WEKO3
アイテム
A Privacy Control Method based on K-Anonymity for Smart Home
https://ipsj.ixsq.nii.ac.jp/records/202354
https://ipsj.ixsq.nii.ac.jp/records/2023544fdf6a5e-d4dc-477b-bdeb-2701df14d6ab
名前 / ファイル | ライセンス | アクション |
---|---|---|
![]() |
Copyright (c) 2019 by the Information Processing Society of Japan
|
|
オープンアクセス |
Item type | Symposium(1) | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
公開日 | 2019-06-26 | |||||||||||
タイトル | ||||||||||||
タイトル | A Privacy Control Method based on K-Anonymity for Smart Home | |||||||||||
タイトル | ||||||||||||
言語 | en | |||||||||||
タイトル | A Privacy Control Method based on K-Anonymity for Smart Home | |||||||||||
言語 | ||||||||||||
言語 | eng | |||||||||||
キーワード | ||||||||||||
主題Scheme | Other | |||||||||||
主題 | ユビキタスコンピューティングシステム | |||||||||||
資源タイプ | ||||||||||||
資源タイプ識別子 | http://purl.org/coar/resource_type/c_5794 | |||||||||||
資源タイプ | conference paper | |||||||||||
著者所属 | ||||||||||||
Nara Institute of Science and Technology | ||||||||||||
著者所属 | ||||||||||||
Nara Institute of Science and Technology | ||||||||||||
著者所属 | ||||||||||||
Nara Institute of Science and Technology | ||||||||||||
著者名 |
Sopicha, Stirapongsasuti
× Sopicha, Stirapongsasuti
× Wataru, Sasaki
× Keiichi, Yasumoto
|
|||||||||||
著者名(英) |
Sopicha, Stirapongsasuti
× Sopicha, Stirapongsasuti
× Wataru, Sasaki
× Keiichi, Yasumoto
|
|||||||||||
論文抄録 | ||||||||||||
内容記述タイプ | Other | |||||||||||
内容記述 | Smart home equipped with various smart devices (sensors, connected appliances, etc) is attracting attention thanks to its ability to provide smart services like automatic life logging, elderly monitoring and smart appliance control. It is very useful for a service provider to automatically identify daily living activities from sensor/appliance data in a home to provide such smart services, but at the same time it is risky for each home dweller (user) to upload all the data generated in a home because the high-privacy information might be exposed to malicious attackers.In this paper, we define a threat model for smart home users where a malicious attacker(s) can access all or part of the smart home data uploaded to the untrusted cloud server (service provider) and at the same time can physically observe part of the activities from outside through lighting over window, water/power meter counter, and so on, hence the attacker can identify the association between the data in the cloud server and the home by matching the uploaded data and the physically observed data. Then, we propose a privacy control method for smart home users to take measures to the threat. The proposed method is based on k-anonymity which is a well-known property of the data often used for protecting location privacy and guarantees that the attacker cannot narrow down the number of applicable people within k when trying to identify the person from the data. In the proposed method, targeting a residential area with a number of smart homes,for each pair (a,t) of an activity a and a time period t, the number of the homes/users which/who are doing a at t is computed as k and the value of k is shown to the inhabitant doing a at t for making decision on if he/she may upload the data of (a,t) to the cloud or not. In order to know an appropriate threshold of k for upload/no-upload for each pair (a, t), we computed values of k from the existing smart home dataset and asked 15 participants to answer upload/no-upload for each pair of activity and time period by showing the computed value of k. As a result, we confirmed that our method based k-anonymity can help privacy control for activities data generated in smart home. | |||||||||||
論文抄録(英) | ||||||||||||
内容記述タイプ | Other | |||||||||||
内容記述 | Smart home equipped with various smart devices (sensors, connected appliances, etc) is attracting attention thanks to its ability to provide smart services like automatic life logging, elderly monitoring and smart appliance control. It is very useful for a service provider to automatically identify daily living activities from sensor/appliance data in a home to provide such smart services, but at the same time it is risky for each home dweller (user) to upload all the data generated in a home because the high-privacy information might be exposed to malicious attackers. In this paper, we define a threat model for smart home users where a malicious attacker(s) can access all or part of the smart home data uploaded to the untrusted cloud server (service provider) and at the same time can physically observe part of the activities from outside through lighting over window, water/power meter counter, and so on, hence the attacker can identify the association between the data in the cloud server and the home by matching the uploaded data and the physically observed data. Then, we propose a privacy control method for smart home users to take measures to the threat. The proposed method is based on k-anonymity which is a well-known property of the data often used for protecting location privacy and guarantees that the attacker cannot narrow down the number of applicable people within k when trying to identify the person from the data. In the proposed method, targeting a residential area with a number of smart homes, for each pair (a,t) of an activity a and a time period t, the number of the homes/users which/who are doing a at t is computed as k and the value of k is shown to the inhabitant doing a at t for making decision on if he/she may upload the data of (a,t) to the cloud or not. In order to know an appropriate threshold of k for upload/no-upload for each pair (a, t), we computed values of k from the existing smart home dataset and asked 15 participants to answer upload/no-upload for each pair of activity and time period by showing the computed value of k. As a result, we confirmed that our method based k-anonymity can help privacy control for activities data generated in smart home. |
|||||||||||
書誌情報 |
マルチメディア,分散協調とモバイルシンポジウム2019論文集 巻 2019, p. 595-600, 発行日 2019-06-26 |
|||||||||||
出版者 | ||||||||||||
言語 | ja | |||||||||||
出版者 | 情報処理学会 |