T OWARDS P RIVACY -S ENSITIVE P ARTICIPATORY S ENSING K.L. Huang, S. S. Kanhere and W. Hu Presented by Richard Lin Zhou.

Slides:



Advertisements
Similar presentations
On method-specific record linkage for risk assessment Jordi Nin Javier Herranz Vicenç Torra.
Advertisements

LASTor: A Low-Latency AS-Aware Tor Client
21-1 Last time Database Security  Data Inference  Statistical Inference  Controls against Inference Multilevel Security Databases  Separation  Integrity.
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
SDC for continuous variables under edit restrictions Natalie Shlomo & Ton de Waal UN/ECE Work Session on Statistical Data Editing, Bonn, September 2006.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Statistical database security Special purpose: used only for statistical computations. General purpose: used with normal queries (and updates) as well.
Chapter 1 – Introduction
Clustering short time series gene expression data Jason Ernst, Gerard J. Nau and Ziv Bar-Joseph BIOINFORMATICS, vol
Wide-scale Botnet Detection and Characterization Anestis Karasaridis, Brian Rexroad, David Hoeflin.
Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming, but on our own readiness to receive him; not.
Clustering (Part II) 10/07/09. Outline Affinity propagation Quality evaluation.
C MU U sable P rivacy and S ecurity Laboratory 1 Privacy Policy, Law and Technology Data Privacy October 30, 2008.
Efficient Monitoring of QoS Parameters (EMQP) Authors: Vadim Drabkin Arie Orlovsky Constantine Elster Instructors: Dr. Danny Raz Mr. Ran Wolff.
Privacy without Noise Yitao Duan NetEase Youdao R&D Beijing China CIKM 2009.
Applied Cryptography for Network Security
Ranking by Odds Ratio A Probability Model Approach let be a Boolean random variable: document d is relevant to query q otherwise Consider document d as.
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Chapter 1 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
BA 427 – Assurance and Attestation Services
Evaluating Performance for Data Mining Techniques
Database Laboratory Regular Seminar TaeHoon Kim.
Automatic Gender Identification using Cell Phone Calling Behavior Presented by David.
1 Cryptography and Network Security Fourth Edition by William Stallings Lecture slides by Lawrie Brown Changed by: Somesh Jha [Lecture 1]
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
Computer Implementation of Genetic Algorithm
Cryptography and Network Security
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
COMP53311 Clustering Prepared by Raymond Wong Some parts of this notes are borrowed from LW Chan ’ s notes Presented by Raymond Wong
Unsupervised Learning Reading: Chapter 8 from Introduction to Data Mining by Tan, Steinbach, and Kumar, pp , , (
Disclosure Avoidance: An Overview Irene Wong ACCOLEDS/DLI Training December 8, 2003.
Disclosure risk when responding to queries with deterministic guarantees Krish Muralidhar University of Kentucky Rathindra Sarathy Oklahoma State University.
1 Assessing the Impact of SDC Methods on Census Frequency Tables Natalie Shlomo Southampton Statistical Sciences Research Institute University of Southampton.
Cluster analysis 포항공과대학교 산업공학과 확률통계연구실 이 재 현. POSTECH IE PASTACLUSTER ANALYSIS Definition Cluster analysis is a technigue used for combining observations.
Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data.
Preserving Privacy in Participatory Sensing Systems Authors: Kuan Lun Huang, Salil S. Kanhere (School of CS & Engg., The University of New South Wales,
1 Webcam Mouse Using Face and Eye Tracking in Various Illumination Environments Yuan-Pin Lin et al. Proceedings of the 2005 IEEE Y.S. Lee.
Survey on Privacy-Related Technologies Presented by Richard Lin Zhou.
The use of protected microdata in tabulation: case of SDC-methods microaggregation and PRAM Researcher Janika Konnu Manchester, United Kingdom December.
Cryptography and Network Security (CS435) Part One (Introduction)
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Security Control Methods for Statistical Database Li Xiong CS573 Data Privacy and Security.
An Energy Efficient Hierarchical Clustering Algorithm for Wireless Sensor Networks Seema Bandyopadhyay and Edward J. Coyle Presented by Yu Wang.
Additive Data Perturbation: the Basic Problem and Techniques.
WP 19 Assessment of Statistical Disclosure Control Methods for the 2001 UK Census Natalie Shlomo University of Southampton Office for National Statistics.
The Volcano Optimizer Generator Extensibility and Efficient Search.
Randomization in Privacy Preserving Data Mining Agrawal, R., and Srikant, R. Privacy-Preserving Data Mining, ACM SIGMOD’00 the following slides include.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Privacy vs. Utility Xintao Wu University of North Carolina at Charlotte Nov 10, 2008.
New Measures of Data Utility Mi-Ja Woo National Institute of Statistical Sciences.
Privacy-preserving data publishing
Machine Learning Queens College Lecture 7: Clustering.
Chapter 20 Classification and Estimation Classification – Feature selection Good feature have four characteristics: –Discrimination. Features.
Location Privacy Protection for Location-based Services CS587x Lecture Department of Computer Science Iowa State University.
Week Aug-24 – Aug-29 Introduction to Spatial Computing CSE 5ISC Some slides adapted from the book Computing with Spatial Trajectories, Yu Zheng and Xiaofang.
1 Privacy Preserving Data Mining Introduction August 2 nd, 2013 Shaibal Chakrabarty.
Security Methods for Statistical Databases. Introduction  Statistical Databases containing medical information are often used for research  Some of.
Privacy Preserving in Social Network Based System PRENTER: YI LIANG.
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
WFM 6202: Remote Sensing and GIS in Water Management © Dr. Akm Saiful IslamDr. Akm Saiful Islam WFM 6202: Remote Sensing and GIS in Water Management Dr.
By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah Umm Al-Qura University, KSA, Makkah 1.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Reconciling Confidentiality Risk Measures from Statistics and Computer Science Jerry Reiter Department of Statistical Science Duke University.
11 Measuring Disclosure Risk and Data Utility for Flexible Table Generators Natalie Shlomo, Laszlo Antal, Mark Elliot University of Manchester
Information Security.
Disclosure Avoidance: An Overview
Presented by : SaiVenkatanikhil Nimmagadda
SHUFFLING-SLICING IN DATA MINING
SAFE – a method for anonymising the German Census
Presentation transcript:

T OWARDS P RIVACY -S ENSITIVE P ARTICIPATORY S ENSING K.L. Huang, S. S. Kanhere and W. Hu Presented by Richard Lin Zhou

O VERVIEW Significance of Privacy Sensitiveness Earlier Developments (Tessellation) Microaggregation Combining both techniques (Hybrid V-MDAV) Gaussian Perturbation

S IGNIFICANCE OF P RIVACY -S ENSITIVENESS Participatory sensing application requires personal information Relies on altruistic participation Users needs to be assured of their privacy not being violated

E ARLIER DEVELOPMENTS Anonysense (Tessellation) Presented earlier by L. Tussing Divide users into groups of tiles. Generalization guided by the principle of k- anonymity.

L IMITATIONS OF T ESSELLATION Not suitable for application that require fine- grained information. Application that collects traffic information Reports generated for different intersections associated with the same Tile ID. Not useful for information purposes.

M ODIFIED T ESSELLATION To allow calculation of distance by points Report the center point of the Tile rather than Tile ID

L IMITATIONS OF T ESSELLATION Petrol Watch

M ICROAGGREGATION Used for implementing database disclosure control No generalization nor suppression of the values of an attribute Replaces the values with the mean of the Equivalence Classes (EC) in which the record is found Member similarities often quantified by the Information Loss (IL) metric Maximum Distance to Average Vector (MDAV) widely recognized as one of the most efficient heuristics to date.

M AXIMUM D ISTANCE TO A VERAGE V ECTOR (MDAV) A LGORITHM Fixed Sized Algorithm Variable class size version: V-MDAV Involves two principal successive operations 1. Equivalence Class (EC) generation Clusters users who exhibit high geographic similarities in groups of k Ensures that k -anonymity is enforced 2. EC extension Merge geographically close users with an existing EC

V-MDAV Petrol Watch

C ASES THAT V-MDAV N OT P ERFORMING

T ESSELLATION V.S. M-MDAV V-MDAV enables the application to make better decisions when the user distribution across different areas is consistent, as in In areas with dense distribution of users, Tessellation performs better. So which to use?

C OMBINE T ESSELLATION AND V-MDAV Hybrid V-MDAV If the number of users within the cell exceeds k, then MT is used Otherwise, the algorithm switches to V-MDAV

E XPERIMENTS

E VALUATION

G AUSSIAN I NPUT P ERTURBATION Previous methods assume the existence of a trusted third-party server, which is aware of the true locations of the participating users. If this server is compromised, the users’ privacy is at risk Solution: Adding a random Gaussian noise with mean μ and standard deviation σ to the X and Y Perturbed location: p : scaling variable

I MPACT OF G AUSSIAN P ERTURBATION

C ONCLUSION Hybrid V-MDAV combines the positive aspects of tessellation and microaggregation. Improves Positive Identification by 100% Decreases Information Loss by 40% Gaussian Perturbation added extra layer of privacy protection