Privacy-Preserving Event Detection in Pervasive Spaces

被引:0
|
作者
Hore, Bijit [1 ]
Wickramasuriya, Jehan [1 ]
Mehrotra, Sharad [1 ]
Venkatasubramanian, Nalini [1 ]
Massaguer, Daniel [1 ]
机构
[1] Univ Calif Irvine, Sch Comp Sci, Irvine, CA 92697 USA
关键词
SECURITY;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we consider privacy challenges in event-driven pervasive spaces where multimedia streams captured by sensors embedded in the infrastructure are used to detect a variety of application-specific media events. In particular, we develop techniques to detect events without disclosing any identifying information unless necessary. We characterize the nature of inference channels that arise and model privacy preserving event detection as an optimization problem that attempts to balance disclosure with performance. We design and test efficient communication protocols that realize this tradeoff.
引用
收藏
页码:233 / 242
页数:10
相关论文
共 50 条
  • [1] SCLERA: A Framework for Privacy-Preserving MLaaS at the Pervasive Edge
    Kumar, Abhinav
    Tourani, Reza
    Vij, Mona
    Srikanteswara, Srikathyayani
    [J]. 2022 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS AND OTHER AFFILIATED EVENTS (PERCOM WORKSHOPS), 2022,
  • [2] Interpretable Machine Learning for Privacy-Preserving Pervasive Systems
    Baron, Benjamin
    Musolesi, Mirco
    [J]. IEEE PERVASIVE COMPUTING, 2020, 19 (01) : 73 - 82
  • [3] Privacy-Preserving Observation in Public Spaces
    Kerschbaum, Florian
    Lim, Hoon Wei
    [J]. COMPUTER SECURITY - ESORICS 2015, PT II, 2015, 9327 : 81 - 100
  • [4] Privacy-Preserving Process MiningDifferential Privacy for Event Logs
    Felix Mannhardt
    Agnes Koschmider
    Nathalie Baracaldo
    Matthias Weidlich
    Judith Michael
    [J]. Business & Information Systems Engineering, 2019, 61 : 595 - 614
  • [5] An Efficient Privacy-Preserving Localization Algorithm for Pervasive Computing
    Wang, Guanghui
    Pan, Jianping
    He, Jianping
    Shen, Subin
    [J]. 2017 26TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND NETWORKS (ICCCN 2017), 2017,
  • [6] Privacy-preserving outlier detection
    Vaidya, J
    Clifton, C
    [J]. FOURTH IEEE INTERNATIONAL CONFERENCE ON DATA MINING, PROCEEDINGS, 2004, : 233 - 240
  • [7] Privacy-Preserving Continuous Event Data Publishing
    Rafiei, Majid
    van der Aalst, Wil M. P.
    [J]. BUSINESS PROCESS MANAGEMENT FORUM (BPM 2021), 2021, 427 : 178 - 194
  • [8] Privacy-Preserving Process Mining Differential Privacy for Event Logs
    Mannhardt, Felix
    Koschmider, Agnes
    Baracaldo, Nathalie
    Weidlich, Matthias
    Michael, Judith
    [J]. BUSINESS & INFORMATION SYSTEMS ENGINEERING, 2019, 61 (05) : 595 - 614
  • [9] Analyzing and Evaluating Efficient Privacy-Preserving Localization for Pervasive Computing
    Wang, Guanghui
    He, Jianping
    Shi, Xiufang
    Pan, Jianping
    Shen, Subin
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (04): : 2993 - 3007
  • [10] Multi-lateral Privacy-Preserving Localization in Pervasive Environments
    Shu, Tao
    Chen, Yingying
    Yang, Jie
    Williams, Albert
    [J]. 2014 PROCEEDINGS IEEE INFOCOM, 2014, : 2319 - 2327