ABSTRACT
Complex Event Processing (CEP) Systems are stream processing systems that monitor incoming event streams in search of userspecified event patterns. While CEP systems have been adopted in a variety of applications, the privacy implications of event pattern reporting mechanisms have yet to be studied - a stark contrast to the significant amount of attention that has been devoted to privacy for relational systems. In this paper we present a privacy problem that arises when the system must support desired patterns (those that should be reported if detected) and private patterns (those that should not be revealed). We formalize this problem, which we term privacy-preserving, utility maximizing CEP (PP-CEP), and analyze its complexity under various assumptions. Our results show that this is a rich problem to study and shed some light on the difficulty of developing algorithms that preserve utility without compromising privacy.
- Coral8: www.coral8.com.Google Scholar
- Streambase: www.streambase.com.Google Scholar
- Streaminsight: http://www.microsoft.com/sqlserver/2008/en/us/r2-complex-event.aspx.Google Scholar
- J. Agrawal, Y. Diao, D. Gyllstrom, and N. Immerman. Efficient pattern matching over event streams. In SIGMOD, 2008. Google Scholar
Digital Library
- M. H. Ali and C. G. et al. Microsoft cep server and online behavioral targeting. In VLDB, 2009. Google Scholar
Digital Library
- N. Bansal, N. Korula, V. Nagarajan, and A. Srinivasan. On k-column sparse packing programs. CoRR, 0908.2256, 2009.Google Scholar
- R. S. Barga, J. Goldstein, M. Ali, and M. Hong. Consistent streaming through time: A vision for event stream processing. 2007.Google Scholar
- U. Feige. A threshold of ln n for approximating set cover. Journal of the ACM, 45 (4), 1998. Google Scholar
Digital Library
- S. Fujishige. Submodular functions and optimization. 2005.Google Scholar
- D. Gyllstrom, E. Wu, H.-J. Chae, Y. Diao, P. Stahlberg, and G. Anderson. SASE: Complex event processing over streams. In CIDR, 2007.Google Scholar
- S. Iwata and K. Nagano. Submodular function minimization under covering constraints. In FOCS, 2009. Google Scholar
Digital Library
- P. Kall and S. W. Wallace. Stochastic Programming. Wiley, 1994.Google Scholar
- C. Koufogiannakis and N. E. Young. Greedy Δ-approximation algorithm for covering with arbitrary constraints and submodular cost. In Proceedings of the 36th International Colloquium on Automata, Languages and Programming: Part I, pages 634--652, Berlin, Heidelberg, 2009. Springer-Verlag. Google Scholar
Digital Library
- E. D. Lazowska, J. Zahorjan, G. S. Graham, and K. C. Sevcik. Quantitative System Performance. Prentice Hall, 1984. Google Scholar
Digital Library
- H. W. Lenstra. Integer programming with a fixed number of variables. Mathematics of Operation Research, 1983.Google Scholar
Digital Library
- M. Liu, M. Li, D. Golovnya, E. A. Rundensteiner, and K. Claypool. Sequence pattern query processing over out-of-order event streams. In ICDE, 2009. Google Scholar
Digital Library
- Y. Mei and S. Madden. Zstream: A cost-based query processor for adaptively detecting composite events. In SIGMOD, 2009. Google Scholar
Digital Library
- D. Pritchard and D. Chakrabarty. Approximability of sparse integer programs. CoRR, 0904.0859, 2009.Google Scholar
- L. Trevisan. Inapproximability of combinatorial optimization problems. Technical report, University of California Berkeley, 2004.Google Scholar
- D. Wang, E. Rundensteiner, and R. Ellison. Active complex event processing for realtime health care. In VLDB, 2010. Google Scholar
Digital Library
- W. White, M. Riedewald, J. Gehrke, and A. Demers. What is "next" in event processing? In PODS, 2007. Google Scholar
Digital Library
- E. Wu, Y. Diao, and S. Rizvi. High-performance complex event processing over streams. In SIGMOD, 2006. Google Scholar
Digital Library
Index Terms
On the complexity of privacy-preserving complex event processing
Recommendations
Preserving Privacy and Quality of Service in Complex Event Processing through Event Reordering
DEBS '18: Proceedings of the 12th ACM International Conference on Distributed and Event-based SystemsThe Internet of Things (IoT) envisions a huge number of networked sensors connected to the internet. These sensors collect large streams of data which serve as input to wide range of IoT applications and services such as e-health, e-commerce, and ...
Towards Multiple Pattern Type Privacy Protection in Complex Event Processing Through Event Obfuscation Strategies
Data Privacy Management, Cryptocurrencies and Blockchain TechnologyAbstractFor a Complex Event Processing (CEP) system to be widely accepted, mitigating leaks of private information is paramount. In CEP systems, often private information are revealed through patterns instead of single events. There are very few ...
Poster: Towards Pattern-Level Privacy Protection in Distributed Complex Event Processing
DEBS '23: Proceedings of the 17th ACM International Conference on Distributed and Event-based SystemsIn event processing systems, detected event patterns can reveal privacy-sensitive information. In this paper, we propose and discuss how to integrate pattern-level privacy protection in event-based systems. Compared to state-of-the-art approaches, we ...






Comments