An Information-Theoretic Approach to Time-Series Data Privacy

被引:1
|
作者
Amar, Yousef [1 ]
Haddadi, Hamed [2 ]
Mortier, Richard [3 ]
机构
[1] Queen Mary Univ London, London, England
[2] Imperial Coll London, London, England
[3] Univ Cambridge, Cambridge, England
关键词
ANONYMITY;
D O I
10.1145/3195258.3195261
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Access control is central to interfacing with personal data, however most systems today are too coarse and disconnected from the privacy context of the data. Granular access control rarely goes beyond limiting sample rates or enforcing time limits. In this paper, we present a system for tuning a data consumer's access to personal data based on real-time privacy metrics. We first explore the potential definitions of privacy in this context with a focus on information theoretic metrics for defining privacy in sensitive time series data. We then implement and evaluate our system for embedding risk thresholds into bearer token-based access control systems to attenuate access to data of different granularities based on these metrics. Our results show that our system provides privacy gains wihout a significant utility cost, and can run efficiently and scale well on cheap hardware with high-frequncy sensor data.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Generative Adversarial Privacy: A Data-Driven Approach to Information-Theoretic Privacy
    Huang, Chong
    Kairouz, Peter
    Sankar, Lalitha
    [J]. 2018 CONFERENCE RECORD OF 52ND ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS, AND COMPUTERS, 2018, : 2162 - 2166
  • [2] MapReduce Algorithms for Inferring Gene Regulatory Networks from Time-Series Microarray Data Using an Information-Theoretic Approach
    Abduallah, Yasser
    Turki, Turki
    Byron, Kevin
    Du, Zongxuan
    Cervantes-Cervantes, Miguel
    Wang, Jason T. L.
    [J]. BIOMED RESEARCH INTERNATIONAL, 2017, 2017
  • [3] Notes on Information-Theoretic Privacy
    Asoodeh, Shahab
    Alajaji, Fady
    Linder, Tamas
    [J]. 2014 52ND ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING (ALLERTON), 2014, : 1272 - 1278
  • [4] Privacy-Preserving OLAP: An Information-Theoretic Approach
    Zhang, Nan
    Zhao, Wei
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2011, 23 (01) : 122 - 138
  • [5] Information-theoretic approach to privacy protection of biometric templates
    Goseling, J
    Tuyls, P
    [J]. 2004 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, PROCEEDINGS, 2004, : 172 - 172
  • [6] Competitive Privacy in the Smart Grid: An Information-theoretic Approach
    Sankar, Lalitha
    Kar, Soummya
    Tandon, Ravi
    Poor, H. Vincent
    [J]. 2011 IEEE INTERNATIONAL CONFERENCE ON SMART GRID COMMUNICATIONS (SMARTGRIDCOMM), 2011,
  • [7] Information-Theoretic Privacy Watchdogs
    Hsu, Hsiang
    Asoodeh, Shahab
    Calmon, Flavio P.
    [J]. 2019 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2019, : 552 - 556
  • [8] Quantifying the Multiscale Predictability of Financial Time Series by an Information-Theoretic Approach
    Zhao, Xiaojun
    Liang, Chenxu
    Zhang, Na
    Shang, Pengjian
    [J]. ENTROPY, 2019, 21 (07)
  • [9] An information-theoretic approach to inference attacks on random data perturbation and a related privacy measure
    Vora, Poorvi L.
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2007, 53 (08) : 2971 - 2977
  • [10] Utility-Privacy Tradeoffs in Databases: An Information-Theoretic Approach
    Sankar, Lalitha
    Rajagopalan, S. Raj
    Poor, H. Vincent
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (06) : 838 - 852