Skip to main content

Privacy-Preserving Regression Modeling and Attack Analysis in Sensor Network

  • Conference paper
  • First Online:
Cloud Computing and Big Data (CloudCom-Asia 2015)

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 9106))

Abstract

With the advancements of sensing technologies, participatory data fusion and analysis have raised more and more attention as it provides a promising way enabling the public benefit from this process. However, it is increasingly becoming a challenging problem about how to construct a statistical model for this kind of particular phenomenon under the premise of protecting the data privacy. In this paper, we present a method to build a linear regression model describing a phenomenon observed in the distributed network. At the same time, the private data of each node is preserved.

We propose a data aggregation algorithm to fuse the indispensable data for constructing linear regression equation even though the data is private and scattered in the whole network. We also point out that the aggregate node can not only conduct regression modeling, but can conduct some complex statistical analyses based on the aggregation result as well. In addition, we investigate the ability and the degree of the algorithm to preserve the data privacy. We mainly focus on the ability to protect the aggregation result of a community composed of sensor nodes. The experiment shows that the aggregation result can not be disclosed to people unless all of the sensor nodes in the community collude with each other.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ahmadi, H., Pham, N., Ganti, R., Abdelzaher, T., Nath, S., Han, J.: Privacy-aware regression modeling of participatory sensing data. In: Proceedings of the 8th ACM Conference on Embedded Networked Sensor Systems. pp. 99–112. ACM (2010)

    Google Scholar 

  2. Chan, H., Perrig, A., Song, D.: Secure hierarchical in-network aggregation in sensor networks. In: Proceedings of the 13th ACM conference on Computer and communications security. pp. 278–287. ACM (2006)

    Google Scholar 

  3. Chen, X., Makki, K., Yen, K., Pissinou, N.: Sensor network security: a survey. IEEE Commun. Surv. Tutorials 11(2), 52–73 (2009)

    Article  Google Scholar 

  4. Ding, M., Cheng, X., Xue, G.: Aggregation tree construction in sensor networks. In: 2003 IEEE 58th Vehicular Technology Conference VTC 2003-Fall, vol. 4, pp. 2168–2172. IEEE (2003)

    Google Scholar 

  5. Du, W., Han, Y., Chen, S.: Privacy-preserving multivariate statistical analysis: Linear regression and classification. In: Proceedings of the 4th SIAM International Conference on Data Mining. vol. 233. Lake Buena Vista, Florida (2004)

    Google Scholar 

  6. Feng, T., Wang, C., Zhang, W., Ruan, L.: Confidentiality protection for distributed sensor data aggregation. In: The 27th IEEE Conference on Computer Communications INFOCOM 2008 IEEE (2008)

    Google Scholar 

  7. He, W., Liu, X., Nguyen, H., Nahrstedt, K., Abdelzaher, T.: Pda: Privacy-preserving data aggregation in wireless sensor networks. In: 26th IEEE International Conference on Computer Communications INFOCOM 2007, pp. 2045–2053. IEEE (2007)

    Google Scholar 

  8. He, W., Nguyen, H., Liu, X., Nahrstedt, K., Abdelzaher, T.: IPDA: an integrity-protecting private data aggregation scheme for wireless sensor networks. In: IEEE Military Communications Conference MILCOM 2008, pp. 1–7. IEEE (2008)

    Google Scholar 

  9. L, T.: http://www.liaad.up.pt/ltorgo/regression/datasets.html

  10. Li, N., Zhang, N., Das, S.K., Thuraisingham, B.: Privacy preservation in wireless sensor networks: a state-of-the-art survey. Ad Hoc Netw. 7(8), 1501–1514 (2009)

    Article  Google Scholar 

  11. Powell, M.: An efficient method for finding the minimum of a function of several variables without calculating derivatives. Comput. J. 7(2), 155–162 (1964)

    Article  MATH  MathSciNet  Google Scholar 

  12. Sanil, A., Karr, A., Lin, X., Reiter, J.: Privacy preserving regression modelling via distributed computation. In: Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery And Data Mining, pp. 677–682. ACM (2004)

    Google Scholar 

  13. Shi, J., Zhang, R., Liu, Y., Zhang, Y.: Prisense: privacy-preserving data aggregation in people-centric urban sensing systems. In: 2010 IEEE Proceedings of INFOCOM, pp. 1–9. IEEE (2010)

    Google Scholar 

  14. Xing, K., Wan, Z., Hu, P., Zhu, H., Wang, Y., Chen, X., Wang, Y., Huang, L.: Mutual privacy-preserving regression modeling in participatory sensing. In: 2013 IEEE Proceedings of INFOCOM, pp. 3039–3047. IEEE (2013)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Jianjun Wu or Fengjuan Zhang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Wu, J., Zhang, F. (2015). Privacy-Preserving Regression Modeling and Attack Analysis in Sensor Network. In: Qiang, W., Zheng, X., Hsu, CH. (eds) Cloud Computing and Big Data. CloudCom-Asia 2015. Lecture Notes in Computer Science(), vol 9106. Springer, Cham. https://doi.org/10.1007/978-3-319-28430-9_27

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-28430-9_27

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-28429-3

  • Online ISBN: 978-3-319-28430-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics