Mobile Sensor Data Anonymization

Motion sensors such as accelerometers and gyroscopes measure the instant acceleration and rotation of a device, in three dimensions. Raw data streams from motion sensors embedded in portable and wearable devices may reveal private information about users without their awareness. For example, motion data might disclose the weight or gender of a user, or enable their re-identification. To address this problem, we propose an on-device transformation of sensor data to be shared for specific applications, such as monitoring selected daily activities, without revealing information that enables user identification. We formulate the anonymization problem using an information-theoretic approach and propose a new multi-objective loss function for training deep autoencoders. This loss function helps minimizing user-identity information as well as data distortion to preserve the application-specific utility. The training process regulates the encoder to disregard user-identifiable patterns and tunes the decoder to shape the output independently of users in the training set. The trained autoencoder can be deployed on a mobile or wearable device to anonymize sensor data even for users who are not included in the training dataset. Data from 24 users transformed by the proposed anonymizing autoencoder lead to a promising trade-off between utility and privacy, with an accuracy for activity recognition above 92% and an accuracy for user identification below 7%.

[1]  G. P. King,et al.  Extracting qualitative dynamics from experimental data , 1986 .

[2]  Eduardo Ramos Resampling Methods for Time Series , 1988 .

[3]  Yoshua Bengio,et al.  Convolutional networks for images, speech, and time series , 1998 .

[4]  Eric Jones,et al.  SciPy: Open Source Scientific Tools for Python , 2001 .

[5]  Philip Chan,et al.  Toward accurate dynamic time warping in linear time and space , 2007, Intell. Data Anal..

[6]  Yoshua. Bengio,et al.  Learning Deep Architectures for AI , 2007, Found. Trends Mach. Learn..

[7]  Yoshua Bengio,et al.  Extracting and composing robust features with denoising autoencoders , 2008, ICML '08.

[8]  Moni Naor,et al.  Differential privacy under continual observation , 2010, STOC '10.

[9]  Jürgen Schmidhuber,et al.  Stacked Convolutional Auto-Encoders for Hierarchical Feature Extraction , 2011, ICANN.

[10]  Jun Han,et al.  ACCessory: password inference using accelerometers on smartphones , 2012, HotMobile '12.

[11]  Renato Renner,et al.  An intuitive proof of the data processing inequality , 2011, Quantum Inf. Comput..

[12]  Florian Metze,et al.  Extracting deep bottleneck features using stacked auto-encoders , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.

[13]  Martin J. Wainwright,et al.  Local Privacy and Minimax Bounds: Sharp Rates for Probability Estimation , 2013, NIPS.

[14]  H. Vincent Poor,et al.  Utility-Privacy Tradeoffs in Databases: An Information-Theoretic Approach , 2011, IEEE Transactions on Information Forensics and Security.

[15]  Nitish Srivastava,et al.  Dropout: a simple way to prevent neural networks from overfitting , 2014, J. Mach. Learn. Res..

[16]  Yoshua Bengio,et al.  Generative Adversarial Nets , 2014, NIPS.

[17]  Max Welling,et al.  Auto-Encoding Variational Bayes , 2013, ICLR.

[18]  Hamed Haddadi,et al.  Poster: SensingKit: a multi-platform mobile sensing framework for large-scale experiments , 2014, MobiCom.

[19]  Jun Wang,et al.  A Review of Differential Privacy in Individual Data Release , 2015, Int. J. Distributed Sens. Networks.

[20]  Xiaoli Li,et al.  Deep Convolutional Neural Networks on Multichannel Time Series for Human Activity Recognition , 2015, IJCAI.

[21]  David K. Y. Yau,et al.  On Information-theoretic Measures for Quantifying Privacy Protection of Time-series Data , 2015, AsiaCCS.

[22]  Eamonn J. Keogh,et al.  The great time series classification bake off: a review and experimental evaluation of recent algorithmic advances , 2016, Data Mining and Knowledge Discovery.

[23]  Alex Fridman,et al.  Learning Human Identity from Motion Patterns , 2015, IEEE Access.

[24]  Amos J. Storkey,et al.  Censoring Representations with an Adversary , 2015, ICLR.

[25]  Ian Goodfellow,et al.  Deep Learning with Differential Privacy , 2016, CCS.

[26]  Jihun Hamm,et al.  Minimax Filter: Learning to Preserve Privacy from Inference Attacks , 2016, J. Mach. Learn. Res..

[27]  Jun Tang,et al.  Privacy Loss in Apple's Implementation of Differential Privacy on MacOS 10.12 , 2017, ArXiv.

[28]  Zhibo Pang,et al.  Smart Homes for Elderly Healthcare—Recent Advances and Research Challenges , 2017, Sensors.

[29]  Ram Rajagopal,et al.  Context-Aware Generative Adversarial Privacy , 2017, Entropy.

[30]  Prateek Mittal,et al.  DEEProtect: Enabling Inference-based Access Control on Mobile Sensing Applications , 2017, ArXiv.

[31]  Ying Zhao,et al.  An information-aware visualization for privacy-preserving accelerometer data sharing , 2018, Human-centric Computing and Information Sciences.

[32]  Mohammad Malekzadeh,et al.  Replacement AutoEncoder: A Privacy-Preserving Algorithm for Sensory Data Analysis , 2017, 2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation (IoTDI).

[33]  Sandra Servia Rodríguez,et al.  Privacy-Preserving Personal Model Training , 2017, 2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation (IoTDI).

[34]  Andrea Cavallaro,et al.  Distributed One-Class Learning , 2018, 2018 25th IEEE International Conference on Image Processing (ICIP).

[35]  Deniz Gündüz,et al.  Optimal Utility-Privacy Trade-off with the Total Variation Distance as the Privacy Measure , 2018, ArXiv.

[36]  Andrea Cavallaro,et al.  Protecting Sensory Data against Sensitive Inferences , 2018, P2DS@EuroSys.

[37]  Ye Wang,et al.  Privacy-Preserving Adversarial Networks , 2017, 2019 57th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[38]  Ashwin Machanavajjhala,et al.  Olympus: Sensor Privacy through Utility Aware Obfuscation , 2019, Proc. Priv. Enhancing Technol..

[39]  Hamed Haddadi,et al.  Deep Private-Feature Extraction , 2018, IEEE Transactions on Knowledge and Data Engineering.