Inference management, trust and obfuscation principles for quality of information in emerging pervasive environments

Abstract The emergence of large scale, distributed, sensor-enabled, machine-to-machine pervasive applications necessitates engaging with providers of information on demand to collect the information, of varying quality levels, to be used to infer about the state of the world and decide actions in response. In these highly fluid operational environments, involving information providers and consumers of various degrees of trust and intentions, information transformation, such as obfuscation, is used to manage the inferences that could be made to protect providers from misuses of the information they share, while still providing benefits to their information consumers. In this paper, we develop the initial principles for relating to inference management and the role that trust and obfuscation plays in it within the context of this emerging breed of applications. We start by extending the definitions of trust and obfuscation into this emerging application space. We, then, highlight their role as we move from the tightly-coupled to loosely-coupled sensory-inference systems and describe how quality, value and risk of information relate in collaborative and adversarial systems. Next, we discuss quality distortion illustrated through a human activity recognition sensory system. We then present a system architecture to support an inference firewall capability in a publish/subscribe system for sensory information and conclude with a discussion and closing remarks.

[1]  John Krumm,et al.  Inference Attacks on Location Tracks , 2007, Pervasive.

[2]  Chatschik Bisdikian,et al.  Selecting Relevant Sensor Providers for Meeting "Your" Quality Information Needs , 2011, 2011 IEEE 12th International Conference on Mobile Data Management.

[3]  Michael Hicks,et al.  Deanonymizing mobility traces: using social network as a side-channel , 2012, CCS.

[4]  Mani B. Srivastava,et al.  Trust and obfuscation principles for quality of information in emerging pervasive environments , 2012, 2012 IEEE International Conference on Pervasive Computing and Communications Workshops.

[5]  J. Ross Quinlan,et al.  C4.5: Programs for Machine Learning , 1992 .

[6]  Guy Pujolle,et al.  An XML Model for SLA Definition with Key Indicators , 2007, IPOM.

[7]  Peter Steenkiste,et al.  Access control to people location information , 2005, TSEC.

[8]  Nicholas R. Jennings,et al.  TRAVOS: Trust and Reputation in the Context of Inaccurate Information Sources , 2006, Autonomous Agents and Multi-Agent Systems.

[9]  Douglas M. Blough,et al.  Data obfuscation: anonymity and desensitization of usable data sets , 2004, IEEE Security & Privacy Magazine.

[10]  Jie Zhang,et al.  A COMPREHENSIVE APPROACH FOR SHARING SEMANTIC WEB TRUST RATINGS , 2007, Comput. Intell..

[11]  Diogo R. Ferreira,et al.  Preprocessing techniques for context recognition from accelerometer data , 2010, Personal and Ubiquitous Computing.

[12]  Vitaly Shmatikov,et al.  Robust De-anonymization of Large Sparse Datasets , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).

[13]  Paul Ohm Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization , 2009 .

[14]  David L. Black,et al.  An Architecture for Differentiated Service , 1998 .

[15]  H. Nissenbaum Privacy as contextual integrity , 2004 .

[16]  Charu C. Aggarwal,et al.  On the design and quantification of privacy preserving data mining algorithms , 2001, PODS.

[17]  James Won-Ki Hong,et al.  OSLAM: Towards ontology-based SLA management for IPTV services , 2011, 12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops.

[18]  Philip S. Yu,et al.  Truth Discovery with Multiple Conflicting Information Providers on the Web , 2007, IEEE Transactions on Knowledge and Data Engineering.

[19]  Gene T. Whipps,et al.  A dynamic infrastructure for interconnecting disparate ISR/ISTAR assets (the ITA sensor fabric) , 2009, 2009 12th International Conference on Information Fusion.

[20]  Abbe Mowshowitz,et al.  Experimental Evaluation of the Performance and Scalability of a Dynamic Distributed Federated Database , 2009 .

[21]  Christine Julien,et al.  Quality-of-inference (QoINF)-aware context determination in assisted living environments , 2009, WiMD '09.

[22]  A. Jøsang,et al.  Filtering Out Unfair Ratings in Bayesian Reputation Systems , 2004 .

[23]  Hong Linh Truong,et al.  MQTT-S — A publish/subscribe protocol for Wireless Sensor Networks , 2008, 2008 3rd International Conference on Communication Systems Software and Middleware and Workshops (COMSWARE '08).

[24]  Lars Kulik,et al.  A Formal Model of Obfuscation and Negotiation for Location Privacy , 2005, Pervasive.

[25]  Mani B. Srivastava,et al.  Balancing value and risk in information sharing through obfuscation , 2012, 2012 15th International Conference on Information Fusion.

[26]  Zainul Charbiwala,et al.  Balancing behavioral privacy and information utility in sensory data flows , 2012, Pervasive Mob. Comput..

[27]  Munindar P. Singh,et al.  Detecting deception in reputation management , 2003, AAMAS '03.

[28]  Diane M. Strong,et al.  Beyond Accuracy: What Data Quality Means to Data Consumers , 1996, J. Manag. Inf. Syst..

[29]  Mani B. Srivastava,et al.  Building principles for a quality of information specification for sensor information , 2009, 2009 12th International Conference on Information Fusion.

[30]  David Howard,et al.  A Comparison of Feature Extraction Methods for the Classification of Dynamic Activities From Accelerometer Data , 2009, IEEE Transactions on Biomedical Engineering.

[31]  Mani B. Srivastava,et al.  Privacy risks emerging from the adoption of innocuous wearable sensors in the mobile environment , 2011, CHI.

[32]  Deborah Estrin,et al.  Using mobile phones to determine transportation modes , 2010, TOSN.

[33]  Lance Kaplan,et al.  On truth discovery in social sensing: A maximum likelihood estimation approach , 2012, 2012 ACM/IEEE 11th International Conference on Information Processing in Sensor Networks (IPSN).

[34]  Jadwiga Indulska,et al.  A survey of context modelling and reasoning techniques , 2010, Pervasive Mob. Comput..

[35]  Ling Bao,et al.  Activity Recognition from User-Annotated Acceleration Data , 2004, Pervasive.

[36]  J. H. Davis,et al.  An Integrative Model Of Organizational Trust , 1995 .

[37]  C. Badcock,et al.  Trust : making and breaking cooperative relations , 1989 .

[38]  G. Lewis,et al.  Service Level Agreements in Service-Oriented Architecture Environments , 2008 .

[39]  Katia P. Sycara,et al.  Stereotypical trust and bias in dynamic multiagent systems , 2013, TIST.