We gratefully acknowledge support from
the Simons Foundation and member institutions.
Full-text links:

Download:

Current browse context:

cs.LG

Change to browse by:

References & Citations

DBLP - CS Bibliography

Bookmark

(what is this?)
CiteULike logo BibSonomy logo Mendeley logo del.icio.us logo Digg logo Reddit logo

Computer Science > Machine Learning

Title: Replacement AutoEncoder: A Privacy-Preserving Algorithm for Sensory Data Analysis

Abstract: An increasing number of sensors on mobile, Internet of things (IoT), and wearable devices generate time-series measurements of physical activities. Though access to the sensory data is critical to the success of many beneficial applications such as health monitoring or activity recognition, a wide range of potentially sensitive information about the individuals can also be discovered through access to sensory data and this cannot easily be protected using traditional privacy approaches.
In this paper, we propose a privacy-preserving sensing framework for managing access to time-series data in order to provide utility while protecting individuals' privacy. We introduce Replacement AutoEncoder, a novel algorithm which learns how to transform discriminative features of data that correspond to sensitive inferences, into some features that have been more observed in non-sensitive inferences, to protect users' privacy. This efficiency is achieved by defining a user-customized objective function for deep autoencoders. Our replacement method will not only eliminate the possibility of recognizing sensitive inferences, it also eliminates the possibility of detecting the occurrence of them. That is the main weakness of other approaches such as filtering or randomization. We evaluate the efficacy of the algorithm with an activity recognition task in a multi-sensing environment using extensive experiments on three benchmark datasets. We show that it can retain the recognition accuracy of state-of-the-art techniques while simultaneously preserving the privacy of sensitive information. Finally, we utilize the GANs for detecting the occurrence of replacement, after releasing data, and show that this can be done only if the adversarial network is trained on the users' original data.
Comments: 12 pages, 11 figures
Subjects: Machine Learning (cs.LG); Machine Learning (stat.ML)
MSC classes: 68T05
ACM classes: I.2.6
DOI: 10.1109/IoTDI.2018.00025
Cite as: arXiv:1710.06564 [cs.LG]
  (or arXiv:1710.06564v3 [cs.LG] for this version)

Submission history

From: Mohammad Malekzadeh [view email]
[v1] Wed, 18 Oct 2017 02:45:44 GMT (2354kb,D)
[v2] Tue, 24 Oct 2017 14:09:05 GMT (2354kb,D)
[v3] Tue, 27 Feb 2018 12:45:14 GMT (2910kb,D)

Link back to: arXiv, form interface, contact.