Privacy-Preserving Trajectory Collection Győző Gidófalvi * Uppsala University, Dept. of Information Technology Geomatic ApS Xuegang Huang and Torben Bach.

Slides:



Advertisements
Similar presentations
Context-awareness, cloudlets and the case for AP-embedded, anonymous computing Anthony LaMarca Associate Director Intel Labs Seattle.
Advertisements

Quantum Cryptography Post Tenebras Lux!
Kerberos Assisted Authentication in Mobile Ad-hoc Networks Authors: Asad Amir Pirzada and Chris McDonald Sources: Proceedings of the 27th Australasian.
Self-Organized Anonymous Authentication in Mobile Ad Hoc Networks Julien Freudiger, Maxim Raya and Jean-Pierre Hubaux SECURECOMM, 2009.
Presenter: Nguyen Ba Anh HCMC University of Technology Information System Security Course.
CMP206 – Introduction to Data Communication & Networks Lecture 1 - Networking Fundamentals.
PRIVACY AND SECURITY ISSUES IN DATA MINING P.h.D. Candidate: Anna Monreale Supervisors Prof. Dino Pedreschi Dott.ssa Fosca Giannotti University of Pisa.
Public Key Infrastructure Ben Sangster February 23, 2006.
MobiShare: Sharing Context-Dependent Data & Services from Mobile Sources Efstratios Valavanis, Christopher Ververidis, Michalis Vazirgianis, George C.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
A PASS Scheme in Clouding Computing - Protecting Data Privacy by Authentication and Secret Sharing Jyh-haw Yeh Dept. of Computer Science Boise State University.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Metrics for Evaluating ICEBERG ICEBERG Retreat Breakout Session Jan 11, 2000 Coordinators: Chen-Nee Chuah & Jimmy Shih.
Title put our names here. General Problem Statement Ability to give customized information to a user based on the user’s current location, the current.
Service Based Task Migration in Ubiquitous Environment Jari Porras 5th Workshop on Applications of Wireless Communications Lappeenranta, August 15th, 2007.
Motion Pattern Characterization NSF Wireless Mobility Workshop Rutgers, July 31-Aug 1, 2007 Mario Gerla Computer Science Dept, UCLA
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Computer Networks IGCSE ICT Section 4.
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
MOCA : Mobile Certificate Authority for Wireless Ad Hoc Networks The 2nd Annual PKI Research Workshop (PKI 2003) Seung Yi, Robin Kravets September. 25,
Chapter 10: Authentication Guide to Computer Network Security.
Scalability By Alex Huang. Current Status 10k resources managed per management server node Scales out horizontally (must disable stats collector) Real.
F EELING - BASED L OCATION P RIVACY P ROTECTION FOR L OCATION - BASED S ERVICES CS587x Lecture Department of Computer Science Iowa State University Ames,
Exploiting super peers for large- scale peer-to-peer Wi-Fi roaming Efstratios G. Dimopoulos, Pantelis A. Frangoudis and George.C.Polyzos.
UNIVERSITY of NOTRE DAME COLLEGE of ENGINEERING Preserving Location Privacy on the Release of Large-scale Mobility Data Xueheng Hu, Aaron D. Striegel Department.
15 Maintaining a Web Site Section 15.1 Identify Webmastering tasks Identify Web server maintenance techniques Describe the importance of backups Section.
Privacy Preserving Data Mining on Moving Object Trajectories Győző Gidófalvi Geomatic ApS Center for Geoinformatik Xuegang Harry Huang Torben Bach Pedersen.
Design patterns. What is a design pattern? Christopher Alexander: «The pattern describes a problem which again and again occurs in the work, as well as.
UNIT - 1Topic - 2 C OMPUTING E NVIRONMENTS. What is Computing Environment? Computing Environment explains how a collection of computers will process and.
©G. Millbery 2001Communications and Networked SystemsSlide 1 Purpose of Network Components  Switches A device that controls routing and operation of a.
UbiStore: Ubiquitous and Opportunistic Backup Architecture. Feiselia Tan, Sebastien Ardon, Max Ott Presented by: Zainab Aljazzaf.
Network Security Lecture 9 Presented by: Dr. Munam Ali Shah.
CSCI 5980: From GPS and Google Earth to Spatial Computing Fall 2012 Midterm Presentation Chapter 7: Architectures Team 9: Thao Nguyen, Nathan Poole October.
Seung-Hoon Lee, Sewook Jung, Alexander Chang, Dea-Ki Cho, and Mario Gerla Network Research Lab Department of Computer Science University of California,
Instant Social Ride-Sharing Győző Gidófalvi * Uppsala University, Dept. of Information Technology Gergely Herényi motoros.hu: Online Hungarian Forum for.
SELMA: A middleware platform for self- organizing distributed applications in mobile multi-hop ad-hoc networks Daniel Görgen, Hannes Frey, Johannes K.
An Approach To Automate a Process of Detecting Unauthorised Accesses M. Chmielewski, A. Gowdiak, N. Meyer, T. Ostwald, M. Stroiński
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
CONTACT INFORMATION Győző Gidófalvi: KTH Royal Institute of Technology – Geodesy and Geoinformatics – Manohar Kaul: Uppsala.
NETWORK HARDWARE AND SOFTWARE MR ROSS UNIT 3 IT APPLICATIONS.
1 SpaceTwist: A Flexible Approach for Hiding Query User Location Speaker: Man Lung Yiu Aalborg University Joint work with Christian S. Jensen, Xuegang.
Frequent Route Based Continuous Moving Object Location- and Density Prediction on Road Networks KTH – Royal Institute of Technology Uppsala University.
Id 1 id k id 2 … λ = 60 sec even odd PRIVACY-PRESERVING TRAJECTORY COLLECTION Győző Gidófalvi Xuegang Huang and Torben Bach Pedersen Problem Setting Accurate.
Spatio-temporal Pattern Queries M. Hadjieleftheriou G. Kollios P. Bakalov V. J. Tsotras.
Authentication protocol providing user anonymity and untraceability in wireless mobile communication systems Computer Networks Volume: 44, Issue: 2, February.
NETWORKING COMPONENTS BY: TRAVIS MARSHALL. HUBS A hub is a device within a network that has multiple Ethernet ports that devices can plug into. The hub.
From Trajectories of Moving Objects to Route-Based Traffic Prediction and Management by Gyozo Gidofalvi Ehsan Saqib Presented by Bo Mao Developing a Benchmark.
1 Privacy Aware Incentive Mechanism to Collect Mobile Data While Preventing Duplication Junggab Son*, Donghyun Kim*, Rasheed Hussain**, Sung-Sik Kwon*,
Computer Communication & Networks Lecture 9 Datalink Layer: Error Detection Waleed Ejaz
Privacy-preserving data publishing
COMP 424 Computer Security Lecture 09 & 10. Protocol ● An orderly sequence of steps agreed upon by two or more parties in order to accomplish a task ●
Shambhu Upadhyaya 1 Sensor Networks – Hop- by-Hop Authentication Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 22)
Location Privacy Protection for Location-based Services CS587x Lecture Department of Computer Science Iowa State University.
A Novel Privacy Preserving Authentication and Access Control Scheme for Pervasive Computing Environments Authors: Kui Ren, Wenjing Lou, Kwangjo Kim, and.
Module 12: Configuring Windows XP Professional for Mobile Computing.
1 Database Environment. 2 Objectives of Three-Level Architecture u All users should be able to access same data. u A user’s view is immune to changes.
Relying on Safe Distance to Achieve Strong Partitionable Group Membership in Ad Hoc Networks Authors: Q. Huang, C. Julien, G. Roman Presented By: Jeff.
Network Dynamics and Simulation Science Laboratory Structural Analysis of Electrical Networks Jiangzhuo Chen Joint work with Karla Atkins, V. S. Anil Kumar,
Introduction to Networking. What is a Network? Discuss in groups.
多媒體網路安全實驗室 A Secure Privacy-Preserving Roaming Protocol Based on Hierarchical Identity-Based Encryption for mobile Networks 作者 :Zhiguo Wan,Kui Ren,Bart.
Center for E-Business Technology Seoul National University Seoul, Korea Private Queries in Location Based Services: Anonymizers are not Necessary Gabriel.
 A Two-level Protocol to Answer Private Location-based Queries Roopa Vishwanathan Yan Huang [RoopaVishwanathan, Computer Science and.
Hybrid Cloud Architecture for Software-as-a-Service Provider to Achieve Higher Privacy and Decrease Securiity Concerns about Cloud Computing P. Reinhold.
Braindumps Questions Answers
Chapter 1 – Part 1 Introduction.
OneSwarm: Privacy Preserving P2P
Mining Long, Sharable Patterns in Trajectories of Moving Objects
Spatial Databases: Spatio-Temporal Databases
Presentation transcript:

Privacy-Preserving Trajectory Collection Győző Gidófalvi * Uppsala University, Dept. of Information Technology Geomatic ApS Xuegang Huang and Torben Bach Pedersen * Aalborg University, Dept. of Computer Science

November 5th, 2008G. Gidófalvi, X. Huang and T. B. Pedersen2 Problem Setting  Premise: Accurate trajectory patterns necessary for LBSs  Task: Collect exact trajectories of mobile users in a privacy-preserving manner  Objective: Use free, energy-saving, short-range wireless P2P communication (Bluetooth, ZigBee)  Problem: Hardware ID is exposed in P2P communication Data item HIDPrivate trajectory y t x Secret or embarrassing visit / location Need to break the link between public and private information!

November 5th, 2008G. Gidófalvi, X. Huang and T. B. Pedersen3 Location Privacy Definitions Data item : id DEF. k-anonymity : data itemsmoving objects mn≥ ? ? k=5 DEF. α-diversity : x y AREA(MBR)≥α locations (extendable to trajectories) DEF. k-α-anonymity : k-anonymity + α-diversity

November 5th, 2008G. Gidófalvi, X. Huang and T. B. Pedersen4 Merge traj pieces and monitor # of copies After T s +2τ if the majority parity is: odd  discard even  store Data Reporting k-α-anonymity id 1 id k id 2 … id 1 id 2 id k+4 id k+3 id 2 τ if or DB full Anonymity Set k-anonymity Trajectory Repository Data Summarization Trajectory Exchange Get neighbors with at least k resp. neighbors x x Privacy-Preserving Trajectory Collection in Five Stages Server k Registration Queue k = 5 α = 1000m Client Registration k-anonymity Registration request (hid, k, α) … Approval (T s,τ, τ max ) id 1 id k id 2 … id 1 id 2 id k id 2 id k+4 id k+3 id k+2 id 1 id k+1 id 2 exchanged Neighborhood Discovery Trajectory Sampling and Anonymization k-α-anonymity Every λ-period sample real & generate k-1 synthetic, pair-wise α-diverse traj. pieces λ = 60sec id 1 id k id 2 even odd … id 1 Partial data item traj. piece k-α-anonymity id 1 id k id 2 … id 1 id 2 id k+4 id k+3 id 2 Select pdis for exchange exchange id 2 id 1 id k id k+2 id k+1

November 5th, 2008G. Gidófalvi, X. Huang and T. B. Pedersen5 Results  Realistic simulation shows that the method works under reasonable conditions and anonymity settings > 98% of the clients report their collected data > 95% of the data is reported Not reported data is recent and can be corrected for  Method / system that: collects exact trajectories without a loss does not require trusted components and provides strong privacy guarantees