Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

On the Relationship Between Inference and Data Privacy in Decentralized IoT Networks

Published: 01 January 2020 Publication History

Abstract

In a decentralized Internet of Things (IoT) network, a fusion center receives information from multiple sensors to infer a public hypothesis of interest. To prevent the fusion center from abusing the sensor information, each sensor sanitizes its local observation using a local privacy mapping, which is designed to achieve both inference privacy of a private hypothesis and data privacy of the sensor raw observations. Various inference and data privacy metrics have been proposed in the literature. We introduce the concept of privacy implication (with vanishing budget) to study the relationships between these privacy metrics. We propose an optimization framework in which both local differential privacy (data privacy) and information privacy (inference privacy) metrics are incorporated. In the parametric case where sensor observations&#x2019; distributions are known <italic>a priori</italic>, we propose a two-stage local privacy mapping at each sensor, and show that such an architecture is able to achieve information privacy and local differential privacy to within the predefined budgets. For the nonparametric case where sensor distributions are unknown, we adopt an empirical optimization approach. Simulation and experiment results demonstrate that our proposed approaches allow the fusion center to accurately infer the public hypothesis while protecting both inference and data privacy.

References

[1]
R. Roman, J. Zhou, and J. Lopez, “On the features and challenges of security and privacy in distributed Internet of Things,” Comput. Netw., vol. 57, no. 10, pp. 2266–2279, 2013.
[2]
M. Sun and W. P. Tay, “Privacy-preserving nonparametric decentralized detection,” in Proc. IEEE Int. Conf. Acoust., Speech, Signal Process., Shanghai, China, Mar. 2016, pp. 6270–6274.
[3]
X. He, W. P. Tay, and M. Sun, “Privacy-aware decentralized detection using linear precoding,” in Proc. IEEE Sensor Array Multichannel Signal Process. Workshop, Rio de Janerio, Brazil, Jul. 2016, pp. 1–5.
[4]
X. He and W. P. Tay, “Multilayer sensor network for information privacy,” in Proc. IEEE Int. Conf. Acoust., Speech, Signal Process., New Orleans, LA, USA, Mar. 2017, pp. 6005–6009.
[5]
H. Alemdar and C. Ersoy, “Wireless sensor networks for healthcare: A survey,” Comput. Netw., vol. 54, no. 15, pp. 2688–2710, Oct. 2010.
[6]
I. Butun, S. D. Morgera, and R. Sankar, “A survey of intrusion detection systems in wireless sensor networks,” IEEE Commun. Surveys Tuts., vol. 16, no. 1, pp. 266–282, 1st Quart., 2014.
[7]
(2018). General Data Protection Regulation (GDPR). [Online]. Available: https://www.eugdpr.org/
[8]
Personal Data Protection Act (no 26/2012), Republic of Singapore Government Gazette, Singapore, 2012.
[9]
Digital Privacy Act (SC 2015, c. 32), Canada Gazette, Canada, 2015.
[10]
(2016). iPhone User Guide for iOS 10. [Online]. Available: https://help.apple.com/iphone/10
[11]
C. Liu, S. Chakraborty, and P. Mittal, “Dependence makes you vulnberable: Differential privacy under dependent tuples,” in Proc. Netw. Distrib. Syst. Secur. Symp., vol. 16, 2016, pp. 21–24.
[12]
G. Cormode, “Personal privacy vs population privacy: Learning to attack anonymization,” in Proc. ACM SIGKDD Int. Conf. Knowl. Discovery Data Mining, 2011, pp. 1253–1261.
[13]
Z. Chair and P. K. Varshney, “Optimal data fusion in multiple sensor detection systems,” IEEE Trans. Aerosp. Electron. Syst., vol. AES-22, no. 1, pp. 98–101, Jan. 1986.
[14]
J. N. Tsitsiklis, “Decentralized detection,” Adv. Statist. Signal Process., vol. 2, no. 2, pp. 297–344, 1993.
[15]
J.-F. Chamberland and V. V. Veeravalli, “Decentralized detection in sensor networks,” IEEE Trans. Signal Process., vol. 51, no. 2, pp. 407–416, Feb. 2003.
[16]
W. P. Tay, J. N. Tsitsiklis, and M. Z. Win, “Data fusion trees for detection: Does architecture matter?” IEEE Trans. Inf. Theory, vol. 54, no. 9, pp. 4155–4168, Sep. 2008.
[17]
W. P. Tay, “The value of feedback in decentralized detection,” IEEE Trans. Inf. Theory, vol. 58, no. 12, pp. 7226–7239, Dec. 2012.
[18]
W. P. Tay, “Whose opinion to follow in multihypothesis social learning? A large deviations perspective,” IEEE J. Sel. Topics Signal Process., vol. 9, no. 2, pp. 344–359, Mar. 2015.
[19]
Z. Zhang, E. K. P. Chong, A. Pezeshki, W. Moran, and S. D. Howard, “Learning in hierarchical social networks,” IEEE J. Sel. Topics Signal Process., vol. 7, no. 2, pp. 305–317, Apr. 2013.
[20]
J. Ho, W. P. Tay, T. Q. S. Quek, and E. K. Chong, “Robust decentralized detection and social learning in tandem networks,” IEEE Trans. Signal Process., vol. 63, no. 19, pp. 5019–5032, Oct. 2015.
[21]
Z. Huang, S. Mitra, and G. Dullerud, “Differentially private iterative synchronous consensus,” in Proc. ACM Workshop Privacy Electron. Soc., Raleigh, NC, USA, 2012, pp. 81–90.
[22]
E. Nozari, P. Tallapragada, and J. Cortés, “Differentially private average consensus with optimal noise selection,” in Proc. IFAC Workshop Distrib. Estimation Control Netw. Syst., Philadelphia, PA, USA, 2015, vol. 48, no. 22, pp. 203–208.
[23]
N. E. Manitara and C. N. Hadjicostis, “Privacy-preserving asymptotic average consensus,” in Proc. Eur. Control Conf., Zürich, Switzerland, Jul. 2013, pp. 760–765.
[24]
P. Braca, R. Lazzeretti, S. Marano, and V. Matta, “Learning with privacy in consensus + obfuscation,” IEEE Signal Process. Lett., vol. 23, no. 9, pp. 1174–1178, Sep. 2016.
[25]
Y. Mo and R. M. Murray, “Privacy preserving average consensus,” IEEE Trans. Autom. Control, vol. 62, no. 2, pp. 753–765, Feb. 2017.
[26]
R. Lazzeretti, S. Horn, P. Braca, and P. Willett, “Secure multi-party consensus gossip algorithms,” in Proc. IEEE Int. Conf. Acoust., Speech, Signal Process., Florence, Italy, May 2014, pp. 7406–7410.
[27]
M. Ambrosin, P. Braca, M. Conti, and R. Lazzeretti, “ODIN: Obfuscation-based privacy-preserving consensus algorithm for decentralized information fusion in smart device networks,” ACM Trans. Internet Technol., vol. 18, no. 1, 2017, Art. no.
[28]
P. Hallgren, C. Orlandi, and A. Sabelfeld, “Privatepool: Privacy-preserving ridesharing,” in Proc. 30th IEEE Comput. Secur. Found. Symp., Santa Barbara, CA, USA, Aug. 2017, pp. 276–291.
[29]
C. Gentry, “Fully homomorphic encryption using ideal lattices,” in Proc. ACM Symp. Theory Comput., Bethesda, MD, USA, 2009, pp. 169–178.
[30]
Z. Brakerski, C. Gentry, and V. Vaikuntanathan, “(Leveled) fully homomorphic encryption without bootstrapping,” ACM Trans. Comput. Theory, vol. 6, no. 3, pp. 13:1–13:36, 2014.
[31]
Y. Wang, X. Wu, and H. Donghui, “Using randomized response for differential privacy preserving data collection,” in Proc. ACM SIGKDD Int. Conf. Knowl. Discovery Data Mining, Washington, DC, USA, 2003, pp. 505–510.
[32]
S. Xiong, A. D. Sarwate, and N. B. Mandayam, “Randomized requantization with local differential privacy,” in Proc. IEEE Int. Conf. Acoust., Speech, Signal Process., Shanghai, China, Mar. 2016, pp. 2189–2193.
[33]
J. Liao, L. Sankar, F. P. Calmon, and V. Y. F. Tan, “Hypothesis testing under maximal leakage privacy constraints,” in Proc. IEEE Int. Symp. Inf. Theory, Aachen, Germany, Jun. 2017, pp. 779–783.
[34]
J. C. Duchi, M. I. Jordan, and M. J. Wainwright, “Local privacy and statistical minimax rates,” in Proc. IEEE Symp. Found. Comput. Sci., Berkeley, CA, USA, Oct. 2013, pp. 429–438.
[35]
W. Wang, L. Ying, and J. Zhang, “On the relation between identifiability, differential privacy, and mutual-information privacy,” IEEE Trans. Inf. Theory, vol. 62, no. 9, pp. 5018–5029, Sep. 2016.
[36]
N. E. Bordenabe and G. Smith, “Correlated secrets in quantitative information flow,” in Proc. IEEE Comput. Secur. Found. Symp., Lisbon, Portugal, Jun./Jul. 2016, pp. 93–104.
[37]
F. du Pin Calmon and N. Fawaz, “Privacy against statistical inference,” in Proc. 20th Annu. Allerton Conf. Commun., Control Comput., Monticello, IL, USA, Oct. 2012, pp. 1401–1408.
[38]
M. Sun, W. P. Tay, and X. He, “Toward information privacy for the Internet of Things: A nonparametric learning approach,” IEEE Trans. Signal Process., vol. 66, no. 7, pp. 1734–1747, Apr. 2018.
[39]
M. Al, S. Wan, and S.-Y. Kung, “Ratio utility and cost analysis for privacy preserving subspace projection,” 2017, arXiv:1702.07976. [Online]. Available: https://arxiv.org/abs/1702.07976
[40]
M. Sun and W. P. Tay, “Inference and data privacy in IoT networks,” in Proc. IEEE Workshop Signal Process. Adv. Wireless Commun., Jul. 2017, pp. 1–5.
[41]
J. Hamm, “Enhancing utility and privacy with noisy minimax filters,” in Proc. IEEE Int. Conf. Acoust., Speech, Signal Process., New Orleans, LA, USA, Mar. 2017, pp. 6389–6393.
[42]
S. Salamatian, A. Zhang, F. du Pin Calmon, S. Bhamidipati, N. Fawaz, B. Kveton, P. Oliveira, and N. Taft, “How to hide the elephant- or the donkey- in the room: Practical privacy against statistical inference for large data,” in Proc. IEEE Global Conf. Signal Inf. Process., Austin, TX, USA, Dec. 2013, pp. 269–272.
[43]
H. Yamamoto, “A source coding problem for sources with additional outputs to keep secret from the receiver or wiretappers,” IEEE Trans. Inf. Theory, vol. 29, no. 6, pp. 918–923, Nov. 1983.
[44]
Z. He, Z. Cai, and J. Yu, “Latent-data privacy preserving with customized data utility for social network data,” IEEE Trans. Veh. Technol., vol. 67, no. 1, pp. 665–673, Jan. 2018.
[45]
Y. Song, C. X. Wang, and W. P. Tay, “Privacy-aware Kalman filtering,” in Proc. IEEE Int. Conf. Acoust., Speech, Signal Process., Calgary, AB, Canada, Apr. 2018, pp. 4434–4438.
[46]
G. Chechik and N. Tishby, “Extracting relevant structures with side information,” in Proc. Adv. Neural Inf. Process. Syst., vol. 15. Cambridge, MA, USA: MIT Press, 2003, pp. 881–888.
[47]
Z. He, Z. Cai, Y. Sun, Y. Li, and X. Cheng, “Customized privacy preserving for inherent data and latent data,” Personal Ubiquitous Comput., vol. 21, no. 1, pp. 43–54, 2017.
[48]
R. Shokri and V. Shmatikov, “Privacy-preserving deep learning,” in Proc. 22nd ACM SIGSAC Conf. Comput. Commun. Secur., 2015, pp. 1310–1321.
[49]
E. Shi, T.-H. H. Chan, E. G. Rieffel, R. Chow, and D. Song, “Privacy-preserving aggregation of time-series data,” in Proc. Netw. Distrib. Syst. Secur. Symp., San Diego, CA, USA, 2011, pp. 1–17.
[50]
R. Chen, B. C. M. Fung, P. S. Yu, and B. C. Desai, “Correlated network data publication via differential privacy,” VLDB J., vol. 23, no. 4, pp. 653–676, Aug. 2014.
[51]
L. Grippo and M. Sciandrone, “On the convergence of the block nonlinear Gauss–Seidel method under convex constraints,” Oper. Res. Lett., vol. 26, no. 3, pp. 127–136, 2000.
[52]
S. Boyd and L. Vandenberghe, Convex Optimization. Cambridge, U.K.: Cambridge Univ. Press, 2004.
[53]
J. N. Tsitsiklis and M. Athans, “On the complexity of decentralized decision making and detection problems,” IEEE Trans. Autom. Control, vol. 30, no. 5, pp. 440–446, May 1985.
[54]
H. V. Poor, An Introduction to Signal Detection and Estimation. New York, NY, USA: Springer-Verlag, 1994.
[55]
J. Lofberg, “YALMIP: A toolbox for modeling and optimization in MATLAB,” in Proc. IEEE Int. Conf. Robot. Automat., Taipei, Taiwan, Sep. 2004, pp. 284–289.
[56]
C. Dwork and A. Roth, “The algorithmic foundations of differential privacy,” Found. Trends Theor. Comput. Sci., vol. 9, nos. 3–4, pp. 211–407, 2014.
[57]
R. Chavarriaga, H. Sagha, A. Calatroni, S. T. Digumarti, G. Tröster, J. del R. Millán, and D. Roggen, “The opportunity challenge: A benchmark database for on-body sensor-based activity recognition,” Pattern Recognit. Lett., vol. 34, no. 15, pp. 2033–2042, 2013.
[58]
R. Kohavi, “Scaling up the accuracy of Naive-Bayes classifiers: A decision-tree hybrid,” in Proc. ACM SIGKDD Int. Conf. Knowl. Discovery Data Mining, vol. 96, Portland, OR, USA, 1996, pp. 202–207.
[59]
M. Lichman. (2013). UCI Machine Learning Repository. [Online]. Available: http://archive.ics.uci.edu/ml
[60]
S.-Y. Kung, “Discriminant component analysis for privacy protection and visualization of big data,” Multimedia Tools Appl., vol. 76, no. 3, pp. 3999–4034, 2017.
[61]
K. Diamantaras and S.-Y. Kung, “Data privacy protection by kernel subspace projection and generalized eigenvalue decomposition,” in Proc. IEEE 26th Int. Workshop Mach. Learn. Signal Process., Vietri sul Mare, Italy, Sep. 2016, pp. 1–6.
[62]
F. Pedregosa, G. Varoquaux, A. Gramfort, V. Michel, B. Thirion, O. Grisel, M. Blondel, P. Prettenhofer, R. Weiss, V. Dubourg, J. Vanderplas, A. Passos, D. Cournapeau, M. Brucher, M. Perrot, and É. Duchesnay, “Scikit-learn: Machine learning in Python,” J. Mach. Learn. Res., vol. 12, pp. 2825–2830, Oct. 2011.

Cited By

View all
  • (2024)Decentralized multiple hypothesis testing in Cognitive IOT using massive heterogeneous dataCluster Computing10.1007/s10586-024-04324-727:5(6889-6929)Online publication date: 1-Aug-2024
  • (2023)A Differentially Private Federated Learning Model Against Poisoning Attacks in Edge ComputingIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2022.316855620:3(1941-1958)Online publication date: 1-May-2023
  • (2023)Cross-collection latent Beta-Liouville allocation model training with privacy protection and applicationsApplied Intelligence10.1007/s10489-022-04378-353:14(17824-17848)Online publication date: 1-Jul-2023
  • Show More Cited By

Index Terms

  1. On the Relationship Between Inference and Data Privacy in Decentralized IoT Networks
    Index terms have been assigned to the content through auto-classification.

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image IEEE Transactions on Information Forensics and Security
    IEEE Transactions on Information Forensics and Security  Volume 15, Issue
    2020
    2247 pages

    Publisher

    IEEE Press

    Publication History

    Published: 01 January 2020

    Qualifiers

    • Research-article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 27 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Decentralized multiple hypothesis testing in Cognitive IOT using massive heterogeneous dataCluster Computing10.1007/s10586-024-04324-727:5(6889-6929)Online publication date: 1-Aug-2024
    • (2023)A Differentially Private Federated Learning Model Against Poisoning Attacks in Edge ComputingIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2022.316855620:3(1941-1958)Online publication date: 1-May-2023
    • (2023)Cross-collection latent Beta-Liouville allocation model training with privacy protection and applicationsApplied Intelligence10.1007/s10489-022-04378-353:14(17824-17848)Online publication date: 1-Jul-2023
    • (2021)Current Research Trends in IoT SecurityMobile Information Systems10.1155/2021/88470992021Online publication date: 1-Jan-2021
    • (2020)Research on Selection Method of Privacy Parameter εSecurity and Communication Networks10.1155/2020/88450382020Online publication date: 23-Oct-2020

    View Options

    View options

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media