Precision variable anonymization method supporting transprecision computing
Recently, the number of Internet of Things (IoT) sensors has been increasing rapidly; hence, various data are gathered. As a secondary use of the data, they are useful in providing new services, such as the demand response service in the Smart Grid. However, data services cause several problems in p...
Saved in:
| Published in: | Advanced Communication Technology (ICACT), International Conference pp. 35 - 42 |
|---|---|
| Main Authors: | , , |
| Format: | Conference Proceeding |
| Language: | English |
| Published: |
Global IT Research Institute - GIRI
01.02.2020
|
| Subjects: | |
| ISSN: | 1738-9445 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Abstract | Recently, the number of Internet of Things (IoT) sensors has been increasing rapidly; hence, various data are gathered. As a secondary use of the data, they are useful in providing new services, such as the demand response service in the Smart Grid. However, data services cause several problems in preserving privacy and during computation. This study focuses on these two significant problems. First, the invasion of privacy while using the data to provide such new services is problematic. A lot of private information is available in the data. For example, power consumption data may reveal the lifestyle of the residents, and the technique of obtaining information is known as nonintrusive load monitoring. Second, the penetration of IoT devices and sensors increases the computational and communicating energy consumption for processing the data and for providing various services using the data. In this paper, a new method is proposed to solve these two problems. This method is based on the fact that the anonymization process reduces the amount of information itself, as well as the quantity of computational resources required. This leads to a trade-off between anonymization level and computational cost. For example, raw data have a maximum amount of information and maximum computational cost. In contrast, fully generalized data (all zero data) have minimum amount of information and minimum computational cost. Compared to the conventional method, the proposed method demonstrated lower precision and a higher error rate. Therefore, the proposed method aims to control the trade-off and enables the provision of anonymized data with less information, the required anonymity level, and low computational cost compared to the conventional method. The proposed method is practiced using power consumption data gathered from the Urban Design Center Misiono (UDCMi) and the demand response service is evaluated as an experiment using the data. In this evaluation, a simple model of energy consumption was used in the calculation, which uses the required bit width of the arithmetic logic unit (ALU) for providing the service. The computational efficiency of the proposed method was increased by 60% when k = 2 and by 65% when k = 3, 4, 5, 6 compared to the conventional method. The method can also maintain an acceptable range of service error. The transprecision platform can restrict energy consumption by reducing the bit width of the data. Therefore, the proposed anonymization method can also reduce energy consumption by achieving lower usage of the ALU based on the transprecision architecture. |
|---|---|
| AbstractList | Recently, the number of Internet of Things (IoT) sensors has been increasing rapidly; hence, various data are gathered. As a secondary use of the data, they are useful in providing new services, such as the demand response service in the Smart Grid. However, data services cause several problems in preserving privacy and during computation. This study focuses on these two significant problems. First, the invasion of privacy while using the data to provide such new services is problematic. A lot of private information is available in the data. For example, power consumption data may reveal the lifestyle of the residents, and the technique of obtaining information is known as nonintrusive load monitoring. Second, the penetration of IoT devices and sensors increases the computational and communicating energy consumption for processing the data and for providing various services using the data. In this paper, a new method is proposed to solve these two problems. This method is based on the fact that the anonymization process reduces the amount of information itself, as well as the quantity of computational resources required. This leads to a trade-off between anonymization level and computational cost. For example, raw data have a maximum amount of information and maximum computational cost. In contrast, fully generalized data (all zero data) have minimum amount of information and minimum computational cost. Compared to the conventional method, the proposed method demonstrated lower precision and a higher error rate. Therefore, the proposed method aims to control the trade-off and enables the provision of anonymized data with less information, the required anonymity level, and low computational cost compared to the conventional method. The proposed method is practiced using power consumption data gathered from the Urban Design Center Misiono (UDCMi) and the demand response service is evaluated as an experiment using the data. In this evaluation, a simple model of energy consumption was used in the calculation, which uses the required bit width of the arithmetic logic unit (ALU) for providing the service. The computational efficiency of the proposed method was increased by 60% when k = 2 and by 65% when k = 3, 4, 5, 6 compared to the conventional method. The method can also maintain an acceptable range of service error. The transprecision platform can restrict energy consumption by reducing the bit width of the data. Therefore, the proposed anonymization method can also reduce energy consumption by achieving lower usage of the ALU based on the transprecision architecture. |
| Author | Harada, Keiya Charles, Henri-Pierre Nishi, Hiroaki |
| Author_xml | – sequence: 1 givenname: Keiya surname: Harada fullname: Harada, Keiya organization: Graduate School of Science and Technology, Keio University,Yokohama,Kanagawa,Japan,223-8522 – sequence: 2 givenname: Henri-Pierre surname: Charles fullname: Charles, Henri-Pierre organization: Université Grenoble Alpes CEA, List,Grenoble,France,F-38000 – sequence: 3 givenname: Hiroaki surname: Nishi fullname: Nishi, Hiroaki organization: Graduate School of Science and Technology, Keio University,Yokohama,Kanagawa,Japan,223-8522 |
| BookMark | eNo9T8tOwzAQNAgkSskXcMkPJKzttWMfUcVLVIJDOVd27FCj5iE7RSpfTyIqTquZ0Tz2mlx0fecJySmUjGuq715W96sNKsllyYBBqUFSQdkZyXSlKVUKmQIU52RBK64KjSiuSJbSFwBwoACML8jre_R1SKHv8m8Tg7F7n5up6diGHzPOdOvHXe_ydBiGPo6h-8zHaLo0_Pvqvh0Os3BDLhuzTz473SX5eHzYrJ6L9dvTNHZd7LhiY6HASzQenLGGO4oNouHTXg-1g0ZbrlFZiQIrLlRl0dVCYmVr72YkkS_J7V9u8N5vhxhaE4_b0_v8Fzu4Uy8 |
| ContentType | Conference Proceeding |
| DBID | 6IE 6IL CBEJK RIE RIL |
| DOI | 10.23919/ICACT48636.2020.9061512 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE/IET Electronic Library IEEE Proceedings Order Plans (POP All) 1998-Present |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Xplore url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| EISBN | 9791188428045 |
| EISSN | 1738-9445 |
| EndPage | 42 |
| ExternalDocumentID | 9061512 |
| Genre | orig-research |
| GroupedDBID | 6IE 6IF 6IH 6IK 6IL 6IN AAJGR AAWTH ABLEC ADZIZ ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK CHZPO IEGSK IPLJI OCL RIE RIL RNS |
| ID | FETCH-LOGICAL-h382t-80e64ae0daba3d14f44a3118e0cd0f9b3948b645473587b4dc5647bced87b4643 |
| IEDL.DBID | RIE |
| ISICitedReferencesCount | 0 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000576739100007&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| IngestDate | Wed Aug 27 02:36:07 EDT 2025 |
| IsDoiOpenAccess | false |
| IsOpenAccess | true |
| IsPeerReviewed | false |
| IsScholarly | false |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-h382t-80e64ae0daba3d14f44a3118e0cd0f9b3948b645473587b4dc5647bced87b4643 |
| OpenAccessLink | https://cir.nii.ac.jp/crid/1872272492621432832 |
| PageCount | 8 |
| ParticipantIDs | ieee_primary_9061512 |
| PublicationCentury | 2000 |
| PublicationDate | 2020-02-01 |
| PublicationDateYYYYMMDD | 2020-02-01 |
| PublicationDate_xml | – month: 02 year: 2020 text: 2020-02-01 day: 01 |
| PublicationDecade | 2020 |
| PublicationTitle | Advanced Communication Technology (ICACT), International Conference |
| PublicationTitleAbbrev | ICACT |
| PublicationYear | 2020 |
| Publisher | Global IT Research Institute - GIRI |
| Publisher_xml | – name: Global IT Research Institute - GIRI |
| SSID | ssj0003010023 |
| Score | 1.7194073 |
| Snippet | Recently, the number of Internet of Things (IoT) sensors has been increasing rapidly; hence, various data are gathered. As a secondary use of the data, they... |
| SourceID | ieee |
| SourceType | Publisher |
| StartPage | 35 |
| SubjectTerms | anonymization Approximate computing Computational efficiency Data privacy Energy consumption k-anonymity power consumption data Power demand Privacy Sensors transprecision computing |
| Title | Precision variable anonymization method supporting transprecision computing |
| URI | https://ieeexplore.ieee.org/document/9061512 |
| WOSCitedRecordID | wos000576739100007&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LS8NAEB5q8eBJpRXf7MGjabfZzT6OUiyKUHKo0FvZV9CLljbt7-_sJkQEL96yCQPLJLvfzGa--QAeAlUVoqTOYivvDHdJnxk6UVnhEdyo8JWgLolNyPlcLZe67MFjx4UJIaTiszCKl-lfvv92u3hUNtYJf3HDPZJSNlyt7jwFP9SIP02xTs70RI9fp0_TBVeCxVKEnI5a8186KglGZqf_m8AZDH_4eKTskOYceuFrAG_lptXHIXtMeCMFipiUzLfUStKoQ5Ptbh2DbLQkdWpl3tm5JOmAD4bwPnteTF-yVhoh-2AqrxFXguAmUG-sYX7CK84Nw1whUOdppS3TXNnUrIsVSlruXSG4tC74OMIo5AL6OKNwCQTz49wwybi1GL0Jbp2zwVhc3MqLwrorGERHrNZN94tV64Prv2_fwEn0dVPXfAv9erMLd3Ds9vXndnOfXtkBpmCYhQ |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV07T8MwED5VBQkmQC2C8srASFondhx7RBVVq5aqQ5G6VX5FsEDVpv39nJ0oCImFLQ85si62vzv7vvsAHh0RBaKkjH0p7xhXSRsrkog4swhuhNuCExPEJvL5XKxWctGCp4YL45wLyWeu7y_DWb79Mnu_VTaQAX9xwT3KGEuTiq3V7KjgUPUIVKXrpFQmcjAZPg-XTHDqkxFS0q8_8EtJJQDJ6Ox_XTiH7g8jL1o0WHMBLffZgeliWyvkRAcMeT0JKlIhnK_JlVGlDx3t9hvvZmPLqAzFzJt2Jog64IsuvI1elsNxXIsjxO9UpCUii-NMOWKVVtQmrGBMUYwWHDGWFFJTyYQO5bpoJnLNrMk4y7Vx1t-hH3IJbeyRu4III-RU0ZwyrdF_40wbo53SOL2F5Zk219DxhlhvqvoX69oGvb8fP8DJePk6W88m8-kNnHq7V1nOt9Aut3t3B8fmUH7stvfh930DxBGbzA |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=Advanced+Communication+Technology+%28ICACT%29%2C+International+Conference&rft.atitle=Precision+variable+anonymization+method+supporting+transprecision+computing&rft.au=Harada%2C+Keiya&rft.au=Charles%2C+Henri-Pierre&rft.au=Nishi%2C+Hiroaki&rft.date=2020-02-01&rft.pub=Global+IT+Research+Institute+-+GIRI&rft.eissn=1738-9445&rft.spage=35&rft.epage=42&rft_id=info:doi/10.23919%2FICACT48636.2020.9061512&rft.externalDocID=9061512 |