skip to main content
10.1145/3302505.3310068acmconferencesArticle/Chapter ViewAbstractPublication PagesiotdiConference Proceedingsconference-collections
research-article

Mobile sensor data anonymization

Published:15 April 2019Publication History

ABSTRACT

Motion sensors such as accelerometers and gyroscopes measure the instant acceleration and rotation of a device, in three dimensions. Raw data streams from motion sensors embedded in portable and wearable devices may reveal private information about users without their awareness. For example, motion data might disclose the weight or gender of a user, or enable their re-identification. To address this problem, we propose an on-device transformation of sensor data to be shared for specific applications, such as monitoring selected daily activities, without revealing information that enables user identification. We formulate the anonymization problem using an information-theoretic approach and propose a new multi-objective loss function for training deep autoencoders. This loss function helps minimizing user-identity information as well as data distortion to preserve the application-specific utility. The training process regulates the encoder to disregard user-identifiable patterns and tunes the decoder to shape the output independently of users in the training set. The trained autoencoder can be deployed on a mobile or wearable device to anonymize sensor data even for users who are not included in the training dataset. Data from 24 users transformed by the proposed anonymizing autoencoder lead to a promising trade-off between utility and privacy, with an accuracy for activity recognition above 92% and an accuracy for user identification below 7%.

References

  1. Martin Abadi, Andy Chu, Ian Goodfellow, H Brendan McMahan, Ilya Mironov, Kunal Talwar, and Li Zhang. 2016. Deep learning with differential privacy. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM, 308--318. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Yoshua Bengio. 2009. Learning deep architectures for AI. Foundations and trends® in Machine Learning 2, 1 (2009), 1--127. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. David S Broomhead and Gregory P King. 1986. Extracting qualitative dynamics from experimental data. Physica D: Nonlinear Phenomena 20, 2--3 (1986), 217--236. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. J. Burke, D. Estrin, M. Hansen, A. Parker, N. Ramanathan, S. Reddy, and M. B. Srivastava. 2006. Participatory sensing. In Workshop on World-Sensor-Web (WSW'06): Mobile Device Centric Sensor Networks and Applications. 117--134.Google ScholarGoogle Scholar
  5. John Duchi, Martin J Wainwright, and Michael I Jordan. 2013. Local privacy and minimax bounds: Sharp rates for probability estimation. In Advances in Neural Information Processing Systems. 1529--1537. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Cynthia Dwork, Moni Naor, Toniann Pitassi, and Guy N Rothblum. 2010. Differential privacy under continual observation. In Proceedings of the forty-second ACM symposium on Theory of computing. ACM, 715--724. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Harrison Edwards and Amos Storkey. 2016. Censoring Representations with an Adversary. In International Conference in Learning Representations (ICLR2016).Google ScholarGoogle Scholar
  8. Jonas Gehring, Yajie Miao, Florian Metze, and Alex Waibel. 2013. Extracting deep bottleneck features using stacked auto-encoders. In Acoustics, Speech and Signal Processing (ICASSP), 2013 IEEE International Conference on. IEEE, 3377--3381.Google ScholarGoogle Scholar
  9. Ian Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David Warde-Farley, Sherjil Ozair, Aaron Courville, and Yoshua Bengio. 2014. Generative adversarial nets. In Advances in neural information processing systems. 2672--2680. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Jihun Hamm. 2017. Minimax filter: learning to preserve privacy from inference attacks. The Journal of Machine Learning Research 18, 1 (2017), 4704--4734. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Chong Huang, Peter Kairouz, Xiao Chen, Lalitha Sankar, and Ram Rajagopal. 2017. Context-aware generative adversarial privacy. Entropy 19, 12 (2017), 656.Google ScholarGoogle ScholarCross RefCross Ref
  12. Eric Jones, Travis Oliphant, Pearu Peterson, et al. 2001--. SciPy: Open source scientific tools for Python. (2001--). http://www.scipy.org/Google ScholarGoogle Scholar
  13. Kleomenis Katevas, Hamed Haddadi, and Laurissa Tokarchuk. 2014. Poster: Sensingkit: A multi-platform mobile sensing framework for large-scale experiments. In Proceedings of the 20th annual international conference on Mobile computing and networking. ACM, 375--378. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Diederik P Kingma and Max Welling. 2013. Auto-encoding variational bayes. arXiv preprint arXiv:1312.6114 (2013).Google ScholarGoogle Scholar
  15. Yann LeCun and Yoshua Bengio. 1995. Convolutional networks for images, speech, and time series. The handbook of brain theory and neural networks 3361, 10 (1995), 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Changchang Liu, Supriyo Chakraborty, and Prateek Mittal. 2017. DEEProtect: Enabling Inference-based Access Control on Mobile Sensing Applications. arXiv preprint arXiv: 1702.06159 (2017).Google ScholarGoogle Scholar
  17. Chris YT Ma and David KY Yau. 2015. On information-theoretic measures for quantifying privacy protection of time-series data. In Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security. ACM, 427--438. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Sumit Majumder, Emad Aghayi, Moein Noferesti, Hamidreza Memarzadeh-Tehran, Tapas Mondal, Zhibo Pang, and M Deen. 2017. Smart Homes for Elderly Healthcare - Recent Advances and Research Challenges. Sensors 17, 11 (2017), 2496.Google ScholarGoogle ScholarCross RefCross Ref
  19. Alireza Makhzani, Jonathon Shlens, Navdeep Jaitly, Ian Goodfellow, and Brendan Frey. 2015. Adversarial autoencoders. arXiv preprint arXiv: 1511.05644 (2015).Google ScholarGoogle Scholar
  20. Mohammad Malekzadeh, Richard G Clegg, Andrea Cavallaro, and Hamed Haddadi. 2018. Protecting sensory data against sensitive inferences. In Proceedings of the 1st Workshop on Privacy by Design in Distributed Systems. ACM, 2. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Mohammad Malekzadeh, Richard G Clegg, and Hamed Haddadi. 2018. Replacement autoencoder: A privacy-preserving algorithm for sensory data analysis. In Internet-of-Things Design and Implementation (IoTDI), 2018 IEEE/ACM Third International Conference on. IEEE, 165--176.Google ScholarGoogle ScholarCross RefCross Ref
  22. Jonathan Masci, Ueli Meier, Dan Cireşan, and Jürgen Schmidhuber. 2011. Stacked convolutional auto-encoders for hierarchical feature extraction. In International Conference on Artificial Neural Networks. Springer, 52--59. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Natalia Neverova, Christian Wolf, Griffin Lacey, Lex Fridman, Deepak Chandra, Brandon Barbello, and Graham Taylor. 2016. Learning human identity from motion patterns. IEEE Access 4 (2016), 1810--1820.Google ScholarGoogle ScholarCross RefCross Ref
  24. Seyed Ali Osia, Ali Taheri, Ali Shahin Shamsabadi, Kleomenis Katevas, Hamed Haddadi, and Hamid R Rabiee. 2019. Deep Private-Feature Extraction. IEEE Transactions on Knowledge and Data Engineering.Google ScholarGoogle Scholar
  25. Borzoo Rassouli and Deniz Gündüz. 2018. Optimal Utility-Privacy Trade-off with the Total Variation Distance as the Privacy Measure. arXiv preprint arXiv: 1801.02505 (2018).Google ScholarGoogle Scholar
  26. Nisarg Raval, Ashwin Machanavajjhala, and Jerry Pan. 2019. Olympus: Sensor Privacy through Utility Aware Obfuscation. Proceedings on Privacy Enhancing Technologies 2019, 1 (2019), 5--25.Google ScholarGoogle ScholarCross RefCross Ref
  27. Stan Salvador and Philip Chan. 2007. Toward accurate dynamic time warping in linear time and space. Intelligent Data Analysis 11, 5 (2007), 561--580. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Lalitha Sankar, S Raj Rajagopalan, and H Vincent Poor. 2013. Utility-privacy tradeoffs in databases: An information-theoretic approach. IEEE Transactions on Information Forensics and Security 8, 6 (2013), 838--852. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Sandra Servia-Rodríguez, Liang Wang, Jianxin R Zhao, Richard Mortier, and Hamed Haddadi. 2018. Privacy-Preserving Personal Model Training. In Internet-of-Things Design and Implementation (IoTDI), 2018 IEEE/ACM Third International Conference on. IEEE, 153--164.Google ScholarGoogle ScholarCross RefCross Ref
  30. Ali Shahin Shamsabadi, Hamed Haddadi, and Andrea Cavallaro. 2018. Distributed One-class Learning. In IEEE International Conference on Image Processing (icip 18). IEEE.Google ScholarGoogle Scholar
  31. Nitish Srivastava, Geoffrey Hinton, Alex Krizhevsky, Ilya Sutskever, and Ruslan Salakhutdinov. 2014. Dropout: a simple way to prevent neural networks from overfitting. The Journal of Machine Learning Research 15, 1 (2014), 1929--1958. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Jun Tang, Aleksandra Korolova, Xiaolong Bai, Xueqiang Wang, and Xiaofeng Wang. 2017. Privacy Loss in Apple's Implementation of Differential Privacy on macOS 10.12. arXiv preprint arXiv: 1709.02753 (2017).Google ScholarGoogle Scholar
  33. Apple Differential Privacy Team. 2017. Learning with privacy at scale. Online at: https://machinelearning.apple.com/2017/12/06/learning-with-privacy-at-scale.html (2017).Google ScholarGoogle Scholar
  34. Ardhendu Tripathy, Ye Wang, and Prakash Ishwar. 2017. Privacy-Preserving Adversarial Networks. arXiv preprint arXiv: 1712.07008 (2017).Google ScholarGoogle Scholar
  35. Pascal Vincent, Hugo Larochelle, Yoshua Bengio, and Pierre-Antoine Manzagol. 2008. Extracting and Composing Robust Features with Denoising Autoencoders. In Proceedings of the 25th International Conference on Machine Learning (ICML '08). ACM, 1096--1103. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Jun Wang, Shubo Liu, and Yongkai Li. 2015. A review of differential privacy in individual data release. International Journal of Distributed Sensor Networks 11, 10 (2015), 259682. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Fengjun Xiao, Mingming Lu, Ying Zhao, Soumia Menasria, Dan Meng, Shang-sheng Xie, Juncai Li, and Chengzhi Li. 2018. An information-aware visualization for privacy-preserving accelerometer data sharing. Human-centric Computing and Information Sciences 8, 1 (2018), 13. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Jianbo Yang, Minh Nhut Nguyen, Phyo Phyo San, Xiao Li Li, and Shonali Krishnaswamy. 2015. Deep convolutional neural networks on multichannel time series for human activity recognition. In Twenty-Fourth International Joint Conference on Artificial Intelligence. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Mobile sensor data anonymization

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          IoTDI '19: Proceedings of the International Conference on Internet of Things Design and Implementation
          April 2019
          299 pages
          ISBN:9781450362832
          DOI:10.1145/3302505

          Copyright © 2019 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 15 April 2019

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader