Motivated by privacy issues caused by inference attacks on user activities in the packet sizes and timing information of Internet of Things (IoT) network traffic, we establish a rigorous event-level differential privacy (DP) model on infinite packet streams. We propose a memoryless traffic shaping mechanism satisfying a first-come-first-served queuing discipline that outputs traffic dependent on the input using a DP mechanism. We show that in special cases the proposed mechanism recovers existing shapers which standardize the output independently from the input. To find the optimal shapers for given levels of privacy and transmission efficiency, we formulate the constrained problem of minimizing the expected delay per packet and propose using the expected queue size across time as a proxy. We further show that the constrained minimization is a convex program. We demonstrate the effect of shapers on both synthetic data and packet traces from actual IoT devices. The experimental results reveal inherent privacy-overhead tradeoffs: more shaping overhead provides better privacy protection. Under the same privacy level, there naturally exists a tradeoff between dummy traffic and delay. When dealing with heavier or less bursty input traffic, all shapers become more overhead-efficient. We also show that increased traffic from a larger number of IoT devices makes guaranteeing event-level privacy easier. The DP shaper offers tunable privacy that is invariant with the change in the input traffic distribution and has an advantage in handling burstiness over traffic-independent shapers. This approach well accommodates heterogeneous network conditions and enables users to adapt to their privacy/overhead demands.
翻译:由Things(IoT)网络网络流量的包装大小和时间信息对用户活动的攻击引起的隐私问题引发了推论,因此,我们在Flom Flotter 流上建立了严格的事件级差异隐私(DP)模型。我们提议了一个无记忆的交通设置机制,以满足先到先到先得的排队纪律,产出的传输取决于使用DP 机制的投入。我们表明,在特殊情况下,拟议机制恢复了现有的使输出独立于输入的输出标准化的元件。为了为特定程度的隐私和传输效率找到最佳的形状设计者,我们提出了尽可能减少每包预期的延迟的受限问题,并提议使用预期的排队规模作为代理。我们进一步表明,限制的最小化是一个螺旋式程序。我们展示了元件对合成数据以及实际 IoT 装置的包装痕迹的影响。实验结果揭示了内在的隐私overhead交易:更多的管理提供更好的隐私保护。 在同一隐私水平下,在假交通和延迟之间自然存在着一种折叠的交换关系。在处理较重或较弱的输入流量流量时,所有形状的形状都变得更方便。