Computational data privacy in wireless networks

Wireless networks appeal to privacy eavesdroppers that secretly capture packets from the open medium and read the metadata and data content in search of any type of information through data mining and statistical analysis. Addressing the problems of personal privacy for wireless users will require flexible privacy protection mechanisms adaptively to the frequently varying context. Privacy quantification is prerequisite for enabling a context-aware privacy protection in wireless networks. This paper proposes to quantify the data privacy during wireless communication processes. We give a computational quantification method of data privacy through introducing the concepts of privacy entropy and privacy joint entropy, which permits users and applications to on-demand customize their preferential sensitivity extent of privacy leakage and protection strength. Accordingly, we put forward a data-privacy protection scheme in order to explain how to utilize the proposed computational quantification method of data privacy against the excessive disclosure of data privacy. The results show that the computational quantitation method can effectively characterize the real-time fluctuation of data privacy during communication processes and provide the reliable judgment to context-aware privacy protection, which enables to real-timely control the present data privacy to an anticipated target and to balance a tradeoff between the data privacy and communication efficiency.

[1]  R. Gray Entropy and Information Theory , 1990, Springer New York.

[2]  Charles Elkan,et al.  Differential privacy based on importance weighting , 2013, Machine Learning.

[3]  Ljiljana Brankovic,et al.  Quantifying Privacy: A Novel Entropy-Based Measure of Disclosure Risk , 2014, IWOCA.

[4]  Justin Zhijun Zhan,et al.  Quantifying Privacy for Privacy Preserving Data Mining , 2007, 2007 IEEE Symposium on Computational Intelligence and Data Mining.

[5]  Snehal M. Kamlapur,et al.  Privacy preserving techniques for storage privacy attacks: A survey , 2012, 2012 12th International Conference on Hybrid Intelligent Systems (HIS).

[6]  Vittorio Scarano,et al.  Privacy leakage on the Web: Diffusion and countermeasures , 2013, Comput. Networks.

[7]  Wanlei Zhou,et al.  Privacy Protected Data Forwarding in Human Associated Delay Tolerant Networks , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.

[8]  Pierangela Samarati,et al.  Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression , 1998 .

[9]  Qingshui Li,et al.  An Improved Association Rule Privacy Protection Algorithm Research , 2012, ICICA.

[10]  Philip S. Yu,et al.  Privacy-preserving data publishing: A survey of recent developments , 2010, CSUR.

[11]  David W. Chadwick,et al.  A privacy preserving authorisation system for the cloud , 2012, J. Comput. Syst. Sci..

[12]  Helen J. Wang,et al.  Preserving location privacy in wireless lans , 2007, MobiSys '07.

[13]  Charu C. Aggarwal,et al.  On the design and quantification of privacy preserving data mining algorithms , 2001, PODS.

[14]  Reihaneh Safavi-Naini,et al.  A practice-oriented framework for measuring privacy and utility in data sanitization systems , 2010, EDBT '10.

[15]  Ashwin Machanavajjhala,et al.  l-Diversity: Privacy Beyond k-Anonymity , 2006, ICDE.

[16]  Jinjun Chen,et al.  A Privacy-Leakage-Tolerance Based Noise Enhancing Strategy for Privacy Protection in Cloud Computing , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.

[17]  David Sánchez,et al.  A semantic framework to protect the privacy of electronic health records with non-numerical attributes , 2013, J. Biomed. Informatics.

[18]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[19]  Jean-Yves Le Boudec,et al.  Quantifying Location Privacy , 2011, 2011 IEEE Symposium on Security and Privacy.

[20]  Cynthia Dwork,et al.  Differential Privacy , 2006, ICALP.

[21]  A. W. Roscoe,et al.  User interactive Internet of things privacy preserved access control , 2012, 2012 International Conference for Internet Technology and Secured Transactions.

[22]  Liehuang Zhu,et al.  LESPP: lightweight and efficient strong privacy preserving authentication scheme for secure VANET communication , 2014, Computing.

[23]  Ninghui Li,et al.  t-Closeness: Privacy Beyond k-Anonymity and l-Diversity , 2007, 2007 IEEE 23rd International Conference on Data Engineering.

[24]  Elisa Bertino,et al.  A Survey of Quantification of Privacy Preserving Data Mining Algorithms , 2008, Privacy-Preserving Data Mining.