The availability of inexpensive IoT sensors enables the collection of a wide range of data about buildings and their use by occupants. The data originating from these sensors are in many cases privacy-invasive. Therefore, methods for improving privacy protection for such data is needed. In this paper, we explore if suppression, k-anonymity or a combination of them, provides sufficient privacy protection on a published dataset. The results show that the specific dataset only was partly protected in the case of the combination of the two privacy protection methods. The attack vectors used to break the protection includes the sensor deployments, and the physically limitations of the sensors. This indicates, the need to consider how to protect the metadata of sensor deployments as well as the sensor streams. This additional metadata protection can serve as requirements, for anonymization methods for time-series data. However, even with good privacy protection, the building dataset might still be vulnerable to attacks since building data contains repeatable patterns which are susceptible to a range of attacks.
|Publikationsdato||15. apr. 2019|
|Status||Udgivet - 15. apr. 2019|
|Begivenhed||International Workshop on Security and Privacy for the Internet-of-Things - Montreal, Canada|
Varighed: 15. apr. 2019 → 15. apr. 2019
Konferencens nummer: 2
|Workshop||International Workshop on Security and Privacy for the Internet-of-Things|
|Periode||15/04/2019 → 15/04/2019|