A Unified Framework for Location Privacy

Slides:



Advertisements
Similar presentations
ACHIEVING NETWORK LEVEL PRIVACY IN WIRELESS SENSOR NETWORKS.
Advertisements

On the Optimal Placement of Mix Zones Julien Freudiger, Reza Shokri and Jean-Pierre Hubaux PETS, 2009.
Trust Management of Services in Cloud Environments:
Location Based Services and Privacy Issues
Preserving Location Privacy Uichin Lee KAIST KSE Slides based on by Ling Liuhttp://
Protecting Location Privacy: Optimal Strategy against Localization Attacks Reza Shokri, George Theodorakopoulos, Carmela Troncoso, Jean-Pierre Hubaux,
An Architecture for Privacy-Sensitive Ubiquitous Computing Jason I. Hong Group for User Interface Research Computer Science Division University of California.
Self-Organized Anonymous Authentication in Mobile Ad Hoc Networks Julien Freudiger, Maxim Raya and Jean-Pierre Hubaux SECURECOMM, 2009.
Virtual Trip Lines for Distributed Privacy-Preserving Traffic Monitoring Baik Hoh, Marco Gruteser WINLAB / ECE Dept., Rutgers University Ryan Herring,
Location Cheating: A Security Challenge to Location- based Social Network Services Wenbo He 1, Xue Liu 2, Mai Ren 1 1 University of Nebraska-Lincoln 2.
Application of Bayesian Network in Computer Networks Raza H. Abedi.
1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.
Quantifying Location Privacy: The Case of Sporadic Location Exposure Reza Shokri George Theodorakopoulos George Danezis Jean-Pierre Hubaux Jean-Yves Le.
Constructing Popular Routes from Uncertain Trajectories Ling-Yin Wei 1, Yu Zheng 2, Wen-Chih Peng 1 1 National Chiao Tung University, Taiwan 2 Microsoft.
1 A Distortion-based Metric for Location Privacy Workshop on Privacy in the Electronic Society (WPES), Chicago, IL, USA - November 9, 2009 Reza Shokri.
CENTRE Cellular Network’s Positioning Data Generator Fosca GiannottiKDD-Lab Andrea MazzoniKKD-Lab Puntoni SimoneKDD-Lab Chiara RensoKDD-Lab.
Privacy Preserving Publication of Moving Object Data Joey Lei CS295 Francesco Bonchi Yahoo! Research Avinguda Diagonal 177, Barcelona, Spain 6/10/20151CS295.
Reference: [1] TeamSpace paper
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
1 Preserving Privacy in Collaborative Filtering through Distributed Aggregation of Offline Profiles The 3rd ACM Conference on Recommender Systems, New.
Location Systems for Ubiquitous Computing Jeffrey Hightower and Gaetano Borriello.
Impact of Different Mobility Models on Connectivity Probability of a Wireless Ad Hoc Network Tatiana K. Madsen, Frank H.P. Fitzek, Ramjee Prasad [tatiana.
MOBIGUIDE MOBIGUIDE CS 8803 – ADVANCED INTERNET APPLICATION DEVELOPMENT Project Presentation By: Ashwin Pallikarana Tirumala Lalanthika Vasudevan Sneha.
Privacy of Location Information in Vehicular Ad Hoc Networks Walaa El-Din M. Moustafa.
Structure based Data De-anonymization of Social Networks and Mobility Traces Shouling Ji, Weiqing Li, and Raheem Beyah Georgia Institute of Technology.
1 Preserving Privacy in GPS Traces via Uncertainty-Aware Path Cloaking by: Baik Hoh, Marco Gruteser, Hui Xiong, Ansaf Alrabady ACM CCS '07 Presentation:
Wang, Z., et al. Presented by: Kayla Henneman October 27, 2014 WHO IS HERE: LOCATION AWARE FACE RECOGNITION.
On the Anonymity of Anonymity Systems Andrei Serjantov (anonymous)
MOBIGUIDE MOBIGUIDE CS 8803 – ADVANCED INTERNET APPLICATION DEVELOPMENT Project Presentation By: Ashwin Pallikarana Tirumala ( ) Lalanthika Vasudevan( )
Optimizing Mixing in Pervasive Networks: A Graph-Theoretic Perspective
Mobile Networks - Module H2 Privacy in Mobile Networks Privacy notions and metrics Location privacy Privacy preserving routing in ad hoc networks Slides.
Privacy Issues in Vehicular Ad Hoc Networks.
UNIVERSITY of NOTRE DAME COLLEGE of ENGINEERING Preserving Location Privacy on the Release of Large-scale Mobility Data Xueheng Hu, Aaron D. Striegel Department.
Quantifying Location Privacy Reza Shokri George Theodorakopoulos Jean-Yves Le Boudec Jean-Pierre Hubaux May 2011.
Mirco Nanni, Roberto Trasarti, Giulio Rossetti, Dino Pedreschi Efficient distributed computation of human mobility aggregates through user mobility profiles.
SixthSense RFID based Enterprise Intelligence Lenin Ravindranath, Venkat Padmanabhan Interns: Piyush Agrawal (IITK), SriKrishna (BITS Pilani)
CENTRE CEllular Network Trajectories Reconstruction Environment F. Giannotti, A. Mazzoni, S. Puntoni, C. Renso KDDLab, Pisa.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Survey on Privacy-Related Technologies Presented by Richard Lin Zhou.
Hybrid Cellular-Ad hoc Data Network Shuai Zhang, Ziwen Zhang, Jikai Yin.
On the Age of Pseudonyms in Mobile Ad Hoc Networks Julien Freudiger, Mohammad Hossein Manshaei, Jean-Yves Le Boudec and Jean-Pierre Hubaux Infocom 2010.
Preserving Location Privacy in Wireless LANs Jiang, Wang and Hu MobiSys 2007 Presenter: Bibudh Lahiri.
A Mobile Terminal Based Trajectory Preserving Strategy for Continuous Querying LBS Users Yunxia Feng, Peng Liu, Jianhui Zhang May , 2012 Hangzhou,
How Others Compromise Your Location Privacy: The Case of Shared Public IPs at Hotspots N. Vratonjic, K. Huguenin, V. Bindschaedler, and J.-P. Hubaux PETS.
Preserving Privacy in GPS Traces via Uncertainty- Aware Path Cloaking Baik Hoh, Marco Gruteser, Hui Xiong, Ansaf Alrabady Presented by Joseph T. Meyerowitz.
Human Tracking System Using DFP in Wireless Environment 3 rd - Review Batch-09 Project Guide Project Members Mrs.G.Sharmila V.Karunya ( ) AP/CSE.
Virtual Trip Lines for Distributed Privacy- Preserving Traffic Monitoring Baik Hoh et al. MobiSys08 Slides based on Dr. Hoh’s MobiSys presentation.
1.Research Motivation 2.Existing Techniques 3.Proposed Technique 4.Limitations 5.Conclusion.
Performance of Adaptive Beam Nulling in Multihop Ad Hoc Networks Under Jamming Suman Bhunia, Vahid Behzadan, Paulo Alexandre Regis, Shamik Sengupta.
Privacy Protection in Social Networks Instructor: Assoc. Prof. Dr. DANG Tran Khanh Present : Bui Tien Duc Lam Van Dai Nguyen Viet Dang.
Contents Introduction What are Location-based services Working of Location-based services Location Tracking Technologies Power profiling a mobile phone.
A Protocol for Tracking Mobile Targets using Sensor Networks H. Yang and B. Sikdar Department of Electrical, Computer and Systems Engineering Rensselaer.
Optimizing the Location Obfuscation in Location-Based Mobile Systems Iris Safaka Professor: Jean-Pierre Hubaux Tutor: Berker Agir Semester Project Security.
VANETs. Agenda System Model → What is VANETs? → Why VANETs? Threats Proposed Protocol → AOSA → SPCP → PARROTS Evaluation → Entropy → Anonymity Set → Tracking.
Track Me If You Can: On the Effectiveness of Context-based Identifier Changes in Deployed Mobile Networks. Authors: Laurent Bindschaedler, Murtuza Jadliwala,
Presented by Edith Ngai MPhil Term 3 Presentation
Geographic Information Systems
Presented by: Saurav Kumar Bengani
Quantifying Location Privacy
Quantifying Location Privacy
Presented By Siddartha Ailuri Graduate Student, EECS 04/07/17
Mobile Commerce and the Internet of Things
Location Privacy.
Probabilistic Data Management
Location Privacy.
“Location Privacy Protection for Smartphone Users”
N-ID Definition Proposal
Related Work in Camera Network Tracking
ELEC-E Smart Grid Smart Meters and Security Issues
Presentation transcript:

A Unified Framework for Location Privacy Shokri, R., Freudiger, J., & Hubaux, J. P. (2010). 3rd Hot Topics in Privacy Enhancing Technologies (HotPETs), 203-214. Paper Presentation by George Corser Oakland University , June 6, 2014

Abstract Source: Shokri, 2010, page 1 Link to paper on Google Scholar

Outline of Paper Introduction Mobile Networks Location Privacy Preserving Mechanisms Threat Model* Location Privacy Measurement Application Scenario: LBS Related Work Conclusion * Defines structure of a threat model, not a particular threat model LBS: Location Based Service

1. Introduction: Definition Source: Shokri, 2010, page 1

1. Introduction: Problem Source: Shokri, 2010, page 1

1. Introduction: Solution Source: Shokri, 2010, page 2

2. Mobile Networks: App. Categories Set of mobile users with wireless devices Connections ad hoc or via cellular, wifi, ... Applications like LBS, mobile social network, recommender systems, friend finder, ... Automatic Manual Continuous People Sensing LBS (w/FPL*) Discrete Elec. Ticketing LBS (typical) Source: Shokri, 2010, pages 2-3 LBS: Location Based Service, FPL: Frequent Precise Location

2. Mobile Networks: Events Users ( ): set of mobile network members Each has real identity ( ) and pseudonym ( ) Time and Space Time instance (t): a natural number in time period Location instance ( ): a coordinate on a grid of The Spatiotemporal State of Users (Events) Event: a 3-tuple < identity, time, location > Actual trajectory, all events of user u ( ): Source: Shokri, 2010, pages 3-5

3. Privacy Preserving Mechanisms Distributed (user-side): Adding noise to GPS coordinates Centralized (server-side): Cloaking proxy server Hybrid Source: Shokri, 2010, pages 5-7 GPS: Global Positioning System

4. Threat Model Source: Shokri, 2010, pages 7-11

5. Location Privacy Measurement Microscopic: within a time interval Uncertainty: size of anonymity set of positions Macroscopic: throughout trajectory Uncertainty: size of anonymity set of trajectories Error-based metrics Clustering-error metrics (degree of path confusion) Probability of error metrics (degree of accuracy in using endpoint map deanonymization) Distortion-based metrics (geographical precision) Consider user location privacy (probability of error) versus system location privacy (uncertainty/entropy) Source: Shokri, 2010, pages 11-14 Map deanonymization: Linking identities with endpoint home/work locations

6. Application Scenario: LBS Application is manual and discrete Entity: User Anonymization when connect with pseudonym Hiding when not connected to LBS Entity: Application Obfuscation when GPS not precise Entity: Privacy Tool Dummification when using group pseudonym If FPL, application may be manual and continuous Source: Shokri, 2010, pages 14 LBS: Location Based Service, FPL: Frequent Precise Location Highly effective in centralized architecture

6. App. Scenario: LBS: Threat Model Means Access Server side application Knowledge Map deanonymization Actions Type Passive Spatial Scope Global Temporal Scope Long-term Goals Disclosure Presence Target Individual Attack Identification Tracking Source: Shokri, 2010, pages 14-15

6. App. Scenario: LBS: Open Problems Source: Shokri, 2010, pages 15

7. Related Work Hong/Landay [43]: toolkit (Confab) Duckham/Kulik [26]: obfuscation mechanisms Bettini et al [11]: microscopic location privacy Decker [24]: LBS location privacy problems Blumberg/Eckersley [13]: emerging threats Krumm [52]: literature review Shokri [66]: macroscopic location privacy Source: Shokri, 2010, pages 15-16

8. Conclusion Source: Shokri, 2010, pages 16