skip to main content
research-article

Data Privacy Enhancing in the IoT User/Device Behavior Analytics

Published: 20 December 2022 Publication History

Abstract

The Internet of Things (IoT) is generating and processing a huge amount of data that are then used and shared to improve services and applications in various industries. The collected data are always including sensitive information (sensitive data, users/devices/applications behaviors, etc.), which can be exchanged over the IoT to third-party for storing, processing, and sharing with associated applications. It is important to protect data privacy from compromising using consistently privacy preserving techniques. In this work, we propose a privacy-preserving solution for both structured data and unstructured data by using data anonymization techniques, which are able to enhance privacy associated with IoT services, applications, and users/device behavior. This can allow IoT users/devices to access privacy-enhanced data protecting sensitive data against re-identification risks. The experimental results demonstrate that the proposed solution can provide privacy-enhanced data for third-party services and applications over the IoT.

References

[1]
2017. Chapter 13 - RIoT control. In RIoT Control, Tyson Macaulay (Ed.). Morgan Kaufmann, Boston, 279–368.
[2]
Alberto Abadie. 2021. Using synthetic controls: Feasibility, data requirements, and methodological aspects. Journal of Economic Literature 59, 2 (2021), 391–425.
[3]
Aitor Almeida, Alessandro Fiore, Luca Mainetti, Ruben Mulero, Luigi Patrono, and Piercosimo Rametta. 2017. An IoT-aware architecture for collecting and managing data related to elderly behavior. Wireless Communications and Mobile Computing 5 (2017), 1–17.
[4]
Kathleen Benitez and Bradley Malin. 2010. Evaluating re-identification risks with respect to the HIPAA privacy rule. Journal of the American Medical Informatics Association 17, 2 (2010), 169–177.
[5]
Ilaria Chillotti, Nicolas Gama, Mariya Georgieva, and Malika Izabachène. August 2016. TFHE: Fast Fully Homomorphic Encryption Library. Retrieved January 23, 2022 from https://tfhe.github.io/tfhe/.
[6]
Li Da Xu, Yang Lu, and Ling Li. 2021. Embedding blockchain technology into IoT for security: A survey. IEEE Internet of Things Journal 8, 13 (2021), 10452–10473.
[7]
Nhu-Ngoc Dao, Trung V. Phan, Umar Sa’ad, Joongheon Kim, Thomas Bauschert, Dinh-Thuan Do, and Sungrae Cho. 2021. Securing heterogeneous iot with intelligent ddos attack behavior learning. IEEE Systems Journal 6, 2 (2021), 1974–1983.
[8]
Wenxin Ding, Nihar B. Shah, and Weina Wang. 2020. On the privacy-utility tradeoff in peer-review data analysis. arXiv:2006.16385. Retrieved from https://arxiv.org/abs/2006.16385.
[9]
Oscar Ferrández, Brett R. South, Shuying Shen, F. Jeffrey Friedlin, Matthew H. Samore, and Stéphane M. Meystre. 2012. Evaluating current automatic de-identification methods with veteran’s health administration clinical documents. BMC Medical Research Methodology 12, 1 (2012), 1–16.
[10]
Gonzalo Munilla Garrido, Johannes Sedlmeir, Ömer Uludağ, Ilias Soto Alaoui, Andre Luckow, and Florian Matthes. 2022. Revealing the landscape of privacy-enhancing technologies in the context of data markets for the IoT: A systematic literature review. Journal of Network and Computer Applications, (in press).
[11]
Mardiana Binti Mohamad Noor and Wan Haslina Hassan. 2019. Current research on internet of things (IoT) security: A survey. Computer Networks 148 (2019), 283–294.
[12]
Bin He and Gang Li. 2017. Intelligent self-adaptation data behavior control inspired by speech acts. ACM Transactions on Sensor Networks 13, 2 (2017), 1–32.
[13]
Amjad Rehman Khan, Siraj Khan, Majid Harouni, Rashid Abbasi, Sajid Iqbal, and Zahid Mehmood. 2021. Brain tumor segmentation using K-means clustering and deep learning with synthetic data augmentation for classification. Microscopy Research and Technique 84, 7 (2021), 1389–1399.
[14]
Shancang Li. 2020. Zero trust based internet of things. EAI Endorsed Transactions on Internet of Things 5, 20 (2020), 1–10.
[15]
Shancang Li, Kim-Kwang Raymond Choo, Qindong Sun, William J. Buchanan, and Jiuxin Cao. 2019. IoT forensics: Amazon echo as a use case. IEEE Internet of Things Journal 6, 4 (2019), 6487–6497.
[16]
Shancang Li, Shanshan Zhao, Geyong Min, Lianyong Qi, and Gang Liu. 2021. Lightweight privacy-preserving scheme using homomorphic encryption in industrial internet of things. IEEE Internet of Things Journal 9, 16 (2021), 14542–14550.
[17]
Sicong Liu, Junzhao Du, Anshumali Shrivastava, and Lin Zhong. 2019. Privacy adversarial network: Representation learning for mobile data privacy. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 3, 4 (2019), 1–18.
[18]
Waranya Mahanan, W. Art Chaovalitwongse, and Juggapong Natwichai. 2020. Data anonymization: A novel optimal k-anonymity algorithm for identical generalization hierarchy data in IoT. Service Oriented Computing and Applications 14, 2 (2020), 89–100.
[19]
Mohammad Malekzadeh, Richard G. Clegg, and Hamed Haddadi. 2018. Replacement autoencoder: A privacy-preserving algorithm for sensory data analysis. In Proceedings of the 2018 IEEE/ACM 3rd International Conference on Internet-of-Things Design and Implementation. IEEE, 165–176.
[20]
Sergey I. Nikolenko. 2021. Synthetic data for deep learning. Springer, Vol. 174.
[21]
Hyduke Noshadi, Foad Dabiri, Saro Meguerdichian, Miodrag Potkonjak, and Majid Sarrafzadeh. 2013. Behavior-oriented data resource management in medical sensing systems. ACM Transactions on Sensor Networks 9, 2 (2013), 1–26.
[22]
Wang Ren, Xin Tong, Jing Du, Na Wang, Shancang Li, Geyong Min, and Zhiwei Zhao. 2021. Privacy enhancing techniques in the internet of things using data anonymisation. Information Systems Frontiers 2021 (2021), 1–12.
[23]
Connor Shorten, Taghi M. Khoshgoftaar, and Borko Furht. 2021. Text data augmentation for deep learning. Journal of Big Data 8, 1 (2021), 1–34.
[24]
Joshua Snoke, Gillian M. Raab, Beata Nowok, Chris Dibben, and Aleksandra Slavkovic. 2018. General and specific utility measures for synthetic data. Journal of the Royal Statistical Society: Series A (Statistics in Society) 181, 3 (2018), 663–688.
[25]
Jinhyun So, Ramy E. Ali, Basak Guler, Jiantao Jiao, and Salman Avestimehr. 2021. Securing secure aggregation: Mitigating multi-round privacy leakage in federated learning. arXiv:2106.03328. Retrieved from https://arxiv.org/abs/2106.03328.
[26]
Qindong Sun, Kai Lin, Chengxiang Si, Yanyue Xu, Shancang Li, and Prosanta Gope. 2022. A secure and anonymous communicate scheme over the internet of things. ACM Transactions on Sensor Networks 18, 3 (2022), 1–21.
[27]
Huimin Ye and Elizabeth S. Chen. 2011. Attribute utility motivated k-anonymization of datasets to support the heterogeneous needs of biomedical researchers. In Proceedings of the AMIA Annual Symposium Proceedings, Vol. 2011. American Medical Informatics Association, 1573.
[28]
Shanshan Zhao, Shancang Li, Fuzhong Li, Wuping Zhang, and Muddesar Iqbal. 2020. Blockchain-enabled user authentication in zero trust internet of things. In Proceedings of the International Conference on Security and Privacy in New Computing Environments. Springer, 265–274.

Cited By

View all
  • (2024)Cluster-Phys: Facial Clues Clustering Towards Efficient Remote Physiological MeasurementProceedings of the 32nd ACM International Conference on Multimedia10.1145/3664647.3680670(330-339)Online publication date: 28-Oct-2024
  • (2024)Quality assessment of identity inpainting based on multidimensional discriminationMultimedia Systems10.1007/s00530-024-01536-030:6Online publication date: 13-Nov-2024
  • Show More Cited By

Index Terms

  1. Data Privacy Enhancing in the IoT User/Device Behavior Analytics

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Transactions on Sensor Networks
    ACM Transactions on Sensor Networks  Volume 19, Issue 2
    May 2023
    599 pages
    ISSN:1550-4859
    EISSN:1550-4867
    DOI:10.1145/3575873
    Issue’s Table of Contents

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Journal Family

    Publication History

    Published: 20 December 2022
    Online AM: 25 July 2022
    Accepted: 28 April 2022
    Revised: 06 March 2022
    Received: 30 September 2021
    Published in TOSN Volume 19, Issue 2

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Privacy enhanced technology
    2. Internet of Things
    3. user/device behavior

    Qualifiers

    • Research-article
    • Refereed

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)104
    • Downloads (Last 6 weeks)15
    Reflects downloads up to 08 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Cluster-Phys: Facial Clues Clustering Towards Efficient Remote Physiological MeasurementProceedings of the 32nd ACM International Conference on Multimedia10.1145/3664647.3680670(330-339)Online publication date: 28-Oct-2024
    • (2024)Quality assessment of identity inpainting based on multidimensional discriminationMultimedia Systems10.1007/s00530-024-01536-030:6Online publication date: 13-Nov-2024
    • Show More Cited By

    View Options

    Login options

    Full Access

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Full Text

    View this article in Full Text.

    Full Text

    HTML Format

    View this article in HTML Format.

    HTML Format

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media