PREDICT Privacy and Security Enhancing Dynamic Information Monitoring

Abstract : The PREDICT project incorporates security and privacy in DDDAS systems to deliver provable guarantees of privacy and security while ensuring high fidelity for data acquisition, aggregation and analytics. Application scenarios include health surveillance data release, traffic analysis, situation awareness and monitoring, and fleet tracking. A novel two-stage scheme was devised for privacy-preserving task assignment, consisting of global server-side probabilistic assignment by an untrusted server using cloaked locations, followed by feedback-loop guided local optimization using precise participant locations, without breaching privacy and achieving high levels of target coverage with reasonable cost. Once data is collected, privacy preserving data aggregation and modeling with feedback control is performed. This project has developed techniques to deliver high data utility/integrity in aggregated data, with rigorous privacy guarantees such that source data is not disclosed. Finally, in many DDDAS settings, when local participants are mutually untrusted, and for increased responsiveness in the field, algorithms were investigated for secure analytics to be performed without disclosing individual inputs, true participant locations or other sensitive information.

[1]  Jian Pei,et al.  Finding Pareto Optimal Groups: Group-based Skyline , 2015, Proc. VLDB Endow..

[2]  Xiaofeng Xu,et al.  Speed Partitioning for Indexing Moving Objects , 2015, SSTD.

[3]  Vaidy S. Sunderam,et al.  Differentially Private Multi-dimensional Time Series Release for Traffic Monitoring , 2013, DBSec.

[4]  Jun Luo,et al.  Privacy Preserving Publication of Locations Based on Delaunay Triangulation , 2014, PAKDD.

[5]  Li Xiong,et al.  Secure Distributed Data Anonymization and Integration with m-Privacy , 2013 .

[6]  Vaidy S. Sunderam,et al.  Monitoring web browsing behavior with differential privacy , 2014, WWW.

[7]  Vaidy S. Sunderam,et al.  Predict: Privacy and Security Enhancing Dynamic Information Collection and Monitoring , 2013, ICCS.

[8]  M. Kollek,et al.  Presentations , 2014, Allergo Journal International.

[9]  Li Xiong,et al.  Protecting Locations with Differential Privacy under Temporal Correlations , 2014, CCS.

[10]  Vaidy S. Sunderam,et al.  Towards Secure Cloud Database with Fine-Grained Access Control , 2014, DBSec.

[11]  Xiaofeng Xu,et al.  Database Fragmentation with Confidentiality Constraints: A Graph Search Approach , 2015, CODASPY.

[12]  Vaidy S. Sunderam,et al.  Dynamic Data Driven Crowd Sensing Task Assignment , 2014, ICCS.

[13]  Haoran Li,et al.  Finding Probabilistic k-Skyline Sets on Uncertain Data , 2015, CIKM.

[14]  Li Xiong,et al.  A Comprehensive Comparison of Multiparty Secure Additions with Differential Privacy , 2017, IEEE Transactions on Dependable and Secure Computing.

[15]  Li Xiong,et al.  Differentially Private Anomaly Detection with a Case Study on Epidemic Outbreak Detection , 2013, 2013 IEEE 13th International Conference on Data Mining Workshops.

[16]  Xiaofeng Xu,et al.  VPIndexer: velocity-based partitioning for indexing moving objects , 2015, SIGSPATIAL/GIS.

[17]  Li Xiong,et al.  An Adaptive Approach to Real-Time Aggregate Monitoring With Differential Privacy , 2014, IEEE Trans. Knowl. Data Eng..

[18]  Li Xiong Harnessing personal data from Internet of Things: Privacy enhancing dynamic information monitoring , 2015, 2015 International Conference on Collaboration Technologies and Systems (CTS).

[19]  Xiaofeng Xu,et al.  STAC: spatial task assignment for crowd sensing with cloaked participant locations , 2015, SIGSPATIAL/GIS.

[20]  Vaidy S. Sunderam,et al.  FAST: differentially private real-time aggregate monitor with filtering and adaptive sampling , 2013, SIGMOD '13.

[21]  Vaidy S. Sunderam,et al.  Spatial Task Assignment for Crowd Sensing with Cloaked Locations , 2014, 2014 IEEE 15th International Conference on Mobile Data Management.

[22]  Vaidy S. Sunderam,et al.  Secure multiparty aggregation with differential privacy: a comparative study , 2013, EDBT '13.

[23]  Li Xiong,et al.  Real-time aggregate monitoring with differential privacy , 2012, CIKM.