Cargando…

Detecting Inference Attacks Involving Raw Sensor Data: A Case Study

With the advent of sensors, more and more services are developed in order to provide customers with insights about their health and their appliances’ energy consumption at home. To do so, these services use new mining algorithms that create new inference channels. However, the collected sensor data...

Descripción completa

Detalles Bibliográficos
Autores principales: Lachat, Paul, Bennani, Nadia, Rehn-Sonigo, Veronika, Brunie, Lionel, Kosch, Harald
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9657380/
https://www.ncbi.nlm.nih.gov/pubmed/36365838
http://dx.doi.org/10.3390/s22218140
_version_ 1784829679473000448
author Lachat, Paul
Bennani, Nadia
Rehn-Sonigo, Veronika
Brunie, Lionel
Kosch, Harald
author_facet Lachat, Paul
Bennani, Nadia
Rehn-Sonigo, Veronika
Brunie, Lionel
Kosch, Harald
author_sort Lachat, Paul
collection PubMed
description With the advent of sensors, more and more services are developed in order to provide customers with insights about their health and their appliances’ energy consumption at home. To do so, these services use new mining algorithms that create new inference channels. However, the collected sensor data can be diverted to infer personal data that customers do not consent to share. This indirect access to data that are not collected corresponds to inference attacks involving raw sensor data (IASD). Towards these new kinds of attacks, existing inference detection systems do not suit the representation requirements of these inference channels and of user knowledge. In this paper, we propose RICE-M (Raw sensor data based Inference ChannEl Model) that meets these inference channel representations. Based on RICE-M, we proposed RICE-Sy an extensible system able to detect IASDs, and evaluated its performance taking as a case study the MHEALTH dataset. As expected, detecting IASD is proven to be quadratic due to huge sensor data managed and a quickly growing amount of user knowledge. To overcome this drawback, we propose first a set of conceptual optimizations that reduces the detection complexity. Although becoming linear, as online detection time remains greater than a fixed acceptable query response limit, we propose two approaches to estimate the potential of RICE-Sy. The first one is based on partitioning strategies which aim at partitioning the knowledge of users. We observe that by considering the quantity of knowledge gained by a user as a partitioning criterion, the median detection time of RICE-Sy is reduced by 63%. The second approach is H-RICE-SY, a hybrid detection architecture built on RICE-Sy which limits the detection at query-time to users that have a high probability to be malicious. We show the limits of processing all malicious users at query-time, without impacting the query answer time. We observe that for a ratio of 30% users considered as malicious, the median online detection time stays under the acceptable time of 80 ms, for up to a total volume of 1.2 million user knowledge entities. Based on the observed growth rates, we have estimated that for 5% of user knowledge issued by malicious users, a maximum volume of approximately 8.6 million user’s information can be processed online in an acceptable time.
format Online
Article
Text
id pubmed-9657380
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-96573802022-11-15 Detecting Inference Attacks Involving Raw Sensor Data: A Case Study Lachat, Paul Bennani, Nadia Rehn-Sonigo, Veronika Brunie, Lionel Kosch, Harald Sensors (Basel) Article With the advent of sensors, more and more services are developed in order to provide customers with insights about their health and their appliances’ energy consumption at home. To do so, these services use new mining algorithms that create new inference channels. However, the collected sensor data can be diverted to infer personal data that customers do not consent to share. This indirect access to data that are not collected corresponds to inference attacks involving raw sensor data (IASD). Towards these new kinds of attacks, existing inference detection systems do not suit the representation requirements of these inference channels and of user knowledge. In this paper, we propose RICE-M (Raw sensor data based Inference ChannEl Model) that meets these inference channel representations. Based on RICE-M, we proposed RICE-Sy an extensible system able to detect IASDs, and evaluated its performance taking as a case study the MHEALTH dataset. As expected, detecting IASD is proven to be quadratic due to huge sensor data managed and a quickly growing amount of user knowledge. To overcome this drawback, we propose first a set of conceptual optimizations that reduces the detection complexity. Although becoming linear, as online detection time remains greater than a fixed acceptable query response limit, we propose two approaches to estimate the potential of RICE-Sy. The first one is based on partitioning strategies which aim at partitioning the knowledge of users. We observe that by considering the quantity of knowledge gained by a user as a partitioning criterion, the median detection time of RICE-Sy is reduced by 63%. The second approach is H-RICE-SY, a hybrid detection architecture built on RICE-Sy which limits the detection at query-time to users that have a high probability to be malicious. We show the limits of processing all malicious users at query-time, without impacting the query answer time. We observe that for a ratio of 30% users considered as malicious, the median online detection time stays under the acceptable time of 80 ms, for up to a total volume of 1.2 million user knowledge entities. Based on the observed growth rates, we have estimated that for 5% of user knowledge issued by malicious users, a maximum volume of approximately 8.6 million user’s information can be processed online in an acceptable time. MDPI 2022-10-24 /pmc/articles/PMC9657380/ /pubmed/36365838 http://dx.doi.org/10.3390/s22218140 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Lachat, Paul
Bennani, Nadia
Rehn-Sonigo, Veronika
Brunie, Lionel
Kosch, Harald
Detecting Inference Attacks Involving Raw Sensor Data: A Case Study
title Detecting Inference Attacks Involving Raw Sensor Data: A Case Study
title_full Detecting Inference Attacks Involving Raw Sensor Data: A Case Study
title_fullStr Detecting Inference Attacks Involving Raw Sensor Data: A Case Study
title_full_unstemmed Detecting Inference Attacks Involving Raw Sensor Data: A Case Study
title_short Detecting Inference Attacks Involving Raw Sensor Data: A Case Study
title_sort detecting inference attacks involving raw sensor data: a case study
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9657380/
https://www.ncbi.nlm.nih.gov/pubmed/36365838
http://dx.doi.org/10.3390/s22218140
work_keys_str_mv AT lachatpaul detectinginferenceattacksinvolvingrawsensordataacasestudy
AT bennaninadia detectinginferenceattacksinvolvingrawsensordataacasestudy
AT rehnsonigoveronika detectinginferenceattacksinvolvingrawsensordataacasestudy
AT brunielionel detectinginferenceattacksinvolvingrawsensordataacasestudy
AT koschharald detectinginferenceattacksinvolvingrawsensordataacasestudy