A Unified Framework for IoT Privacy

Smart cities, connected vehicles, smart homes, and connected healthcare devices are examples of how the Internet of Things (IoT) are expected to revolutionize our lives in the decades ahead by exploiting a wealth of user-specific data to significantly improve user experiences. However, sharing of such data can compromise a user's privacy, and this threat to user-privacy has emerged as a critical risk to the widespread adoption of IoT. This highlights an important and fundamental challenge critical to the Science of Cyber-Physical Systems: even if IoT data is carefully anonymized, significant privacy leaks can occur due to the sheer amount of the data generated and the use of powerful mathematical techniques by an adversary to match current behavior with traces of past user behavior. This project will develop a systematic approach to understand the fundamental underpinnings of privacy in IoT systems, and develop provably private IoT implementations that are robust to uncertainties in the models. A key advantage of this approach is that it can achieve provable privacy, i.e., no algorithm can break the privacy of the user. The project also continues the team's education and engagement of a diverse set of students, including the significant involvement of undergraduate students in the research program, and creates and promotes free and open access educational materials. The technical problems considered in the project are organized into two main thrusts. In Thrust 1, the theoretical foundations for IoT privacy are built. The main goal is to obtain a fundamental understanding of the degree to which the utility of IoT approaches can be maintained while employing privacy-preserving mechanisms to provably prevent an adversary from compromising a user's privacy by matching a given trace to prior user behavior. Critical to this thrust is achieving robust and model independent design, i.e., achieving perfect privacy with the minimum sets of assumptions about the system and data models. In Thrust 2, to validate the theory and demonstrate the potential impact of the approach, the project leverages the domain expertise of the team to apply the results of Thrust 1 in connected vehicle applications. More generally, this will indicate the degree to which the data of a given user can be kept private from an interested adversary while still supporting the use of such services.

This work is supported by the National Science Foundation under Grant CNS-1739462. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation.

Information Theoretic Privacy Workshop

Publications

  • Preprint: N. Takbiri, A. Houmansadr, D. Goeckel, and H. Pishro-Nik, “ Privacy of Dependent Users Against Statistical Matching.
  • N. Takbiri, A. Houmansadr, D.L. Goeckel, and H. Pishro-Nik, ”Asymptotic Limits of Privacy in Bayesian Time Series Matching,” Conference on Information Science and Systems (CISS), 2019.
  • N. Takbiri, R. Soltani, A. Houmansadr, D.L. Goeckel, and H. Pishro-Nik, ”Asymptotic loss in privacy due to dependency in gaussian traces,” IEEE Wireless Communications and Networking Conference (WCNC), 2019.
  • N. Takbiri, A. Houmansadr, D.L. Goeckel, and H. Pishro-Nik, “ Matching Anonymized and Obfuscated Time Series to Users' Profiles.” IEEE Transactions on Information Theory, Vol. 65, No. 2, pp. 724-741, 2019.
  • N. Takbiri, A. Houmansadr, D.L. Goeckel, and H. Pishro-Nik, “Privacy against Statistical Matching: Inter-User Correlation,” IEEE International Symposium on Information Theory (ISIT), 2018.
  • N. Takbiri, A. Houmansadr, D.L. Goeckel, and H. Pishro-Nik, “Statistical matching in the presence of anonymization and obfuscation: Non-asymptotic results in the discrete case,” 2018 Annual Conference on Information Science and Systems (CISS), 2018
  • K. Li, H. Pishro-Nik, D. Goeckel, “Privacy against matching under anonymization and obfuscation in the Gaussian case,” 2018 Annual Conference on Information Science and Systems (CISS), 2018.
  • Z. Montazeri, A. Houmansadr, H. Pishro-Nik, “Achieving Perfect Location Privacy in Wireless Devices Using Anonymization,” in IEEE Transactions on Information Forensics and Security, Vol. 12, No. 11, pp. 2683-2698, 2017.
  • N. Takbiri, A. Houmansadr, D.L. Goeckel, and H. Pishro-Nik, “Limits of Location Privacy under Anonymization and Obfuscation,” IEEE International Symposium on Information Theory (ISIT), 2017.
  • N. Takbiri, A. Houmansadr, D.L. Goeckel, and H. Pishro-Nik, “Fundamental limits of location privacy using anonymization,” 51st Annual Conference on Information Science and Systems (CISS). IEEE, 2017.
  • K. Li, H. Pishro-Nik, D. Goeckel, “Bayesian time series matching and privacy, ” 2017 51st Asilomar Conference on Signals, Systems, and Computers, 2017.
  • Z. Montazeri, A. Houmansadr, H. Pishro-Nik, “Defining perfect location privacy using anonymization,” 2016 Annual Conference on Information Science and Systems (CISS), pp. 204-209, 2016.
  • Z. Montazeri, A. Houmansadr, H. Pishro-Nik, “Achieving Perfect Location Privacy in Markov Models Using Anonymization“, International Symposium on Information Theory and Its Applications (ISITA), 2016.