skip to main content
10.1145/2666652.2666655acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Non-Invasive User Tracking via Passive Sensing: Privacy Risks of Time-Series Occupancy Measurement

Published:07 November 2014Publication History

ABSTRACT

A large-scale sensing infrastructure can collect ample data to benefit many real-world applications. One promising application scenario is building management. However, exposure of the sensor data potentially reveals private details about building users. In this paper, we investigate indoor location privacy as a motivating example to manifest potential privacy risks in smart buildings. We apply inference techniques to reconstruct users' location traces from room-level occupancy data. Unlike other types of surveillance that are dedicated to explicit tracking such as security cam- eras, time-series occupancy traces, as aggregated environmental measurements, are typically deemed privacy-preserving. Unfortunately, it may still reveal some of the same sensitive information as privacy-invasive sensing such as video surveillance. We con- duct experiments using a publicly available dataset and synthetic data. Our results demonstrate the underlying privacy leakage via occupancy data. We further show how our evaluation can enable adaptive privacy mechanisms to control the information leakage by the sensing system.

References

  1. . Rowe, M.E. Berges, G. Bhatia, E. Goldman, R. Rajkumar, J.H. Garrett, J.M.F. Moura, L. Soibelman, "Sensor Andrew: Large-scale campus-wide sensing and actuation," IBM Journal of Research and Development, vol.55, no.1.2, pp.6:1,6:14, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. . Xu, "A survey of sensor network applications," IEEE Communications Magazine, 2002.Google ScholarGoogle Scholar
  3. . Bourgeois, C. Reinhart and I. Macdonald, "Adding advanced behavioural modelsin whole building energy simulation: a study on the total energy impact of manual and automated lighting control," Energy and Buildings, 38(7):814--823, July 2006.Google ScholarGoogle ScholarCross RefCross Ref
  4. . Nguyen and M. Aiello, "Energy intelligent buildings based on user activity: A survey," Energy and Buildings, no. 56, pp. 244--257, January 2013.Google ScholarGoogle Scholar
  5. . Wood, G. Virone, T. Doan, Q. Cao, L. Selavo, Y. Wu, L. Fang, Z. He, S. Lin and J. Stankovic, "ALARM-NET: Wireless sensor networks for assisted-living and residential monitoring," TechnicalReport CS-2006-11, Department of Computer Science, University of Virginia, 2006.Google ScholarGoogle Scholar
  6. http://enlightedinc.com/solutions/products/Google ScholarGoogle Scholar
  7. http://redwoodsys.com/solutionsGoogle ScholarGoogle Scholar
  8. K. Framling, I. Oliver, J. Honkola, J. Nyman, "Smart spaces for ubiquitouslysmart buildings," the IEEE Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies(UBICOMM'09), 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. J. Kleissl, Y. Agarwal, "Cyber-physical energy systems: focus on smart buildings," the 47th Design Automation Conference (DAC'10), New York, NY, USA, 749--754, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Y. Agarwal, B. Balaji, R. Gupta, J. Lyles, M. Wei, T. Weng, "Occupancy-driven energy management for smartbuilding automation," BuildSys'10, pages 1--6, New York, NY,USA, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. S.K. Ghai, L.V. Thanayankizil, D.P. Seetharam, D. Chakraborty, "Occupancy detection in commercial buildings using opportunistic context sources," the IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM'12), 2012.Google ScholarGoogle Scholar
  12. V.L. Erickson, A.E. Cerpa, ";Occupancy based demandresponse HVAC control strategy," BuildSys'10, pages 7--12, NewYork, NY, USA, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. J. Scott, A. J. B. Brush, J. Krumm, B. Meyers, M. Hazas,S. Hodges, and N. Villar, "Preheat: controlling homeheating using occupancy prediction," the 13th international conference on Ubiquitous computing (UbiComp'11), New York, NY, USA, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. V.L. Erickson, S. Achleitner, A.E. Cerpa, "POEM: power-efficient occupancy-based energy management system," the 12th international conference on Information processing in sensor networks (IPSN'13), New York, NY, USA, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. F. Manzoor, Z. Cong, P. Stack and K. Menzel, "Tracking occupants and inventoryitems in buildings using RFID technology," the 18th International Conference on the Application ofComputer Science and Mathematics in Architecture and Civil Engineering, Weimar, Germany, July 2009.Google ScholarGoogle Scholar
  16. R. Melfi, B. Rosenblum, B. Nordman, K. Christensen, "Measuring building occupancy using existing network infrastructure," Green Computing Conference and Workshops (IGCC), 25--28 July 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. T.W. Hnat, E. Griffiths, R. Dawson, and K. Whitehouse, "Doorjamb: unobtrusive room-level tracking of people in homes using doorway sensors," the 10th ACM Conference on Embedded Network Sensor Systems (SenSys'12),, New York, NY, USA, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. V.L. Erickson, M.A. Carreira-Perpinan, A.E. Cerpa, "OBSERVE: Occupancy-based system for efficient reduction of HVAC energy," the 10th Information Processing in Sensor Networks (IPSN'11), April 2011.Google ScholarGoogle Scholar
  19. F. Oldewurtel, D. Sturzenegger, M. Morari, "Importance of occupancy information for building climate control," Applied Energy, Volume 101, January 2013.Google ScholarGoogle Scholar
  20. A. Beltran, V.L. Erickson, A.E. Cerpa, "ThermoSense: Occupancy Thermal Based Sensing for HVAC Control," the 5th ACM Workshop on Embedded Systems For Energy-Efficient Buildings (BuildSys'13), New York, NY, USA, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. . Balaji, J. Xu, A. Nwokafor, R. Gupta, Y. Agarwal, "Sentinel: occupancy based HVAC actuation using existing WiFi infrastructure within commercial buildings," the 11th ACM Conference on Embedded Networked Sensor Systems (SenSys'13), New York, NY, USA, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. M. Gruteser, G. Schelle, A. Jain, R. Han and D. Grunwald, "Privacy-aware location sensor networks," HotOS IX: the 9th Workshop on Hot Topics in Operating Systems, Lihue, Hawaii, USA,May 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Z. Ghahramani and M.I. Jordan. Factorial hidden Markov models. Machine Learning,29:245--273, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. P. McDaniel, S. McLaughlin, "Security and privacy challenges in the smart grid," Security & Privacy, IEEE, vol.7, no.3, pp.75--77, May-June 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. .R. Rajagopalan, L. Sankar, S. Mohajer, H.V. Poor, "Smart meter privacy: autility-privacy framework," the IEEE International Conference on Smart Grid Communications (SmartGridComm), pp. 190--195, 17-20 Oct, 2011.Google ScholarGoogle Scholar
  26. G. Pallapa, M.D. Francescoy and S.K. Das, "Adaptive and context-aware privacy preservationschemes exploiting user interactions in pervasive environments," the IEEE International Symposium ona World of Wireless, Mobile and Multimedia Networks (WoWMoM'12), pp.1--6, June 2012.Google ScholarGoogle Scholar
  27. G. Pallapa, N. Roy and S. K. Das, "A scheme for quantizing privacy in context-awareubiquitous computing," the 4th International IET Conference on Intelligent Environments, pp.1--8, July2008.Google ScholarGoogle Scholar
  28. U. Hengartner and P. Steenkiste, "Avoiding privacy violations caused by context-sensitiveservices," Pervasive and Mobile Computing, 2(4):427--452, 2006.Google ScholarGoogle ScholarCross RefCross Ref
  29. . Abbasi, A. Khonsari and M. Talebi, "Source location anonymity for sensor networks, "the 6th IEEE Conference on Consumer Communications and Networking Conference (CCNC'09), pp.588--592, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. B. Alomair, A. Clark, J. Cuellar and R. Poovendran, "Towards a statistical frameworkfor source anonymity in sensor networks," IEEE Transactions on Mobile Computing, vol.12, no.2, pp. 248--260,Feb 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. S. Chakraborty, K.R. Raghavan, M.P. Johnson and M.B. Srivastava, "A framework for context-aware privacy of sensor data on mobile systems," in Proceedings of the 14th Workshop on Mobile Computing Systems and Applications (HotMobile'13), New York, NY, USA, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. C. Cornelius, A. Kapadia, D. Kotz, D. Peebles, M. Shin and N. Triandopoulos. "AnonySense:privacy aware people-centric sensing," the International Conference on Mobile Systems, Applications,and Services (MobiSys'08), pp.211--224, June 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. . Hoh and M. Gruteser, "Protecting location privacy through path confusion," the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks(SecureComm'05), 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. W. He, X. Liu, H.V. Nguyen, K. Nahrstedt and T. Abdelzaher, "PDA: Privacy-Preserving Data Aggregation for Information Collection," ACM Trans. Sensor Networks 8, 1, Article 6, August, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Y. Li and J. Ren, "Preserving source-location privacy in wireless sensor networks," the 6th Annual IEEE Conference on Sensor, Mesh, and Ad Hoc Communications and Networks (SECON';09), pp.493--501,2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. . Mehta, D. Liu and M. Wright, "Location privacy in sensor networks against a global eavesdropper," the 15th IEEE International Conference on Network Protocols (ICNP'07), pp.314--323, 2007.Google ScholarGoogle Scholar
  37. C. Bettini, X.S. Wang and S. Jajodia, "Protecting privacy against location-basedpersonal identification," the 2nd VLDB Workshop SDM, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. T. Xu and Y. Cai, "Feeling-based location privacy protection for location-basedservices," the 16th ACM Conference on Computer and Communications Security (CCS'09), New York, NY,USA, 348--357. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. N. Li, N. Zhang, S. Das and B. Thuraisingham, "Privacy preservation in wirelesssensor networks: a state-of-the-art survey," Elsevier Journal on Ad Hoc Networks, 7(8):1501--1514, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. M. Gruteser and D. Grunwald, "Anonymous usage of location-based services throughspatial and temporal cloaking," in MobiSys, pp.31--42, New York, NY, USA, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. J. Krumm, "A survey of computational location privacy," the Personal UbiquitousComputation, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. A. Beresford and F. Stajano, "Location privacy in pervasive computing," Pervasive Computing, IEEE, vol. 2, no. 1, pp.46--55, Jan-Mar 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. R. Shokri, G. Theodorakopoulos, J.-Y. Le Boudec and J.-P. Hubaux, "Quantifyinglocation privacy," the IEEE Symposium on Security and Privacy, May 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. M. Enev, J. Jung, L. Bo, X. Ren and T. Kohno, "SensorSift: balancing sensor data privacy and utility in automated face understanding," in Proceedings of the 28th Annual Computer Security Applications Conference (ACSAC'12), New York, NY, USA, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. J. Petzold, "Augsburg indoor location tracking benchmarks," Technical Report, Institute of Computer Science, University of Augsburg, April 2004.Google ScholarGoogle Scholar
  46. D. Madigan, E. Einahrawy, R.P. Martin, W.-H. Ju, P. Krishnan, A.S. Krishnakumar, "Bayesian indoor positioning systems," the 24th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM'05), March 2005.Google ScholarGoogle Scholar
  47. J. Kolodziej, S.U. Khan, L. Wang, N. Min-Allah, S.A. Madani, N. Ghani, H. Li, "An Application of Markov Jump Process Model for Activity-Based Indoor Mobility Prediction in Wireless Networks," Frontiers of Information Technology (FIT), pp. 51,56, 19--21 Dec. 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. C.M. Bishop, "Pattern recognition and machine learning," Information Science andStatistics, Springer-Verlag New York, Inc., Secaucus, NJ, USA. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Non-Invasive User Tracking via Passive Sensing: Privacy Risks of Time-Series Occupancy Measurement

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      AISec '14: Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop
      November 2014
      134 pages
      ISBN:9781450331531
      DOI:10.1145/2666652

      Copyright © 2014 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 7 November 2014

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      AISec '14 Paper Acceptance Rate12of24submissions,50%Overall Acceptance Rate94of231submissions,41%

      Upcoming Conference

      CCS '24
      ACM SIGSAC Conference on Computer and Communications Security
      October 14 - 18, 2024
      Salt Lake City , UT , USA

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader