APP-CEP: Adaptive Pattern-level Privacy Protection in Complex Event Processing Systems

Open Access
Authors
  • M. Lotfian Delouee
  • V. Degeler ORCID logo
  • P. Amthor
  • B. Koldehofe
Publication date 2024
Host editors
  • G. Lenzini
  • P. Mori
  • S. Furnell
Book title ICISSP 2024
Book subtitle Proceedings of the 10th International Conference on Information Systems Security and Privacy : 26-28 February, 2024, Rome, Italy
ISBN
  • 9789897586835
Event International Conference on Information Systems Security and Privacy<br/>
Pages (from-to) 486-497
Publisher Setúbal: SciTePress
Organisations
  • Faculty of Science (FNWI) - Informatics Institute (IVI)
Abstract
Although privacy-preserving mechanisms endeavor to safeguard sensitive information at the attribute level, detected event patterns can still disclose privacy-sensitive knowledge in distributed complex event processing systems (DCEP). Events might not be inherently sensitive, but their aggregation into a pattern could still breach privacy. In this paper, we study in the context of APP-CEP the problem of integrating pattern-level privacy in event-based systems by selective assignment of obfuscation techniques to conceal private information. Compared to state-of-the-art techniques, we seek to enforce privacy independent of the actual events in streams. To support this, we acquire queries and privacy requirements using CEP-like patterns. The protection of privacy is accomplished through generating pattern dependency graphs, leading to dynamically appointing those techniques that have no consequences on detecting other sensitive patterns, as well as non-sensitive patterns required to prov ide acceptable Quality of Service. Besides, we model the knowledge that might be possessed by potential adversaries to violate privacy and its impacts on the obfuscation procedure. We assessed the performance of APP-CEP in a real-world scenario involving an online retailer’s transactions. Our evaluation results demonstrate that APP-CEP successfully provides a privacy-utility trade-off. Modeling the background knowledge also effectively prevents adversaries from realizing the modifications in the input streams.
Document type Conference contribution
Language English
Published at https://doi.org/10.5220/0012358700003648
Downloads
24appcep-icissp (Accepted author manuscript)
123587 (Final published version)
Permalink to this page
Back