
tive and negative effects of obfuscations can be com-
puted and labeled in the sub-graphs. Besides, Enhanc-
ing the suitability for real-world applications requires
thoughtful consideration of the stakeholders and their
respective interests when selecting input representa-
tions. Moreover, we plan to extend our evaluation to
different use cases to figure out other aspects of this
problem as well as APP-CEP limitations in fulfilling
various applications’ requirements.
ACKNOWLEDGEMENTS
This work has been supported by the Research Coun-
cil of Norway as part of the project Parrot (311197).
REFERENCES
Alt, B., Weckesser, M., Becker, C., Hollick, M., Kar, S.,
Klein, A., Klose, R., Kluge, R., Koeppl, H., Kold-
ehofe, B., et al. (2019). Transitions: A protocol-
independent view of the future internet. In Proceed-
ings of the IEEE, 107(4):835–846.
Barber, F. and Furnell, S. (2022). Benchmarking con-
sumer data and privacy knowledge in connected and
autonomous vehicles. In Proceedings of the 8th Inter-
national Conference on Information Systems Security
and Privacy (ICISSP’22), pages 426–434.
Chen, D., Sain, S. L., and Guo, K. (2012). Data mining for
the online retail industry: A case study of rfm model-
based customer segmentation using data mining. Jour-
nal of Database Marketing & Customer Strategy Man-
agement, 19:197–208.
Flink (2017). Flink-cep. https://nightlies.apache.org/flink/
flink-docs-master/docs/libs/cep/, Accessed on Oct
9th, 2023.
Gundersen, M. (2022). Statistics norway demands to
know exactly what norwegians buy in the grocery
store. https://nrkbeta.no/2022/05/28/ssb-krever-a-fa-
vite-noyaktig-hva-nordmenn-kjoper-i-matbutikken/,
Accessed on Oct 9th, 2023.
He, Y., Barman, S., Wang, D., and Naughton, J. F. (2011).
On the complexity of privacy-preserving complex
event processing. In Proceedings of the 13th ACM
SIGMOD-SIGACT-SIGART symposium on Principles
of database systems, pages 165–174.
Leicht, J. and Heisel, M. (2023). P2bac: Privacy policy
based access control using p-lpl. In Proceedings of the
9th International Conference on Information Systems
Security and Privacy (ICISSP’23), pages 686–697.
Li, L., Zhong, B., Hutmacher Jr, C., Liang, Y., Horrey, W. J.,
and Xu, X. (2020). Detection of driver manual distrac-
tion via image-based hand and ear recognition. Acci-
dent Analysis & Prevention, 137:p. 105432.
Lotfian Delouee, M., Koldehofe, B., and Degeler, V. (2022).
Towards adaptive quality-aware complex event pro-
cessing in the internet of things. In Proceedings of
the 18th International Conference on Mobility, Sens-
ing and Networking (MSN’22), pages 571–575. IEEE.
Lotfian Delouee, M., Koldehofe, B., and Degeler, V.
(2023a). Aqua-cep: Adaptive quality-aware complex
event processing in the internet of things. In Pro-
ceedings of the 17th ACM International Conference
on Distributed and Event-Based Systems (DEBS’23),
page 13–24. ACM.
Lotfian Delouee, M., Koldehofe, B., and Degeler, V.
(2023b). Poster: Towards pattern-level privacy pro-
tection in distributed complex event processing. In
Proceedings of the 17th ACM International Confer-
ence on Distributed and Event-Based Systems, page
185–186. ACM.
Palanisamy, S. M. (2020). Towards multiple pattern
type privacy protection in complex event processing
through event obfuscation strategies. In Data Privacy
Management, Cryptocurrencies and Blockchain Tech-
nology: ESORICS 2020 International Workshops,
DPM 2020 and CBT 2020, Guildford, UK, Septem-
ber 17–18, 2020, Revised Selected Papers 15, pages
178–194. Springer.
Palanisamy, S. M., D
¨
urr, F., Tariq, M. A., and Rothermel,
K. (2018). Preserving privacy and quality of service
in complex event processing through event reordering.
In Proceedings of the 12th ACM International Confer-
ence on Distributed and Event-based Systems, pages
40–51.
Plagemann, T., Goebel, V., Hollick, M., and Koldehofe, B.
(2022). Towards privacy engineering for real-time an-
alytics in the human-centered internet of things. arXiv
preprint arXiv:2210.16352.
Schilling, B., Koldehofe, B., Rothermel, K., and Ra-
machandran, U. (2013). Access policy consolidation
for event processing systems. In 2013 Conference on
Networked Systems, pages 92–101. IEEE.
Stach, C. and Steimle, F. (2019). Recommender-based
privacy requirements elicitation-epicurean: an ap-
proach to simplify privacy settings in iot applica-
tions with respect to the gdpr. In Proceedings of the
34th ACM/SIGAPP Symposium on Applied Comput-
ing, pages 1500–1507.
Tokas, S., Erdogan, G., and Stølen, K. (2023). Privacy-
aware iot: State-of-the-art and challenges. In Proceed-
ings of the 9th International Conference on Informa-
tion Systems Security and Privacy (ICISSP’23), pages
450–461.
Tran, T., Nguyen, P., and Erdogan, G. (2023). A system-
atic review of secure iot data sharing. In Proceed-
ings of the 9th International Conference on Informa-
tion Systems Security and Privacy (ICISSP’23), pages
95–105.
Wang, D., He, Y., Rundensteiner, E., and Naughton, J. F.
(2013). Utility-maximizing event stream suppression.
In Proceedings of the 2013 ACM SIGMOD Interna-
tional Conference on Management of Data, pages
589–600.
APP-CEP: Adaptive Pattern-Level Privacy Protection in Complex Event Processing Systems
497