Proceedings of the International Conference on Internet-of-Things Design and Implementation 2021
DOI: 10.1145/3450268.3453534
|View full text |Cite
|
Sign up to set email alerts
|

ObscureNet

Abstract: In this paper, we introduce ObscureNet, an encoder-decoder architecture that effectively conceals private attributes associated with time series data generated by sensors in IoT devices, while preserving the information content of the original time series. Drawing on conditional generative models and adversarial information factorization, ObscureNet learns latent representations that are invariant to the user-specified private attributes. This allows for modifying the private attributes or generating them rand… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
10
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 12 publications
(11 citation statements)
references
References 30 publications
1
10
0
Order By: Relevance
“…The sensitive attributes, like Bob's weight, can be inferred from a few seconds of IMU data using deep learning [11]. Such amount of data is available on sensors and fog devices (e.g., smartwatch and smart hub), whose hardware is performant to carry inferences of sensitive attributes in real-time [11]. Hence, this threat happens on HBC sensor-and fog-layer nodes, during processing of Bob's IMU data (cf.…”
Section: Prinseps: Vision For Privacy In Spssmentioning
confidence: 99%
See 4 more Smart Citations
“…The sensitive attributes, like Bob's weight, can be inferred from a few seconds of IMU data using deep learning [11]. Such amount of data is available on sensors and fog devices (e.g., smartwatch and smart hub), whose hardware is performant to carry inferences of sensitive attributes in real-time [11]. Hence, this threat happens on HBC sensor-and fog-layer nodes, during processing of Bob's IMU data (cf.…”
Section: Prinseps: Vision For Privacy In Spssmentioning
confidence: 99%
“…After describing critical privacy threats and their conduct in multilayered SPSs, we utilize (1) assets that need protection, (2) target utility metrics, and (3) the computing capabilities of SPS's layers as our criteria to select exemplary PPMs for Prinseps. We identify three types of PPMs that satisfy our criteria while being frequently used by real-world applications [7,11]: machine learning (ML)-, differential privacy (DP)-, and access control (AC)-based PPMs. We showcase how these PPMs address sensitive attributes, private patterns, and invasive queries threats in multilayered SPSs (cf.…”
Section: R4: Awarenessmentioning
confidence: 99%
See 3 more Smart Citations