HCFContext: Smartphone Context Inference via Sequential History-based Collaborative Filtering

Mobile context determination is an important step for many context-aware services such as location-based services, enterprise policy enforcement, building/room occupancy detection for power/HVAC operation, etc. Especially in enterprise scenarios where policies (e.g., attending a confidential meeting only when the user is in "Location X") are defined based on mobile context, it is paramount to verify the accuracy of the mobile context. To this end, two stochastic models based on the theory of Hidden Markov Models (HMMs) to obtain mobile context are proposed—personalized model (HPContext) and collaborative filtering model (HCFContext). The former predicts the current context using sequential history of the user’s past context observations; the latter enhances HPContext with collaborative filtering features, which enables it to predict the current context of the primary user based on the context observations of users related to the primary user, e.g., same team colleagues in company, gym friends, family members, etc. Each of the proposed models can also be used to enhance/complement the context obtained from sensors. Furthermore, since privacy is a concern in collaborative filtering, a privacy-preserving method is proposed to derive HCFContext model parameters based on the concepts of homomorphic encryption. Finally, these models are thoroughly validated on a real-life dataset.

[1]  Saman A. Zonouz,et al.  Don't Just BYOD, Bring-Your-Own-App Too! Protection via Virtual Micro Security Perimeters , 2016, 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).

[2]  Hui Xiong,et al.  An unsupervised approach to modeling personalized contexts of mobile users , 2010, 2010 IEEE International Conference on Data Mining.

[3]  Matthew Roughan,et al.  Multi-Observer Privacy-Preserving Hidden Markov Models , 2012, IEEE Transactions on Signal Processing.

[4]  Nasser M. Nasrabadi,et al.  Pattern Recognition and Machine Learning , 2006, Technometrics.

[5]  Bhiksha Raj,et al.  Privacy preserving probabilistic inference with Hidden Markov Models , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[6]  Parimal Parag,et al.  Minimizing latency for secure distributed computing , 2017, 2017 IEEE International Symposium on Information Theory (ISIT).

[7]  Angelo M. Sabatini,et al.  Machine Learning Methods for Classifying Human Physical Activity from On-Body Accelerometers , 2010, Sensors.

[8]  Daniel Gatica-Perez,et al.  A probabilistic approach to mining mobile phone data sequences , 2013, Personal and Ubiquitous Computing.

[9]  Zhigang Liu,et al.  Darwin phones: the evolution of sensing and inference on mobile phones , 2010, MobiSys '10.

[10]  Hojung Cha,et al.  Mobility prediction-based smartphone energy optimization for everyday location monitoring , 2011, SenSys.

[11]  Luís A. Castro,et al.  Collaborative opportunistic sensing with mobile phones , 2014, UbiComp Adjunct.

[12]  Hiroaki Kikuchi,et al.  Privacy-Preserving Collaborative Filtering Schemes , 2009, 2009 International Conference on Availability, Reliability and Security.

[13]  Aakanksha Chopra Comparative Analysis of Key Exchange Algorithms in Cryptography and its Implementation , 2015 .

[14]  Sheng Zhong,et al.  A Privacy Preserving Markov Model for Sequence Classification , 2013, BCB.

[15]  Gregor Heinrich Parameter estimation for text analysis , 2009 .

[16]  Johan Himberg,et al.  Collaborative context recognition for handheld devices , 2003, Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, 2003. (PerCom 2003)..

[17]  Vijay Srinivasan,et al.  Adding intelligence to your mobile device via on-device sequential pattern mining , 2014, UbiComp Adjunct.

[18]  Wenliang Du,et al.  Privacy-preserving collaborative filtering using randomized perturbation techniques , 2003, Third IEEE International Conference on Data Mining.

[19]  Huseyin Polat,et al.  Providing predictions on distributed HMMs with privacy , 2009, Artificial Intelligence Review.

[20]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[21]  Dario Pompili,et al.  CollabLoc: Privacy-Preserving Multi-Modal Localization via Collaborative Information Fusion , 2017, 2017 26th International Conference on Computer Communication and Networks (ICCCN).

[22]  Mirco Musolesi,et al.  Anticipatory Mobile Computing , 2013, ACM Comput. Surv..

[23]  Douglas M. Blough,et al.  Privacy Preserving Collaborative Filtering Using Data Obfuscation , 2007, 2007 IEEE International Conference on Granular Computing (GRC 2007).

[24]  Srdjan Capkun,et al.  On the requirements for successful GPS spoofing attacks , 2011, CCS '11.

[25]  D. Kulić,et al.  Automatic Human Motion Segmentation and Identification using Feature Guided HMM for Physical Rehabilitation Exercises , 2011 .

[26]  Stephanie Vogelgesang,et al.  Pokémon GO , 2016, Informatik-Spektrum.

[27]  Douglas M. Blough,et al.  Privacy Preserving Collaborative Filtering Using Data Obfuscation , 2007 .

[28]  S. Eddy Hidden Markov models. , 1996, Current opinion in structural biology.

[29]  Saeed Moghaddam,et al.  MobileMiner: mining your frequent patterns on your phone , 2014, UbiComp.