1. Privacy and Utility Preserving Sensor-Data Transformations
- Author
-
Andrea Cavallaro, Richard G. Clegg, Mohammad Malekzadeh, Hamed Haddadi, Engineering & Physical Science Research Council (EPSRC), and Engineering & Physical Science Research Council (E
- Subjects
Signal Processing (eess.SP) ,FOS: Computer and information sciences ,Technology ,Computer Science - Machine Learning ,INFORMATION ,Computer Networks and Communications ,Computer science ,1702 Cognitive Sciences ,cs.LG ,cs.HC ,Computer Science - Human-Computer Interaction ,Inference ,Wearable computer ,Machine Learning (stat.ML) ,02 engineering and technology ,0805 Distributed Computing ,Machine learning ,computer.software_genre ,Task (project management) ,Machine Learning (cs.LG) ,Human-Computer Interaction (cs.HC) ,Reduction (complexity) ,Activity recognition ,Statistics - Machine Learning ,0202 electrical engineering, electronic engineering, information engineering ,0801 Artificial Intelligence and Image Processing ,FOS: Electrical engineering, electronic engineering, information engineering ,Electrical Engineering and Systems Science - Signal Processing ,Science & Technology ,Computer Science, Information Systems ,business.industry ,eess.SP ,020206 networking & telecommunications ,stat.ML ,Computer Science Applications ,Original data ,TIME ,Hardware and Architecture ,Computer Science ,Telecommunications ,020201 artificial intelligence & image processing ,Artificial intelligence ,business ,Networking & Telecommunications ,computer ,Software ,Information Systems ,Gesture - Abstract
Sensitive inferences and user re-identification are major threats to privacy when raw sensor data from wearable or portable devices are shared with cloud-assisted applications. To mitigate these threats, we propose mechanisms to transform sensor data before sharing them with applications running on users' devices. These transformations aim at eliminating patterns that can be used for user re-identification or for inferring potentially sensitive activities, while introducing a minor utility loss for the target application (or task). We show that, on gesture and activity recognition tasks, we can prevent inference of potentially sensitive activities while keeping the reduction in recognition accuracy of non-sensitive activities to less than 5 percentage points. We also show that we can reduce the accuracy of user re-identification and of the potential inference of gender to the level of a random guess, while keeping the accuracy of activity recognition comparable to that obtained on the original data., Accepted to appear in Pervasive and Mobile computing (PMC) Journal, Elsevier
- Published
- 2019