Privacy-preserving Real-time Anomaly Detection Using Edge Computing

被引:17
作者
Mehnaz, Shagufta [1 ]
Bertino, Elisa [1 ]
机构
[1] Purdue Univ, W Lafayette, IN 47907 USA
来源
2020 IEEE 36TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE 2020) | 2020年
关键词
Anomaly detection; Edge Computing; Privacy; FULLY HOMOMORPHIC ENCRYPTION; SECURITY; INTERNET;
D O I
10.1109/ICDE48307.2020.00047
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Anomaly detection on data collected by devices, such as sensors and IoT objects, is inevitable for many critical systems, e.g., an anomaly in the data of a patient's health monitoring device may indicate a medical emergency situation. Because of the resource-constrained nature of these devices, data collected by such devices are usually off-loaded to the cloud/edge for storage and/or further analysis. However, to ensure data privacy it is critical that the data be transferred to and managed by the cloud/edge in an encrypted form which necessitates efficient processing of such encrypted data for real-time anomaly detection. Motivated by the simultaneous demands for data privacy and real-time data processing, in this paper, we investigate the problem of a privacy-preserving real-time anomaly detection service on sensitive, time series, streaming data. We propose a privacy-preserving framework that enables efficient anomaly detection on encrypted data by leveraging a lightweight and aggregation optimized encryption scheme to encrypt the data before off-loading the data to the edge. We demonstrate our solution for a widely used anomaly detection algorithm, windowed Gaussian anomaly detector and evaluate the performance of the solution in terms of the obtained model privacy, accuracy, latency, and communication cost.
引用
收藏
页码:469 / 480
页数:12
相关论文
共 34 条
[1]  
[Anonymous], 2002, P 8 ACM SIGKDD INT C, DOI DOI 10.1145/775047.775080
[2]  
[Anonymous], 2017, P 13 S US PRIV SEC
[3]  
[Anonymous], IOT ATT AR GETT WORS
[4]   Privacy-Preserving Outlier Detection Through Random Nonlinear Data Distortion [J].
Bhaduri, Kanishka ;
Stefanski, Mark D. ;
Srivastava, Ashok N. .
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART B-CYBERNETICS, 2011, 41 (01) :260-272
[5]  
Brakerski Zvika, 2014, ACM Transactions on Computation Theory, V6, DOI 10.1145/2633600
[6]  
Burkhart M., 2008, CoRR
[7]  
Coron JS, 2011, LECT NOTES COMPUT SC, V6841, P487, DOI 10.1007/978-3-642-22792-9_28
[8]  
Domingo-Ferrer J, 2002, LECT NOTES COMPUT SC, V2433, P471
[9]   Fully Homomorphic Encryption Using Ideal Lattices [J].
Gentry, Craig .
STOC'09: PROCEEDINGS OF THE 2009 ACM SYMPOSIUM ON THEORY OF COMPUTING, 2009, :169-178
[10]  
Huang Z., 2005, P 2005 ACM SIGMOD IN, P37, DOI DOI 10.1145/1066157.1066163