Privacy-Preserving Indoor Localization on Smartphones

Slides:



Advertisements
Similar presentations
Cipher Techniques to Protect Anonymized Mobility Traces from Privacy Attacks Chris Y. T. Ma, David K. Y. Yau, Nung Kwan Yip and Nageswara S. V. Rao.
Advertisements

On the Effect of Trajectory Compression in Spatio-temporal Querying Elias Frentzos, and Yannis Theodoridis Data Management Group, University of Piraeus.
AirPlace Kyriakos Georgiou Athina Paphitou Maria Christodoulou
A Platform for the Evaluation of Fingerprint Positioning Algorithms on Android Smartphones C. Laoudias, G.Constantinou, M. Constantinides, S. Nicolaou,
Doc.: IEEE /1448 r00 Submission Paul A. Lambert, Marvell SemiconductorSlide Privacy Date: Authors: November 2013.
Reverse Hashing for High-speed Network Monitoring: Algorithms, Evaluation, and Applications Robert Schweller 1, Zhichun Li 1, Yan Chen 1, Yan Gao 1, Ashish.
Tracking Moving Objects in Anonymized Trajectories Nikolay Vyahhi 1, Spiridon Bakiras 2, Panos Kalnis 3, and Gabriel Ghinita 3 1 St. Petersburg State University.
APPLAUS: A Privacy-Preserving Location Proof Updating System for Location-based Services Zhichao Zhu and Guohong Cao Department of Computer Science and.
Dagstuhl Seminar 10042, Demetris Zeinalipour, University of Cyprus, 26/1/2010 RadioMap Prefetching for Indoor Navigation in Intermittently Connected Wi-Fi.
Indoor 3D, Cape Town Dec 2013 Tristian Lacroix IndoorLBS.
WSN Done By: 3bdulRa7man Al7arthi Mo7mad AlHudaib Moh7amad Ba7emed Wireless Sensors Network.
ACM HotPlanet 2012 – The 4 th ACM International Workshop on Hot Topics in Planet-Scale Measurement – co-located with ACM MobiSys 25 th June, 2012 Low Wood.
Wei-Shinn Ku Slide 1 Auburn University Computer Science and Software Engineering Query Integrity Assurance of Location-based Services Accessing Outsourced.
1.Research Motivation 2.Existing Techniques 3.Proposed Technique 4.Limitations 5.Conclusion.
Dagstuhl Seminar 10042, Demetris Zeinalipour, University of Cyprus, 26/1/2010 2nd Cyprus Workshop on Computing: Scientific Applications of Computing October.
Bloom Cookies: Web Search Personalization without User Tracking Authors: Nitesh Mor, Oriana Riva, Suman Nath, and John Kubiatowicz Presented by Ben Summers.
Web: ~ laoudias/pages/platform.htmlhttp://www2.ucy.ac.cy/ ~ laoudias/pages/platform.html
Dagstuhl Seminar 10042, Demetris Zeinalipour, University of Cyprus, 26/1/2010 1/17 ERCIM Spring Meeting 2013, June 6, 2013, Nicosia,
An Efficient Implementation of File Sharing Systems on the Basis of WiMAX and Wi-Fi Jingyuan Li, Liusheng Huang, Weijia Jia, Mingjun Xiao and Peng Du Joint.
Accelerating Multi-Pattern Matching on Compressed HTTP Traffic Dr. Anat Bremler-Barr (IDC) Joint work with Yaron Koral (IDC), Infocom[2009]
Indoor positioning systems Kyle Hampton. Outline Introduction Uses Players Techniques Challenges Future Conclusion.
Smartphone-based Wi-Fi Pedestrian-Tracking System Tolerating the RSS Variance Problem Yungeun Kim, Hyojeong Shin, and Hojung Cha Yonsei University Bing.
Privacy Vulnerability of Published Anonymous Mobility Traces Chris Y. T. Ma, David K. Y. Yau, Nung Kwan Yip (Purdue University) Nageswara S. V. Rao (Oak.
Google. Android What is Android ? -Android is Linux Based OS -Designed for use on cell phones, e-readers, tablet PCs. -Android provides easy access to.
Prefetching Indoor Navigation Structures in Anyplace
BUILD SECURE PRODUCTS AND SERVICES
Indoor Data Management in Anyplace
Mobile Computing CSE 40814/60814 Spring 2017.
Anyplace Indoor Information Service
Iot in the Retail industry
Professor Tzong-Chen Wu
Internet-based Indoor Navigation Services
University of Maryland College Park
TagPix Automatic Real-time Landscape Photo Tagging For Smartphones
Γεωτοποθέτηση Κινητών Συσκευών σε Εσωτερικούς Χώρους με Διαφύλαξη της Ιδιωτικότητας των Χρηστών Ανδρέας Κωνσταντινίδης∗, Γεώργιος Χατζημηλιούδης∗, Δημήτρης.
Indoor Data Management in Anyplace
Unit 2 GCSE Business Communication Systems
Privacy Preserving Subgraph Matching on Large Graphs in Cloud
Updating SF-Tree Speaker: Ho Wai Shing.
Improving searches through community clustering of information
BIG Data 25 Need-to-Know Facts.
Overall Goals Monitor food situations of food insecure/vulnerable communities Support food insecure communities to help them become more resilient and.
Data Virtualization Tutorial… Semijoin Optimization
Crowd Density Estimation for Public Transport Vehicles
S SPATE: Compacting and Exploring Telco Big Data Constantinos Costa1 , Georgios Chatzimilioudis1, Demetris Zeinalipour-Yazti2,1, Mohamed F. Mokbel3.
SocialMix: Supporting Privacy-aware Trusted Social Networking Services
Real-time Wall Outline Extraction for Redirected Walking
Subway Station Real-time Indoor Positioning System for Cell Phones
563.10: Bloom Cookies Web Search Personalization without User Tracking
Jaehoon (Paul) Jeong, Taehwan Hwang, and Eunseok Lee
AirPlace Indoor Positioning Platform for Android Smartphones
Mobile Commerce and the Internet of Things
Spatio-Temporal Query Processing in Smartphone Networks
Spatio-Temporal WiFi Localization
FMS: Managing Crowdsourced Indoor Signals with the Fingerprint Management Studio Marileni Angelidou1, Constantinos Costa1, Artyom Nikitin2, Demetrios.
Department of Computer Science
Privacy Preserving Subgraph Matching on Large Graphs in Cloud
Pyramid Sketch: a Sketch Framework
Guomei Zhang, Man Chu, Jie Li Personal Ubiquitous Computing 2016
Telco Big Data (TBD) Example:
“Location Privacy Protection for Smartphone Users”
TrinityIoT Premises Monitoring.
Internet of Things (IoT) for Industrial Development and Automation
Kyoungwoo Lee, Minyoung Kim, Nikil Dutt, and Nalini Venkatasubramanian
DK presents Division of Computer Science, KAIST
Carlos Ordonez, Javier Garcia-Garcia,
Efficient Processing of Top-k Spatial Preference Queries
The pitfalls of address randomization in wireless networks
The pitfalls of address randomization in wireless networks
Security in Wide Area Networks
Presentation transcript:

Privacy-Preserving Indoor Localization on Smartphones Andreas Konstantinidis∗, Georgios Chatzimilioudis∗, Demetrios Zeinalipour-Yazti∗, Paschalis Mpeis‡, Nikos Pelekis§ and Yannis Theodoridis§ ∗ ‡ § Slides accompanying paper: IEEE Transactions on Knowledge and Data Engineering (TKDE'15), IEEE Computer Society, Vol. 27, Iss. 11, pp. 3042-3055, Los Alamitos, CA, USA, 2015. + Poster at IEEE ICDE’16, Helsinki, Finland.

The Great Indoors People spend 80-90% of their time indoors – USA Environmental Protection Agency 2011. >85% of data and 70% of voice traffic originates from within buildings – Nokia 2012.

Indoor Localization Indoor Localization has still not reached its full potential. Huge spectrum of indoor apps: Navigation, Manufacturing, Asset Tracking, Inventory Management Healthcare, Smart Houses/Cities, Elderly support, Fitness apps Augmented Reality and Indoor Games Indoor Revenues expected to reach 10B USD in 2020 ABIresearch, “Retail Indoor Location Market Breaks US$10 Billion in 2020”’

Internet-based Indoor Navigation Enablers for Indoor apps have been Internet-based Indoor Navigation (IIN) services founded on measurements collected by IoT devices. IoT enrich navigate IIN Service “Internet-based Indoor Navigation Services”, Demetrios Zeinalipour-Yazti, Christos Laoudias, Kyriakos Georgiou and Georgios Chatzimiloudis, IEEE Internet Computing (IC'16), IEEE Computer Society, 2016. (also IEEE MDM’15 tutorial available)

Anyplace IIN Service http://anyplace.cs.ucy.ac.cy/ A complete open-source IIN Service developed at the University of Cyprus. Aims to become the predominant open-source Indoor IIN Service. Active community: Germany, Russia, Canada, UK, etc. – Join today! Android, Windows, iOS, JSON API http://anyplace.cs.ucy.ac.cy/

Anyplace IIN Service Accuracy Before  (using Google API Location) After  (using Anyplace Location & Indoor Models)

Anyplace IIN Service - Deployment http://anyplace.cs.ucy.ac.cy/

Location Tracking Problem An IIN Service can continuously “know” (surveil, track or monitor) the location of a user while serving them. In indoor spaces location tracking can occur at a very fine granularity (cm to few meters) Imminent threats: The stores / products of interest in a mall. The book shelves of interest in a library Artifacts observed in a museum, etc. Location privacy: no one (neither the service nor a hijacker) should be able to associate a specific location with the corresponding mobile user.

Outline Motivation Background Temporal Vector Map (TVM) Phase 1: Snapshot Localization Phase 2: Continuous Localization Experimentation Future Work

Indoor Localization Inaccurate Localization Techniques: GPS offers privacy (terminal-based) but doesn’t work indoors  Mobile APIs (Cell-ID, WiFi-ID Geolocation DBs), not accurate and no privacy (server-based) . Accurate Localization Techniques: Radiomap-based techniques (explained next) either accurate or offer privacy (but not both)  TVM: A radiomap-based technique that offers Accuracy, Privacy and Performance  Proposed Algorithm: Temporal Vector Map (TVM)

Radiomap-based Localization Logger IIN Service a) Upload Measurements b) Build RM (Radiomap) c) Localize fingerprint SSA User d) Localization Alternatives: Client-Side-Approach (CSA) – Privacy High Energy Server-Side-Approach (SSA) – No Privacy Low Energy CSA

Problem Formulation A mobile user u moves inside a building with Μ Access Points AP = {ap1,…, apΜ} RadioMap (RM) is available on Server (s) u senses fingerprint Vr = [ap1r ,…, apMr] at its current location pu is the privacy preference of u (s should not identify the location of u with a probability higher than pu) Objective: Provide continuous localization to u with minimum energy consumption on u under privacy preference pu.

Outline Motivation Background Temporal Vector Map (TVM) Phase 1: Snapshot Localization Phase 2: Continuous Localization Experimentation Future Work

Phase 1 Outline IIN Service Temporal Vector Map (TVM) kAB Filter (Bu) WiFi Set Membership Queries WiFi IIN Service ... Partial Radiomap (pRM) User u Localizes using Vu on pRM Calculate pRM based on k matched Access Points WiFi

k-Anonymity Bloom (kAB) Space-efficient probabilistic Bloom Filters allocate a vector of b bits, initially all set to 0, use h independent optimal hash functions to hash every Access Point seen by a user. Tradeoff between b and probability of a false positive. Given b, h and the total number M of APs, a user can calculate the amount of false positives of the Bloom filter: False Positive Ratio Size of Bloom Filter h3(AP) h1(AP) h2(AP) b 1

Phase 1 –Example u u has fingerprint Vu Real AP Camouflaged APs u u has fingerprint Vu 1) User u knows M=100, h=3 and selects pu=1/3 (i.e., k=3),  this results in b = 8 2) Randomly select an AP from Vu , e.g., ap2 3) Use h hash functions on ap2 to create Bu + send Bu to s. 4) s compares Bu to all APs to find the ones that match Cu (real & camouflaged APs) 5) s generates pRM: includes all rows with non-negative entries for matched APs 6) u localizes using pRM

Outline Motivation Background Temporal Vector Map (TVM) Phase 1: Snapshot Localization Phase 2: Continuous Localization Experimentation Future Work

TVM Phase 2 – Continuous Localization camouflaged APs kAB filter of TVM-Phase 1 does not guarantee u’s privacy when applied in consecutive requests  s can eliminate camouflaged APs Therefore Phase 2 evolves AP set at u’s side providing the illusion to s that there are k natural movement patterns at the same time.

TVM Phase 2 – Continuous Localization u has fingerprint Vu’ Δu Δu u exploits prior Cu (Phase 1) to generate a new Cu’ ‘ ‘ u first computes a movement pattern Δu for the real movement between the last two locations For each AP in Cu find a neighbor that creates the closest pattern to Δu - u creates new Cu’ (neighboring APs are known from the received pRM!) u sends Cu’ to s s generates new pRM based on APs in Cu’ and send it to u – u is still hidden among k areas Note that no bloom filter is used in this Phase 2

When it Works TVM is sound against a passive attacker with the following characteristics: No low-level attacks (e.g., breach, man-in-the-middle) Can be prevented with secure channels. No modified responses by service The integrity of the responses provided by the service can be verified through some auditing process. No access to user identifier (e.g., IP, MAC, IMEI) Can be obfuscated through anonymizing proxies or changed by the user at any time. No background knowledge (statistics about buildings, user movements, etc.)

Outline Motivation Background Temporal Vector Map (TVM) Phase 1: Snapshot Localization Phase 2: Continuous Localization Experimentation Future Work

Built around our open source Airplace + Anyplace systems TVM Prototype System Built around our open source Airplace + Anyplace systems

Experimental Evaluation – Datasets Real Datasets: Realistic Datasets (for generating large-scale RMs): Name Collected Fingerprints APs Size CSUCY Typical building at CS, UCY using 3 Android 2,900 11 2.6MBs KIOSUCY Typical office environment at KIOS Research center, UCY using 3 Android devices 105 10 0.14MBs CrawDad Data from Crowdad online archive four areas in USA, Univ. of Dartmouth, building in Kirkland Washington DC, two buildings in Seattle 6,870 1293 17MBs Name Collected Size Campus Combines all real datasets once. 20MB Town Replicates real datasets in various areas around a town. 100MB City Replicates real datasets in various areas around a city. 1 GB Country Replicates real datasets in various areas around a country. 20 GB

Series 1 – Performance Evaluation - Snapshot CS – affected by dataset size – 100% privacy (pu=0) SS – minimum cost – but NO privacy TVM – 1.5 - 4 orders of magnitude better than CS due to localization on smaller pRM – privacy 1-pu TVM – energy varies slightly with dataset size due to larger rows in pRM (more APs)

Series 1 – Performance Evaluation - Continuous CS – more energy consumed since more computations have to take place on the device, but same message cost since the whole RM is transmitted once. SS – minimum cost – NO privacy – higher values than snapshot due to more requests TVM – energy 1.5 - 5 orders of magnitude better than CS TVM – after a number of requests ends up downloading all needed rows TVM – may end up downloading the whole RM in 300 consecutive localizations

Series 3 – Varying Privacy Preference pu higher privacy higher privacy Clear trade-off between performance (energy) and privacy guarantees

Outline Motivation Background Temporal Vector Map (TVM) Phase 1: Snapshot Localization Phase 2: Continuous Localization Experimentation Future Work

Future Work Carry out a field study Investigate server-side optimizations to boost performance Investigate the applicability to more generalized sensor measurements Datasets, Videos, Info @ http://tvm.cs.ucy.ac.cy/ Soon release on Github as part of Anyplace (https://github.com/dmsl/tvm)

Privacy-Preserving Indoor Localization on Smartphones Andreas Konstantinidis∗, Georgios Chatzimilioudis∗, Demetrios Zeinalipour-Yazti∗, Paschalis Mpeis‡, Nikos Pelekis§ and Yannis Theodoridis§ Thanks! Questions? ∗ ‡ § Slides accompanying papers: IEEE Transactions on Knowledge and Data Engineering (TKDE'15), IEEE Computer Society, Vol. 27, Iss. 11, pp. 3042-3055, Los Alamitos, CA, USA, 2015. + Poster at IEEE ICDE’16, Helsinki, Finland.