PrivateRide: A Privacy-Enhanced Ride-Hailing Service

Slides:



Advertisements
Similar presentations
Research & Development Workshop on e-Voting and e-Government in the UK - February 27, 2006 Votinbox - a voting system based on smart cards Sébastien Canard.
Advertisements

Dating Portal showcase Copyright © 2007 Credentica Inc. All Rights Reserved. February 15th - 16th, 2007.
PKE PP Mike Henry Jean Petty Entrust CygnaCom Santosh Chokhani.
Lect. 18: Cryptographic Protocols. 2 1.Cryptographic Protocols 2.Special Signatures 3.Secret Sharing and Threshold Cryptography 4.Zero-knowledge Proofs.
Quantifying Location Privacy: The Case of Sporadic Location Exposure Reza Shokri George Theodorakopoulos George Danezis Jean-Pierre Hubaux Jean-Yves Le.
Yan Huang, Jonathan Katz, David Evans University of Maryland, University of Virginia Efficient Secure Two-Party Computation Using Symmetric Cut-and-Choose.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
Your Presenter Amer Sharaf Electronic Payments: Where do we go from here? ByMarkus Jakobsson David Mraihi Yiannis Tsiounis Moti Yung.
Link Setup Time (ms) Details : How do sender and receiver synchronize i ? Discovery/binding messages: infrequent and narrow interface  short term linkability.
WiFi-Reports: Improving Wireless Network Selection Jeffrey Pang (CMU) with Ben Greenstein (IRS) Michael Kaminsky (IRP) Damon McCoy (U. Colorado) Srinivasan.
APPLAUS: A Privacy-Preserving Location Proof Updating System for Location-based Services Zhichao Zhu and Guohong Cao Department of Computer Science and.
PRIAM: PRivate Information Access Management on Outsourced Storage Service Providers Mark Shaneck Karthikeyan Mahadevan Jeff Yongdae Kim.
Electronic Payment Systems. Transaction reconciliation –Cash or check.
Efficient Privilege De-Escalation for Ad Libraries in Mobile Apps Bin Liu (SRA), Bin Liu (CMU), Hongxia Jin (SRA), Ramesh Govindan (USC)
Digital Cash By Gaurav Shetty. Agenda Introduction. Introduction. Working. Working. Desired Properties. Desired Properties. Protocols for Digital Cash.
INTRODUCTION  Soch Solutions has launched an innovative e-queue system for crowd management.  Using the online advance queue web application, visitors.
All Experimenters Meetings Windows 7 Migration 1 April 18, 2011 W7 AEM Presentation.
Quantifying Location Privacy Reza Shokri George Theodorakopoulos Jean-Yves Le Boudec Jean-Pierre Hubaux May 2011.
To place an online order with Red Runner go to:
Social Networking with Frientegrity: Privacy and Integrity with an Untrusted Provider Prateek Basavaraj April 9 th 2014.
Monitoring for network security and management Cyber Solutions Inc.
A Privacy-Preserving Interdomain Audit Framework Adam J. Lee Parisa Tabriz Nikita Borisov University of Illinois, Urbana-Champaign WPES 2006.
The Strickland Group Founded in employees Information Technology consulting – Software Development – HelpDesk Support – Network Infrastructure.
Chapter 4 Getting Paid. Objectives Understand electronic payment systems Know why you need a merchant account Know how to get a merchant account Explain.
E-banking in Hong Kong Financial institution in Hong Kong Group 6.
PKI2001(TIFR,Mumbai) PGP Pretty Good Privacy Designed for secure transfer of s with off-line or out of band key distribution.
Privacy Enhancing Technologies Spring What is Privacy? “The right to be let alone” Confidentiality Anonymity Access Control Most privacy technologies.
SSL with New Client Authentication Takuya Yahagi, S University of Aizu Performance Evaluation Lab.
P2: Privacy-Preserving Communication and Precise Reward Architecture for V2G Networks in Smart Grid P2: Privacy-Preserving Communication and Precise Reward.
Safe Driving Scheme Driver & fleet monitoring solutions.
FitnessGram® 2015 Student Information System (SIS) Extract Import Training for Georgia School Year.
Grace Cheung William mac. Taxi Best Inspirations Difficult in getting a taxi Simplify the life of driver and passenger Choosing multiple cab company instead.
Electronic Cash R. Newman. Topics Defining anonymity Need for anonymity Defining privacy Threats to anonymity and privacy Mechanisms to provide anonymity.
Privacy Issues in Smart Grid R. Newman. Topics Defining anonymity Need for anonymity Defining privacy Threats to anonymity and privacy Mechanisms to provide.
Electronic Payment Systems Presented by Rufus Knight Veronica Ogle Chris Sullivan As eCommerce grows, so does our need to understand current methods of.
Mike May President and founder of Sendero Group, accessible GPS Advisor to Uber Traveling More Independently Using iPhone Apps CTEBVI Conference Friday,
LCA1 Erman Ayday, Jean Louis Raisaro and Jean-Pierre Hubaux Privacy-Enhancing Technologies for Medical Tests and Personalized Medicine Laboratory for Computer.
Presented by: Harlow & Harlow, LLP
How to Request a Ride on.
chownIoT Secure Handling of Smart Home IoT Devices Ownership Change
Problem: Internet diagnostics and forensics
T-Share: A Large-Scale Dynamic Taxi Ridesharing Service
Strategies to integrate third-party service providers
Network Security Analysis Name : Waleed Al-Rumaih ID :
Privacy-Preserving Clustering
Hybrid Cloud Architecture for Software-as-a-Service Provider to Achieve Higher Privacy and Decrease Securiity Concerns about Cloud Computing P. Reinhold.
CS580 Internet Security Protocols
Multi Agent Approach for Time Based Vehicle Arrangement in Reputed Taxi Companies. 6037PS – D. A. P. Peiris Supervisors Mr. D.D.A. Gamini Mr. B.
Practical E-Payment Scheme
What is OCACCESS Online?
563.10: Bloom Cookies Web Search Personalization without User Tracking
Unit 1: Business Skills for e-commerce
zTrip, the Official App of ExecuCar
Taxi App source code Development Company
Overview ➔ Cab2Ride Texi Booking App - One of the most popular ride booking app in America. Cab2Ride Texi Booking App ➔ This Ride Sharing app design and.
Strategies to integrate third-party service providers
Overview of Zero-Knowledge Systems Inc
Final Product Review Justin Thibodeau CSE Jack Curci EE
Foundations of Fully Dynamic Group Signatures
PLUG-N-HARVEST ID: H2020-EU
PARTNERSHIPS An experiment! Public Private Partnership
Conquest-Financial Services
The main cause for that are the famous phishing attacks, in which the attacker directs users to a fake web page identical to another one and steals the.
Business model review CAPE TOWN December 2-7, 2018.
Overview of Micropayment Technology
Firewall Installation
FitnessGram® 2015 Student Information System (SIS) Extract Import Training for Georgia School Year.
CS 4360 Software Engineering
Claxi – taxi just a click away
Presentation transcript:

PrivateRide: A Privacy-Enhanced Ride-Hailing Service Anh Pham1, Italo Dacosta1, Bastien Jacot-Guillarmod1, Kévin Huguenin2, Taha Hajar1, Florian Tramèr3, Virgil Gligor4, and Jean-Pierre Hubaux1 1EPFL, 2UNIL, 3Stanford, 4CMU

Ride-Hailing Services (RHSs) Millions of users, billions of rides, hundreds of cities

Service providers track riders’ locations

Our contributions The first general privacy analysis of RHSs Identified high-risk threats PrivateRide: the first solution that addresses the identified threats Privacy and performance evaluation of PrivateRide

RHS overview Match riders and drivers Compute fares Handle payment Provide reputation system Service Provider (SP) Internet Some other variations. This is the most common setup. Riders (R) Drivers (D) Request rides Offer rides

Threat model SP Honest-but-curious Outsider (O) Active Internet Riders (R) Drivers (D) Active Active

Privacy analysis: high-risk threats SP tracks riders’ locations Outsider harvests drivers’ PII SP database Rider’s real identity Precise pickup and drop-off locations Precise pickup and drop-off times Full location trace Fare Driver’s real identity SP Internet ID2, Location Y ID1, Location X Closest drivers’ info Cancel Outsider (O)

PrivateRide: Goals while preserving: No riders’ location tracking No drivers’ PII harvesting SP economic incentives Usability Payment and reputation operations Accountability while preserving: PrivateRide

Overall protocol SP Ride initiation Alice drives to pick up Bob Secure channel Proximity channel Rider: Bob (anonymously logged in using an AC) SP Driver: Alice certBob e-cash ACs (1) zone1 certAlice Ride initiation Driver: Dave (1) zone2 certDave (2) zone3, e-cash deposit (3) Match to the closest driver (Alice) (4) Build a secure channel, exchange locations, repBob, generate a PIN Alice drives to pick up Bob (5) Alice’s locations in real time In proximity of the pick-up location (6) Proximity check using PIN (7) Identifying info: vehicle’s info., Alice’s profile picture (8) Build and exchange reputation tokens During the ride (9) loc. b/w zone3 and drop-off zone (11) Charge from deposit (10) Done End of the ride (12a) Anonymously rate Bob (12b) Anonymously rate Alice

Protocol analysis: PrivateRide vs. current RHSs Identities Pick-up loc. Pick-up time Drop-off loc. Drop-off time Loc. trace Fare Current RHSs Rider, Driver Precise Full Yes PrivateRide Driver Zone Obfuscated Partial

Evaluation Data-sets Evaluation criteria NYC taxi rides: Pick-up, drop-off locations and times, drivers’ info. SF Uber rides: Truncated anonymous GPS traces Evaluation criteria Cryptographic overhead Privacy level (k-anonymity) [NYC] Effect of the size of the zones on Fare calculation [SF] Optimality of ride matching [NYC]

Cryptographic overhead A prototype Android1 client ACL2 operations Blind and standard signatures Security parameters: ACL with an EC group of 521 bits and 4096-bit RSA keys ACL with an EC group of 224 bits and 2048-bit RSA keys Negligible w.r.t. waiting time of minutes in RHSs 1 LG G3 (4x2.5 GHz, 2GB RAM) running Android 5.0 2 F. Baldimtsi and A. Lysyanskaya. Anonymous Credentials Light, CCS (2013)

Privacy guarantees Measured by k-anonymity Targeted attack by a powerful SP: Knows the pick-up location and time of a specific rider Wants to know the drop-off location General case: Knows riders’ home/work addresses Wants to profile riders’ activities

Privacy guarantees – targeted attacks by powerful SP For peak hour: 7 PM – 8 PM For least-busy hour: 4 AM – 5 AM For zones of size 600 m x 600 m: 60% of rides has anonymity set ≥ 7 during peak hour 50% of rides has anonymity set ≥ 2 during least-busy hour

Conclusions The first analysis about privacy threats in RHSs The first privacy-enhancing solution for RHSs Negligible delay for ride-hailing operations Enhanced location privacy for riders Harvesting attacks on drivers’ PII are prevented Limitations: Trade-off between anonymity sets and accuracy of ride-matching operations Require riders to obtain e-cash in advance Follow-up work: ORide3 protocol at USENIX Security Symposium 2017 3http://oride.epfl.ch