H. C. Pöhls, Max Mossinger, Benedikt Petschkuhn, J. Rückert
{"title":"实践中的聚合与扰动:隐私、准确性与性能的个案研究","authors":"H. C. Pöhls, Max Mossinger, Benedikt Petschkuhn, J. Rückert","doi":"10.1109/CAMAD.2014.7033231","DOIUrl":null,"url":null,"abstract":"We analyse accuracy, privacy, compression-ratio and computational overhead of selected aggregation and perturbation methods in the Internet of Things (IoT). We measure over a real-life data set of detailed energy consumption logs of a single family household. We modelled privacy by simple, threshold-driven machine-learning algorithms that extract features of behaviour. The accuracy of those extraction is used as privacy metric. We state for different parameters of the aggregation, reduction and perturbation if the output still allows detections, as this follows the EU's data protection principle of “minimisation”: increased privacy due to less detailed data, but still good enough accuracy for the purpose. The result is that many detections for sensible predictions and intelligent reactions are still possible with lower quality data.","PeriodicalId":111472,"journal":{"name":"2014 IEEE 19th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Aggregation and perturbation in practice: Case-study of privacy, accuracy & performance\",\"authors\":\"H. C. Pöhls, Max Mossinger, Benedikt Petschkuhn, J. Rückert\",\"doi\":\"10.1109/CAMAD.2014.7033231\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We analyse accuracy, privacy, compression-ratio and computational overhead of selected aggregation and perturbation methods in the Internet of Things (IoT). We measure over a real-life data set of detailed energy consumption logs of a single family household. We modelled privacy by simple, threshold-driven machine-learning algorithms that extract features of behaviour. The accuracy of those extraction is used as privacy metric. We state for different parameters of the aggregation, reduction and perturbation if the output still allows detections, as this follows the EU's data protection principle of “minimisation”: increased privacy due to less detailed data, but still good enough accuracy for the purpose. The result is that many detections for sensible predictions and intelligent reactions are still possible with lower quality data.\",\"PeriodicalId\":111472,\"journal\":{\"name\":\"2014 IEEE 19th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)\",\"volume\":\"13 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 IEEE 19th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CAMAD.2014.7033231\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 IEEE 19th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CAMAD.2014.7033231","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Aggregation and perturbation in practice: Case-study of privacy, accuracy & performance
We analyse accuracy, privacy, compression-ratio and computational overhead of selected aggregation and perturbation methods in the Internet of Things (IoT). We measure over a real-life data set of detailed energy consumption logs of a single family household. We modelled privacy by simple, threshold-driven machine-learning algorithms that extract features of behaviour. The accuracy of those extraction is used as privacy metric. We state for different parameters of the aggregation, reduction and perturbation if the output still allows detections, as this follows the EU's data protection principle of “minimisation”: increased privacy due to less detailed data, but still good enough accuracy for the purpose. The result is that many detections for sensible predictions and intelligent reactions are still possible with lower quality data.