030-82786-1_11
[16]
Martin Q. Ma, Yue Zhao, Xiaorong Zhang, and Leman Akoglu. 2023. The Need for Unsupervised Outlier Model Selection: A Review and Evaluation of Internal Evaluation Strategies. SIGKDD Explor. Newsl. 25, 1 (jul 2023), 19–35. https://doi.org/10.1145/3606274.3606277
[17]
Philipp Morgner, Christian Müller, Matthias Ring, Björn Eskofier, Christian Riess, Frederik Armknecht, and Zinaida Benenson. 2017. Privacy Implications of Room Climate Data. In Computer Security – ESORICS 2017, Simon N. Foley, Dieter Gollmann, and Einar Snekkenes (Eds.). Vol. 10493. Springer International Publishing, Oslo, Norway, 324–343. https://doi.org/10.1007/978-3-319-66399-9_18 Series Title: Lecture Notes in Computer Science.
[18]
Seyed Ali Osia, Ali Shahin Shamsabadi, Sina Sajadmanesh, Ali Taheri, Kleomenis Katevas, Hamid R. Rabiee, Nicholas D. Lane, and Hamed Haddadi. 2020-05. A Hybrid Deep Learning Architecture for Privacy-Preserving Mobile Analytics. IEEE Internet of Things Journal 7, 5 (2020-05), 4505–4518. https://doi.org/10.1109/JIOT.2020.2967734
[19]
Ankhbayar Otgonbayar, Zeeshan Pervez, and Keshav Dahal. 2016-10. Toward Anonymizing IoT Data Streams via Partitioning. In 2016 IEEE 13th International Conference on Mobile Ad Hoc and Sensor Systems (MASS). IEEE, Brasilia, Brazil, 331–336. https://doi.org/10.1109/MASS.2016.049
[20]
Aya Nabil Sayed, Yassine Himeur, and Faycal Bensaali. 2022-10. Deep and transfer learning for building occupancy detection: A review and comparative analysis. Engineering Applications of Artificial Intelligence 115 (2022-10), 105254. https://doi.org/10.1016/j.engappai.2022.105254
[21]
Sebastian Schmidl, Phillip Wenig, and Thorsten Papenbrock. 2022-05. Anomaly detection in time series: a comprehensive evaluation. Proceedings of the VLDB Endowment 15, 9 (2022-05), 1779–1797. https://doi.org/10.14778/3538598.3538602
[22]
Mohamed Seliem, Khalid Elgazzar, and Kasem Khalil. 2018-11-18. Towards Privacy Preserving IoT Environments: A Survey. Wireless Communications and Mobile Computing 2018 (2018-11-18), 1–15. https://doi.org/10.1155/2018/1032761
[23]
Lo’ai Tawalbeh, Fadi Muheidat, Mais Tawalbeh, and Muhannad Quwaider. 2020-06-15. IoT Privacy and Security: Challenges and Solutions. Applied Sciences 10, 12 (2020-06-15), 4102. https://doi.org/10.3390/app10124102
[24]
Junia Valente, Matthew A. Wynn, and Alvaro A. Cardenas. 2019-09. Stealing, Spying, and Abusing: Consequences of Attacks on Internet of Things Devices. IEEE Security & Privacy 17, 5 (2019-09), 10–21. https://doi.org/10.1109/MSEC.2019.2924167
[25]
Pradeep K. Venkatesh, Daniel Alencar da Costa, Ying Zou, and Joanna W. Ng. 2017. A Framework to Extract Personalized Behavioural Patterns of User’s IoT Devices Data. In Proceedings of the 27th Annual International Conference on Computer Science and Software Engineering (Markham, Ontario, Canada) (CASCON ’17). IBM Corp., USA, 19–27.
[26]
Dan Wang, Ju Ren, Chugui Xu, Juncheng Liu, Zhibo Wang, Yaoxue Zhang, and Xuemin Shen. 2019-08. PrivStream: Enabling Privacy-Preserving Inferences on IoT Data Stream at the Edge. In 2019 IEEE 21st International Conference on High Performance Computing and Communications; IEEE 17th International Conference on Smart City; IEEE 5th International Conference on Data Science and Systems (HPCC/SmartCity/DSS). IEEE, Zhangjiajie, China, 1290–1297. https://doi.org/10.1109/HPCC/SmartCity/DSS.2019.00180
[27]
Manuel Weber, Christoph Doblander, and Peter Mandl. 2020. Towards the Detection of Building Occupancy with Synthetic Environmental Data. CoRR abs/2010.04209 (2020), 1–4. arXiv:2010.04209https://arxiv.org/abs/2010.04209
[28]
Chugui Xu, Ju Ren, Deyu Zhang, and Yaoxue Zhang. 2018-08. Distilling at the Edge: A Local Differential Privacy Obfuscation Framework for IoT Data Analytics. IEEE Communications Magazine 56, 8 (2018-08), 20–25. https://doi.org/10.1109/MCOM.2018.1701080
[29]
Yue Zhao, Zain Nasrullah, and Zheng Li. 2019. PyOD: A Python Toolbox for Scalable Outlier Detection. Journal of Machine Learning Research 20, 96 (2019), 1–7. http://jmlr.org/papers/v20/19-011.html

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
BuildSys '23: Proceedings of the 10th ACM International Conference on Systems for Energy-Efficient Buildings, Cities, and Transportation
November 2023
567 pages
ISBN:9798400702303
DOI:10.1145/3600100
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 15 November 2023

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. anomaly detection
  2. building management systems
  3. building occupancy
  4. differential privacy
  5. time-series data

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

BuildSys '23

Acceptance Rates

Overall Acceptance Rate 148 of 500 submissions, 30%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 34
    Total Downloads
  • Downloads (Last 12 months)34
  • Downloads (Last 6 weeks)0
Reflects downloads up to 21 Nov 2024

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media