An information-aware visualization for privacy-preserving accelerometer data sharing

In the age of big data, plenty of valuable sensing data have been shared to enhance scientific innovation. However, this may cause unexpected privacy leakage. Although numerous privacy preservation techniques, such as perturbation, encryption, and anonymization, have been proposed to conceal sensitive information, it is usually at the cost of the application utility. Moreover, most of the existing works did not distinguished the underlying factors, such as data features and sampling rate, which contribute differently to utility and privacy information implied in the shared data. To well balance the application utility and privacy leakage for data sharing, we utilize mutual information and visualization techniques to analyze the impact of the underlying factors on utility and privacy, respectively, and design an interactive visualization tool to help users identify the appropriate solution to achieve the objectives of high application utility and low privacy leakage simultaneously. To illustrate the effectiveness of the proposed scheme and tool, accelerometer data collected from mobile devices have been adopted as an illustrative example. Experimental study has shown that feature selection and sampling frequency play dominant roles in reducing privacy leakage with much less reduction on utility, and the proposed visualization tool can effectively recommend the appropriate combination of features and sampling rates that can help users make decision on the trade-off between utility and privacy.

[1]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[2]  Ashwin Machanavajjhala,et al.  l-Diversity: Privacy Beyond k-Anonymity , 2006, ICDE.

[3]  Luís A. Castro,et al.  Towards a federated repository of mobile sensing datasets for pervasive healthcare , 2016, PervasiveHealth.

[4]  Ahmad Akbari,et al.  An improved feature transformation method using mutual information , 2014, Int. J. Speech Technol..

[5]  Valli Kumari Vatsavayi,et al.  Cooperative privacy game: a novel strategy for preserving privacy in data publishing , 2016, Human-centric Computing and Information Sciences.

[6]  Yuqing Chen,et al.  A Deep Learning Approach to Human Activity Recognition Based on Single Accelerometer , 2015, 2015 IEEE International Conference on Systems, Man, and Cybernetics.

[7]  Jin Li,et al.  Privacy-preserving Naive Bayes classifiers secure against the substitution-then-comparison attack , 2018, Inf. Sci..

[8]  Yasushi Makihara,et al.  The largest inertial sensor-based gait database and performance evaluation of gait-based personal authentication , 2014, Pattern Recognit..

[9]  Ninghui Li,et al.  t-Closeness: Privacy Beyond k-Anonymity and l-Diversity , 2007, 2007 IEEE 23rd International Conference on Data Engineering.

[10]  Cem Ersoy,et al.  A Review and Taxonomy of Activity Recognition on Mobile Phones , 2013 .

[11]  Gary M. Weiss,et al.  Cell phone-based biometric identification , 2010, 2010 Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS).

[12]  Tao Peng,et al.  Collaborative trajectory privacy preserving scheme in location-based services , 2017, Inf. Sci..

[13]  Mikko Lindholm,et al.  Identifying people from gait pattern with accelerometers , 2005, SPIE Defense + Commercial Sensing.

[14]  Nathan Chenette,et al.  Order-Preserving Symmetric Encryption , 2009, IACR Cryptol. ePrint Arch..

[15]  Qin Liu,et al.  Hierarchical Multi-Authority and Attribute-Based Encryption Friend Discovery Scheme in Mobile Social Networks , 2016, IEEE Communications Letters.

[16]  Arpita Ghosh,et al.  Inferential Privacy Guarantees for Differentially Private Mechanisms , 2016, ITCS.

[17]  Gary M. Weiss,et al.  Activity recognition using cell phone accelerometers , 2011, SKDD.

[18]  Paul J. M. Havinga,et al.  A Survey of Online Activity Recognition Using Mobile Phones , 2015, Sensors.

[19]  Jemal H. Abawajy,et al.  Privacy-preserving multi-hop profile-matching protocol for proximity mobile social networks , 2017, Future Gener. Comput. Syst..

[20]  Mimmo Parente,et al.  An AmI-based and privacy-preserving shopping mall model , 2017, Human-centric Computing and Information Sciences.

[21]  Dan Meng,et al.  An Information-Aware Privacy-Preserving Accelerometer Data Sharing , 2017, ICPCSEE.

[22]  Alastair R. Beresford,et al.  Device Analyzer: Understanding Smartphone Usage , 2013, MobiQuitous.

[23]  Bruno Lepri,et al.  Investigating Factors Affecting Personal Data Disclosure , 2015, WWW.

[24]  Siu-Ming Yiu,et al.  Multi-key privacy-preserving deep learning in cloud computing , 2017, Future Gener. Comput. Syst..

[25]  Jihoon Kim,et al.  PRINCESS: Privacy‐protecting Rare disease International Network Collaboration via Encryption through Software guard extensionS , 2017, Bioinform..

[26]  Vassilis Koutkias,et al.  A Survey of Mobile Phone Sensing, Self-Reporting, and Social Sharing for Pervasive Healthcare , 2017, IEEE Journal of Biomedical and Health Informatics.

[27]  Patrick Bours,et al.  Gait and activity recognition using commercial phones , 2013, Comput. Secur..

[28]  Mark S. Nixon,et al.  Gait Feature Subset Selection by Mutual Information , 2007, 2007 First IEEE International Conference on Biometrics: Theory, Applications, and Systems.

[29]  Xuan Li,et al.  Cloud-assisted privacy-preserving profile-matching scheme under multiple keys in mobile social network , 2018, Cluster Computing.

[30]  Corrado Moiso,et al.  Anonymous or Not? Understanding the Factors Affecting Personal Mobile Data Disclosure , 2017, ACM Trans. Internet Techn..

[31]  Ke Wang,et al.  Inferential or Differential: Privacy Laws Dictate , 2012, ArXiv.

[32]  Norman Sadeh,et al.  Understanding and capturing people's mobile app privacy preferences , 2013 .

[33]  Roberto Battiti,et al.  Using mutual information for selecting features in supervised neural net learning , 1994, IEEE Trans. Neural Networks.

[34]  Wendy Hui Wang,et al.  Privacy-preserving data publishing , 2010, 2010 IEEE 26th International Conference on Data Engineering Workshops (ICDEW 2010).

[35]  Ramakrishnan Srikant,et al.  Privacy-preserving data mining , 2000, SIGMOD '00.

[36]  Ashwin Machanavajjhala,et al.  Privacy-Preserving Data Publishing , 2009, Found. Trends Databases.

[37]  Jane Labadin,et al.  Feature selection based on mutual information , 2015, 2015 9th International Conference on IT in Asia (CITA).

[38]  Nobuhiko Nishio,et al.  HASC Challenge: gathering large scale human activity corpus for the real-world activity understandings , 2011, AH '11.

[39]  Jie Wu,et al.  Preserving Privacy with Probabilistic Indistinguishability in Weighted Social Networks , 2017, IEEE Transactions on Parallel and Distributed Systems.

[40]  Nabil R. Adam,et al.  Security-control methods for statistical databases: a comparative study , 1989, ACM Comput. Surv..

[41]  Ki-Ryong Kwon,et al.  Selective Encryption Algorithm Using Hybrid Transform for GIS Vector Map , 2017, J. Inf. Process. Syst..

[42]  Keke Gai,et al.  Privacy-Preserving Data Encryption Strategy for Big Data in Mobile Cloud Computing , 2017, IEEE Transactions on Big Data.

[43]  Philip S. Yu,et al.  Privacy-preserving data publishing: A survey of recent developments , 2010, CSUR.

[44]  Xianxia Zou,et al.  Query with SUM Aggregate Function on Encrypted Floating-Point Numbers in Cloud , 2017, J. Inf. Process. Syst..

[45]  Sabina Jeschke,et al.  Mobile Crowd‐Sensing for Smart Cities , 2017 .

[46]  Cynthia Dwork International Conference on Theory and Applications of Models of Computation , 2008 .