Privacy-Aware Sensor Data Upload Management for Securely Receiving Smart Home Services

Recently smart homes equipped with many sensors and IoT devices are widespread. However, when smart home users receive smart home services like elderly monitoring, they need to upload their privacy sensitive data to potentially untrusted cloud servers where the service quality (user's benefit) depends on the amount/frequency of the uploaded data. In this paper, aiming to minimize the risk of privacy leakage and maximize users' benefit obtained through services, we propose a novel privacy-aware data management method that works on a smart-home system composed of smart homes with sensors, edge computing servers, and a cloud server. We formulate a combinatorial optimization problem which determines the best choice of data type (raw or activity label recognized at the edge) and upload frequency in each time slot taking into account the constraints of edge server resources and users' budgets as well as the k-anonymity of activities and users' preferences. Since the target problem is NP-hard, we propose a heuristic algorithm to derive semi-optimal solutions by determining choices with better objective function values in a greedy manner. Through experiments using smart-home open dataset, we confirmed that the proposed method outperforms the conventional methods using only a cloud server.

[1]  Jiming Chen,et al.  Privacy and performance trade-off in cyber-physical systems , 2016, IEEE Network.

[2]  Giovanni Stea,et al.  Mobile-Edge Computing Come Home Connecting things in future smart homes using LTE device-to-device communications , 2016, IEEE Consumer Electronics Magazine.

[3]  Xu Chen,et al.  Cost-Effective and Privacy-Preserving Energy Management for Smart Meters , 2015, IEEE Transactions on Smart Grid.

[4]  Eric G. Manning,et al.  Heuristic Solutions for the Multiple-Choice Multi-dimension Knapsack Problem , 2001, International Conference on Computational Science.

[5]  Ying-Tsung Lee,et al.  Privacy-preserving data analytics in cloud-based smart home with community hierarchy , 2017, IEEE Transactions on Consumer Electronics.

[6]  Mianxiong Dong,et al.  Ontology-based data semantic management and application in IoT- and cloud-enabled smart homes , 2017, Future Gener. Comput. Syst..

[7]  Keiichi Yasumoto,et al.  Decision making support for privacy data upload in smart home , 2019, UbiComp/ISWC Adjunct.

[8]  Sandeep K. Sood,et al.  Fog Assisted-IoT Enabled Patient Health Monitoring in Smart Homes , 2018, IEEE Internet of Things Journal.

[9]  Rajkumar Buyya,et al.  ROUTER: Fog enabled cloud based intelligent resource management approach for smart home IoT devices , 2019, J. Syst. Softw..

[10]  Pierangela Samarati,et al.  Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression , 1998 .

[11]  Hirozumi Yamaguchi,et al.  In-Situ Resource Provisioning with Adaptive Scale-out for Regional IoT Services , 2018, 2018 IEEE/ACM Symposium on Edge Computing (SEC).

[12]  Diane J. Cook,et al.  CASAS: A Smart Home in a Box , 2013, Computer.

[13]  Sang Hyuk Son,et al.  Energy-Efficient Privacy Protection for Smart Home Environments Using Behavioral Semantics , 2014, Sensors.

[14]  Eui-nam Huh,et al.  Fog Computing and Smart Gateway Based Communication for Cloud of Things , 2014, 2014 International Conference on Future Internet of Things and Cloud.

[15]  Francesco Palmieri,et al.  Multi-layer cloud architectural model and ontology-based security service framework for IoT-based smart homes , 2018, Future Gener. Comput. Syst..

[16]  Weihua Sheng,et al.  Delivering home healthcare through a Cloud-based Smart Home Environment (CoSHE) , 2018, Future Gener. Comput. Syst..

[17]  Antorweep Chakravorty,et al.  Privacy Preserving Data Analytics for Smart Homes , 2013, 2013 IEEE Security and Privacy Workshops.

[18]  Yuguang Fang,et al.  EPIC: A Differential Privacy Framework to Defend Smart Homes Against Internet Traffic Analysis , 2018, IEEE Internet of Things Journal.

[19]  Frederik Armknecht,et al.  A Guide to Fully Homomorphic Encryption , 2015, IACR Cryptol. ePrint Arch..