Cargando…
Detecting Inference Attacks Involving Raw Sensor Data: A Case Study
With the advent of sensors, more and more services are developed in order to provide customers with insights about their health and their appliances’ energy consumption at home. To do so, these services use new mining algorithms that create new inference channels. However, the collected sensor data...
Autores principales: | , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9657380/ https://www.ncbi.nlm.nih.gov/pubmed/36365838 http://dx.doi.org/10.3390/s22218140 |
_version_ | 1784829679473000448 |
---|---|
author | Lachat, Paul Bennani, Nadia Rehn-Sonigo, Veronika Brunie, Lionel Kosch, Harald |
author_facet | Lachat, Paul Bennani, Nadia Rehn-Sonigo, Veronika Brunie, Lionel Kosch, Harald |
author_sort | Lachat, Paul |
collection | PubMed |
description | With the advent of sensors, more and more services are developed in order to provide customers with insights about their health and their appliances’ energy consumption at home. To do so, these services use new mining algorithms that create new inference channels. However, the collected sensor data can be diverted to infer personal data that customers do not consent to share. This indirect access to data that are not collected corresponds to inference attacks involving raw sensor data (IASD). Towards these new kinds of attacks, existing inference detection systems do not suit the representation requirements of these inference channels and of user knowledge. In this paper, we propose RICE-M (Raw sensor data based Inference ChannEl Model) that meets these inference channel representations. Based on RICE-M, we proposed RICE-Sy an extensible system able to detect IASDs, and evaluated its performance taking as a case study the MHEALTH dataset. As expected, detecting IASD is proven to be quadratic due to huge sensor data managed and a quickly growing amount of user knowledge. To overcome this drawback, we propose first a set of conceptual optimizations that reduces the detection complexity. Although becoming linear, as online detection time remains greater than a fixed acceptable query response limit, we propose two approaches to estimate the potential of RICE-Sy. The first one is based on partitioning strategies which aim at partitioning the knowledge of users. We observe that by considering the quantity of knowledge gained by a user as a partitioning criterion, the median detection time of RICE-Sy is reduced by 63%. The second approach is H-RICE-SY, a hybrid detection architecture built on RICE-Sy which limits the detection at query-time to users that have a high probability to be malicious. We show the limits of processing all malicious users at query-time, without impacting the query answer time. We observe that for a ratio of 30% users considered as malicious, the median online detection time stays under the acceptable time of 80 ms, for up to a total volume of 1.2 million user knowledge entities. Based on the observed growth rates, we have estimated that for 5% of user knowledge issued by malicious users, a maximum volume of approximately 8.6 million user’s information can be processed online in an acceptable time. |
format | Online Article Text |
id | pubmed-9657380 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2022 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-96573802022-11-15 Detecting Inference Attacks Involving Raw Sensor Data: A Case Study Lachat, Paul Bennani, Nadia Rehn-Sonigo, Veronika Brunie, Lionel Kosch, Harald Sensors (Basel) Article With the advent of sensors, more and more services are developed in order to provide customers with insights about their health and their appliances’ energy consumption at home. To do so, these services use new mining algorithms that create new inference channels. However, the collected sensor data can be diverted to infer personal data that customers do not consent to share. This indirect access to data that are not collected corresponds to inference attacks involving raw sensor data (IASD). Towards these new kinds of attacks, existing inference detection systems do not suit the representation requirements of these inference channels and of user knowledge. In this paper, we propose RICE-M (Raw sensor data based Inference ChannEl Model) that meets these inference channel representations. Based on RICE-M, we proposed RICE-Sy an extensible system able to detect IASDs, and evaluated its performance taking as a case study the MHEALTH dataset. As expected, detecting IASD is proven to be quadratic due to huge sensor data managed and a quickly growing amount of user knowledge. To overcome this drawback, we propose first a set of conceptual optimizations that reduces the detection complexity. Although becoming linear, as online detection time remains greater than a fixed acceptable query response limit, we propose two approaches to estimate the potential of RICE-Sy. The first one is based on partitioning strategies which aim at partitioning the knowledge of users. We observe that by considering the quantity of knowledge gained by a user as a partitioning criterion, the median detection time of RICE-Sy is reduced by 63%. The second approach is H-RICE-SY, a hybrid detection architecture built on RICE-Sy which limits the detection at query-time to users that have a high probability to be malicious. We show the limits of processing all malicious users at query-time, without impacting the query answer time. We observe that for a ratio of 30% users considered as malicious, the median online detection time stays under the acceptable time of 80 ms, for up to a total volume of 1.2 million user knowledge entities. Based on the observed growth rates, we have estimated that for 5% of user knowledge issued by malicious users, a maximum volume of approximately 8.6 million user’s information can be processed online in an acceptable time. MDPI 2022-10-24 /pmc/articles/PMC9657380/ /pubmed/36365838 http://dx.doi.org/10.3390/s22218140 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Lachat, Paul Bennani, Nadia Rehn-Sonigo, Veronika Brunie, Lionel Kosch, Harald Detecting Inference Attacks Involving Raw Sensor Data: A Case Study |
title | Detecting Inference Attacks Involving Raw Sensor Data: A Case Study |
title_full | Detecting Inference Attacks Involving Raw Sensor Data: A Case Study |
title_fullStr | Detecting Inference Attacks Involving Raw Sensor Data: A Case Study |
title_full_unstemmed | Detecting Inference Attacks Involving Raw Sensor Data: A Case Study |
title_short | Detecting Inference Attacks Involving Raw Sensor Data: A Case Study |
title_sort | detecting inference attacks involving raw sensor data: a case study |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9657380/ https://www.ncbi.nlm.nih.gov/pubmed/36365838 http://dx.doi.org/10.3390/s22218140 |
work_keys_str_mv | AT lachatpaul detectinginferenceattacksinvolvingrawsensordataacasestudy AT bennaninadia detectinginferenceattacksinvolvingrawsensordataacasestudy AT rehnsonigoveronika detectinginferenceattacksinvolvingrawsensordataacasestudy AT brunielionel detectinginferenceattacksinvolvingrawsensordataacasestudy AT koschharald detectinginferenceattacksinvolvingrawsensordataacasestudy |