ABSTRACT
A large-scale sensing infrastructure can collect ample data to benefit many real-world applications. One promising application scenario is building management. However, exposure of the sensor data potentially reveals private details about building users. In this paper, we investigate indoor location privacy as a motivating example to manifest potential privacy risks in smart buildings. We apply inference techniques to reconstruct users' location traces from room-level occupancy data. Unlike other types of surveillance that are dedicated to explicit tracking such as security cam- eras, time-series occupancy traces, as aggregated environmental measurements, are typically deemed privacy-preserving. Unfortunately, it may still reveal some of the same sensitive information as privacy-invasive sensing such as video surveillance. We con- duct experiments using a publicly available dataset and synthetic data. Our results demonstrate the underlying privacy leakage via occupancy data. We further show how our evaluation can enable adaptive privacy mechanisms to control the information leakage by the sensing system.
- . Rowe, M.E. Berges, G. Bhatia, E. Goldman, R. Rajkumar, J.H. Garrett, J.M.F. Moura, L. Soibelman, "Sensor Andrew: Large-scale campus-wide sensing and actuation," IBM Journal of Research and Development, vol.55, no.1.2, pp.6:1,6:14, 2011. Google ScholarDigital Library
- . Xu, "A survey of sensor network applications," IEEE Communications Magazine, 2002.Google Scholar
- . Bourgeois, C. Reinhart and I. Macdonald, "Adding advanced behavioural modelsin whole building energy simulation: a study on the total energy impact of manual and automated lighting control," Energy and Buildings, 38(7):814--823, July 2006.Google ScholarCross Ref
- . Nguyen and M. Aiello, "Energy intelligent buildings based on user activity: A survey," Energy and Buildings, no. 56, pp. 244--257, January 2013.Google Scholar
- . Wood, G. Virone, T. Doan, Q. Cao, L. Selavo, Y. Wu, L. Fang, Z. He, S. Lin and J. Stankovic, "ALARM-NET: Wireless sensor networks for assisted-living and residential monitoring," TechnicalReport CS-2006-11, Department of Computer Science, University of Virginia, 2006.Google Scholar
- http://enlightedinc.com/solutions/products/Google Scholar
- http://redwoodsys.com/solutionsGoogle Scholar
- K. Framling, I. Oliver, J. Honkola, J. Nyman, "Smart spaces for ubiquitouslysmart buildings," the IEEE Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies(UBICOMM'09), 2009. Google ScholarDigital Library
- J. Kleissl, Y. Agarwal, "Cyber-physical energy systems: focus on smart buildings," the 47th Design Automation Conference (DAC'10), New York, NY, USA, 749--754, 2010. Google ScholarDigital Library
- Y. Agarwal, B. Balaji, R. Gupta, J. Lyles, M. Wei, T. Weng, "Occupancy-driven energy management for smartbuilding automation," BuildSys'10, pages 1--6, New York, NY,USA, 2010. Google ScholarDigital Library
- S.K. Ghai, L.V. Thanayankizil, D.P. Seetharam, D. Chakraborty, "Occupancy detection in commercial buildings using opportunistic context sources," the IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM'12), 2012.Google Scholar
- V.L. Erickson, A.E. Cerpa, ";Occupancy based demandresponse HVAC control strategy," BuildSys'10, pages 7--12, NewYork, NY, USA, 2010. Google ScholarDigital Library
- J. Scott, A. J. B. Brush, J. Krumm, B. Meyers, M. Hazas,S. Hodges, and N. Villar, "Preheat: controlling homeheating using occupancy prediction," the 13th international conference on Ubiquitous computing (UbiComp'11), New York, NY, USA, 2011. Google ScholarDigital Library
- V.L. Erickson, S. Achleitner, A.E. Cerpa, "POEM: power-efficient occupancy-based energy management system," the 12th international conference on Information processing in sensor networks (IPSN'13), New York, NY, USA, 2013. Google ScholarDigital Library
- F. Manzoor, Z. Cong, P. Stack and K. Menzel, "Tracking occupants and inventoryitems in buildings using RFID technology," the 18th International Conference on the Application ofComputer Science and Mathematics in Architecture and Civil Engineering, Weimar, Germany, July 2009.Google Scholar
- R. Melfi, B. Rosenblum, B. Nordman, K. Christensen, "Measuring building occupancy using existing network infrastructure," Green Computing Conference and Workshops (IGCC), 25--28 July 2011. Google ScholarDigital Library
- T.W. Hnat, E. Griffiths, R. Dawson, and K. Whitehouse, "Doorjamb: unobtrusive room-level tracking of people in homes using doorway sensors," the 10th ACM Conference on Embedded Network Sensor Systems (SenSys'12),, New York, NY, USA, 2012. Google ScholarDigital Library
- V.L. Erickson, M.A. Carreira-Perpinan, A.E. Cerpa, "OBSERVE: Occupancy-based system for efficient reduction of HVAC energy," the 10th Information Processing in Sensor Networks (IPSN'11), April 2011.Google Scholar
- F. Oldewurtel, D. Sturzenegger, M. Morari, "Importance of occupancy information for building climate control," Applied Energy, Volume 101, January 2013.Google Scholar
- A. Beltran, V.L. Erickson, A.E. Cerpa, "ThermoSense: Occupancy Thermal Based Sensing for HVAC Control," the 5th ACM Workshop on Embedded Systems For Energy-Efficient Buildings (BuildSys'13), New York, NY, USA, 2013. Google ScholarDigital Library
- . Balaji, J. Xu, A. Nwokafor, R. Gupta, Y. Agarwal, "Sentinel: occupancy based HVAC actuation using existing WiFi infrastructure within commercial buildings," the 11th ACM Conference on Embedded Networked Sensor Systems (SenSys'13), New York, NY, USA, 2013. Google ScholarDigital Library
- M. Gruteser, G. Schelle, A. Jain, R. Han and D. Grunwald, "Privacy-aware location sensor networks," HotOS IX: the 9th Workshop on Hot Topics in Operating Systems, Lihue, Hawaii, USA,May 2003. Google ScholarDigital Library
- Z. Ghahramani and M.I. Jordan. Factorial hidden Markov models. Machine Learning,29:245--273, 1997. Google ScholarDigital Library
- P. McDaniel, S. McLaughlin, "Security and privacy challenges in the smart grid," Security & Privacy, IEEE, vol.7, no.3, pp.75--77, May-June 2009. Google ScholarDigital Library
- .R. Rajagopalan, L. Sankar, S. Mohajer, H.V. Poor, "Smart meter privacy: autility-privacy framework," the IEEE International Conference on Smart Grid Communications (SmartGridComm), pp. 190--195, 17-20 Oct, 2011.Google Scholar
- G. Pallapa, M.D. Francescoy and S.K. Das, "Adaptive and context-aware privacy preservationschemes exploiting user interactions in pervasive environments," the IEEE International Symposium ona World of Wireless, Mobile and Multimedia Networks (WoWMoM'12), pp.1--6, June 2012.Google Scholar
- G. Pallapa, N. Roy and S. K. Das, "A scheme for quantizing privacy in context-awareubiquitous computing," the 4th International IET Conference on Intelligent Environments, pp.1--8, July2008.Google Scholar
- U. Hengartner and P. Steenkiste, "Avoiding privacy violations caused by context-sensitiveservices," Pervasive and Mobile Computing, 2(4):427--452, 2006.Google ScholarCross Ref
- . Abbasi, A. Khonsari and M. Talebi, "Source location anonymity for sensor networks, "the 6th IEEE Conference on Consumer Communications and Networking Conference (CCNC'09), pp.588--592, 2009. Google ScholarDigital Library
- B. Alomair, A. Clark, J. Cuellar and R. Poovendran, "Towards a statistical frameworkfor source anonymity in sensor networks," IEEE Transactions on Mobile Computing, vol.12, no.2, pp. 248--260,Feb 2013. Google ScholarDigital Library
- S. Chakraborty, K.R. Raghavan, M.P. Johnson and M.B. Srivastava, "A framework for context-aware privacy of sensor data on mobile systems," in Proceedings of the 14th Workshop on Mobile Computing Systems and Applications (HotMobile'13), New York, NY, USA, 2013. Google ScholarDigital Library
- C. Cornelius, A. Kapadia, D. Kotz, D. Peebles, M. Shin and N. Triandopoulos. "AnonySense:privacy aware people-centric sensing," the International Conference on Mobile Systems, Applications,and Services (MobiSys'08), pp.211--224, June 2008. Google ScholarDigital Library
- . Hoh and M. Gruteser, "Protecting location privacy through path confusion," the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks(SecureComm'05), 2005. Google ScholarDigital Library
- W. He, X. Liu, H.V. Nguyen, K. Nahrstedt and T. Abdelzaher, "PDA: Privacy-Preserving Data Aggregation for Information Collection," ACM Trans. Sensor Networks 8, 1, Article 6, August, 2011. Google ScholarDigital Library
- Y. Li and J. Ren, "Preserving source-location privacy in wireless sensor networks," the 6th Annual IEEE Conference on Sensor, Mesh, and Ad Hoc Communications and Networks (SECON';09), pp.493--501,2009. Google ScholarDigital Library
- . Mehta, D. Liu and M. Wright, "Location privacy in sensor networks against a global eavesdropper," the 15th IEEE International Conference on Network Protocols (ICNP'07), pp.314--323, 2007.Google Scholar
- C. Bettini, X.S. Wang and S. Jajodia, "Protecting privacy against location-basedpersonal identification," the 2nd VLDB Workshop SDM, 2005. Google ScholarDigital Library
- T. Xu and Y. Cai, "Feeling-based location privacy protection for location-basedservices," the 16th ACM Conference on Computer and Communications Security (CCS'09), New York, NY,USA, 348--357. Google ScholarDigital Library
- N. Li, N. Zhang, S. Das and B. Thuraisingham, "Privacy preservation in wirelesssensor networks: a state-of-the-art survey," Elsevier Journal on Ad Hoc Networks, 7(8):1501--1514, 2009. Google ScholarDigital Library
- M. Gruteser and D. Grunwald, "Anonymous usage of location-based services throughspatial and temporal cloaking," in MobiSys, pp.31--42, New York, NY, USA, 2003. Google ScholarDigital Library
- J. Krumm, "A survey of computational location privacy," the Personal UbiquitousComputation, 2009. Google ScholarDigital Library
- A. Beresford and F. Stajano, "Location privacy in pervasive computing," Pervasive Computing, IEEE, vol. 2, no. 1, pp.46--55, Jan-Mar 2003. Google ScholarDigital Library
- R. Shokri, G. Theodorakopoulos, J.-Y. Le Boudec and J.-P. Hubaux, "Quantifyinglocation privacy," the IEEE Symposium on Security and Privacy, May 2011. Google ScholarDigital Library
- M. Enev, J. Jung, L. Bo, X. Ren and T. Kohno, "SensorSift: balancing sensor data privacy and utility in automated face understanding," in Proceedings of the 28th Annual Computer Security Applications Conference (ACSAC'12), New York, NY, USA, 2012. Google ScholarDigital Library
- J. Petzold, "Augsburg indoor location tracking benchmarks," Technical Report, Institute of Computer Science, University of Augsburg, April 2004.Google Scholar
- D. Madigan, E. Einahrawy, R.P. Martin, W.-H. Ju, P. Krishnan, A.S. Krishnakumar, "Bayesian indoor positioning systems," the 24th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM'05), March 2005.Google Scholar
- J. Kolodziej, S.U. Khan, L. Wang, N. Min-Allah, S.A. Madani, N. Ghani, H. Li, "An Application of Markov Jump Process Model for Activity-Based Indoor Mobility Prediction in Wireless Networks," Frontiers of Information Technology (FIT), pp. 51,56, 19--21 Dec. 2011. Google ScholarDigital Library
- C.M. Bishop, "Pattern recognition and machine learning," Information Science andStatistics, Springer-Verlag New York, Inc., Secaucus, NJ, USA. Google ScholarDigital Library
Index Terms
- Non-Invasive User Tracking via Passive Sensing: Privacy Risks of Time-Series Occupancy Measurement
Recommendations
User-side adaptive protection of location privacy in participatory sensing
The participatory sensing paradigm, through the growing availability of cheap sensors in mobile devices, enables applications of great social and business interest, e.g., electrosmog exposure measurement and early earthquake detection. However, users' ...
IdentityDP: Differential private identification protection for face images
Highlights- We propose a general framework that is suitable for the de-identification of people in face images.
AbstractBecause of the explosive growth of face photos as well as their widespread dissemination and easy accessibility in social media, the security and privacy of personal identity information become an unprecedented challenge. Meanwhile, ...
A differentially private algorithm for location data release
The rise of mobile technologies in recent years has led to large volumes of location information, which are valuable resources for knowledge discovery such as travel patterns mining and traffic analysis. However, location dataset has been confronted ...
Comments