Contact Us Search Paper

k-Anonymous Query Scheme on the Internet of Things: a Zero Trust Architecture

Kadhim Hayawi1, Pin-Han Ho2, *, Sujith Samuel Mathew1, and Limei Peng3

Corresponding Author:

Pin-Han Ho

Affiliation(s):

1 College of Technological Innovation, Zayed University, Abu Dhabi, UAE

2 Department of Electrical and Computer Engineering, University of Waterloo, Canada

3 Department of Industry Engineering, Ajou University, Korea

*Corresponding author


Abstract:

The paper investigates query-anonymity in Internet of things (IoT) formed by a sensor cloud, where the sensor nodes provide services of sensing and are subject to user queries of sensing data. Due to the heterogeneity and multi-carrier natures of the sensor cloud, user privacy could be impaired when the queries have to go through nodes of a third party. Thus, the paper firstly introduces a novel query k-anonymity scheme that countermeasures such a privacy threat. Based on the proposed k-anonymity scheme, the trade-offs between the achieved query-anonymity and various performance measures including, communication-cost, return-on-investment metric, path-length, and location anonymity metrics, are analyzed. By adopting a hybrid approach that takes into account the average and worst-case analysis, our evaluation results show that most of the obtained bounds on various performance anonymity trade-offs can be expressed precisely in terms of the offered level-of-anonymity k and network diameter d.

Keywords:

Anonymity Performance Trade-offs, Cloud, Internet of Things, k-Anonymity, Privacy Preserving Protocols, Zero Trust Architecture

Downloads: 90 Views: 866
Cite This Paper:

Kadhim Hayawi, Pin-Han Ho, Sujith Samuel Mathew, and Limei Peng (2021). k-Anonymous Query Scheme on the Internet of Things: a Zero Trust Architecture. Journal of Networking and Network Applications, Volume 1, Issue 3, pp. 88–102. https://doi.org/10.33969/J-NaNA.2021.010302.

References:

[1] L. Atzori, A. Iera, and G. Morabito, “The internet of things: A survey,” Computer networks, vol. 54, no. 15, pp. 2787–2805, 2010.

[2] C. Perera, A. Zaslavsky, P. Christen, and D. Georgakopoulos, “Sensing as a service model for smart cities supported by internet of things,” Transactions on Emerging Telecommunications Technologies, vol. 25, no. 1, pp. 81–93, 2014.

[3] X. Sheng, J. Tang, X. Xiao, and G. Xue, “Sensing as a service: Challenges, solutions and future directions,” IEEE Sensors journal, vol. 13, no. 10, pp. 3733–3741, 2013.

[4] J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, “Internet of things (iot): A vision, architectural elements, and future directions,” Future Generation Computer Systems, vol. 29, no. 7, pp. 1645–1660, 2013.

[5] S. S. Mathew, Y. Atif, Q. Z. Sheng, and Z. Maamar, “The web of things-challenges and enabling technologies,” in Internet of things and inter-cooperative computational technologies for collective intelligence. Springer, 2013, pp. 1–23.

[6] D. Chaum, “The dining cryptographers problem: Unconditional sender and recipient untraceability,” Journal of cryptology, vol. 1, no. 1, pp. 65–75, 1988.

[7] A. Pfitzmann and M. Hansen, “A terminology for talking about privacy by data minimization: Anonymity, unlinkability, undetectability, unob-servability, pseudonymity, and identity management,” 2010.

[8] R. Iyer, R. Rex, K. P. McPherson, D. Gandhi, A. Mahindra,

A. Singh, and R. Raskar, “Spatial k-anonymity: A privacy-preserving method for covid-19 related geospatial technologies,” arXiv preprint arXiv:2101.02556, 2021.

[9] D. Slijepˇcevi´c, M. Henzl, L. D. Klausner, T. Dam, P. Kieseberg, and M. Zeppelzauer, “k-anonymity in practice: How generalisation and suppression affect machine learning classifiers,” arXiv preprint arXiv:2102.04763, 2021.

[10] Y. Yan, E. A. Herman, A. Mahmood, T. Feng, and P. Xie, “A weighted

k- member clustering algorithm for k-anonymization,” Computing, pp. 1–23, 2021.

[11] K. Hayawi, “Cost analysis of query-anonymity on the internet of things,” Ph.D. dissertation, University of Waterloo, Waterloo, ON, Canada, 2017.

[12] B. Carbunar, Y. Yu, W. Shi, M. Pearce, and V. Vasudevan, “Query privacy in wireless sensor networks,” ACM Trans. Sen. Netw., vol. 6, no. 2, pp. 14:1–14:34, Mar. 2010. [Online]. Available: http://doi.acm.org/10.1145/1689239.1689244

[13] S. W. Rose, O. Borchert, S. Mitchell, and S. Connelly, “Zero trust architecture,” 2020.

[14] B. Embrey, “The top three factors driving zero trust adoption,” Computer Fraud & Security, vol. 2020, no. 9, pp. 13–15, 2020.

[15] J. Kindervag et al., “Build security into your network’s dna: The zero trust network architecture,” Forrester Research Inc, pp. 1–26, 2010.

[16] M. Samaniego and R. Deters, “Zero-trust hierarchical management in iot,” in 2018 IEEE international congress on Internet of Things (ICIOT). IEEE, 2018, pp. 88–95.

[17] A. A. Abbasi and M. Younis, “A survey on clustering algorithms for wireless sensor networks,” Computer communications, vol. 30, no. 14, pp. 2826–2841, 2007.

[18] O. Goldreich, Foundations of cryptography: volume 2, basic applica-tions. Cambridge university press, 2004.

[19] K. Hayawi, P.-H. Ho, S. S. Mathew, and L. Peng, “Securing the internet of things: a worst-case analysis of trade-off between query-anonymity and communication-cost,” in 2017 IEEE 31st International Conference on Advanced Information Networking and Applications (AINA). IEEE, 2017, pp. 939–946.

[20] O. Berthold, A. Pfitzmann, and R. Standtke, “The disadvantages of free mix routes and how to overcome them,” in Designing Privacy Enhancing Technologies. Springer, 2001, pp. 30–45.

[21] D. Kedogan, D. Agrawal, and S. Penz, “Limits of anonymity in open environments,” in International Workshop on Information Hiding. Springer, 2002, pp. 53–69.

[22] N. Mathewson and R. Dingledine, “Practical traffic analysis: Extending and resisting statistical disclosure,” in Privacy Enhancing Technologies. Springer, 2005, pp. 17–34.

[23] E. F. Krause, Taxicab geometry: An adventure in non-Euclidean geom-etry. Courier Corporation, 2012.

[24] T. H. Cormen, C. E. Leiserson, R. L. Rivest, and C. Stein, Introduction to Algorithms (3. ed.). MIT Press, 2009.

[25] K. Bogart, S. Drysdale, and C. Stein, “Discrete math for computer science students,” 2004.

[26] T. H. Cormen, C. E. Leiserson, R. L. Rivest, and C. Stein, Introduction to algorithms. MIT press, 2009.

[27] E. De Cristofaro, X. Ding, and G. Tsudik, “Privacy-preserving querying in sensor networks,” in Computer Communications and Networks, 2009. ICCCN 2009. Proceedings of 18th Internatonal Conference on, Aug 2009, pp. 1–6.

[28] M. Gruteser and D. Grunwald, “Anonymous usage of location-based services through spatial and temporal cloaking,” in Proceedings of the 1st international conference on Mobile systems, applications and services. ACM, 2003, pp. 31–42.

[29] C. P. Pfleeger and S. L. Pfleeger, Security in computing. Prentice Hall Professional Technical Reference, 2002.

[30] K. Hayawi, A. Mortezaei, and M. V. Tripunitara, “The limits of the trade-off between query-anonymity and communication-cost in wireless sensor networks,” in Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, ser. CODASPY ’15. New York, NY, USA: ACM, 2015, pp. 337–348. [Online]. Available: http://doi.acm.org/10.1145/2699026.2699113

[31] J.-F. Raymond, “Traffic analysis: Protocols, attacks, design issues, and open problems,” in Designing Privacy Enhancing Technologies. Springer, 2001, pp. 10–29.

[32] D. Agrawal and D. Kesdogan, “Measuring anonymity: The disclosure attack,” IEEE Security & privacy, vol. 1, no. 6, pp. 27–34, 2003.

[33] L. von Ahn, A. Bortz, and N. J. Hopper, “K-anonymous message transmission,” in Proceedings of the 10th ACM Conference on Computer and Communications Security, ser. CCS ’03. New York, NY, USA: ACM, 2003, pp. 122–130. [Online]. Available: http://doi.acm.org/10.1145/948109.948128

[34] C. E. Shannon, “Communication theory of secrecy systems*,” Bell system technical journal, vol. 28, no. 4, pp. 656–715, 1949.

[35] C. D´ıaz, S. Seys, J. Claessens, and B. Preneel, “Towards measuring anonymity,” in Proceedings of the 2nd international conference on Privacy enhancing technologies, ser. PET’02. Berlin, Heidelberg: Springer-Verlag, 2003, pp. 54–68. [Online]. Available: http://dl.acm.org/citation.cfm?id=1765299.1765304

[36] A. Serjantov and G. Danezis, “Towards an information theoretic metric for anonymity,” in Proceedings of the 2nd international conference on Privacy enhancing technologies, ser. PET’02. Berlin, Heidelberg: Springer-Verlag, 2003, pp. 41–53. [Online]. Available: http://dl.acm.org/citation.cfm?id=1765299.1765303

[37] G. T´oth, Z. Horn´ak, and F. Vajda, “Measuring anonymity revisited,” in Proceedings of the Ninth Nordic Workshop on Secure IT Systems. Espoo, Finland, 2004, pp. 85–90.