Anonymizing User Location and Profile Information for Privacy-aware Mobile Services Masanori Mano, Yoshiharu Ishikawa Nagoya University 11/2/2010 1.

Slides:



Advertisements
Similar presentations
June Data Practices in Minnesota. June Outline for this presentation Minnesota data practices laws Classification of government data Government.
Advertisements

PDAs/Smart Phones and Medical Records in Health Care Mary Z. Mays, PhD Associate Dean and Professor Innovation Institute for Health Professions.
Information Security of Embedded Systems : Design of Secure Systems Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer FIRST.
Summary Overview of Vireo Student Submission of ETDs
This link icon above automatically shows the looping slides John MacColl European Director, RLG Partnership 9 June 2010 The Role of Libraries in Data Curation.
Presentation at IEEE AWSITC, June 4, Energy-Efficient Communications via Network Coding Jos Weber Delft University of Technology The Netherlands.
Enterprise Social Networking Tool Comparison October 2010.
Open Days 2010 D. Gubbels Professionalization within the range of volunteer work New challenges for volunteering organizations - Ehrenamt professionalisieren!
January 12, 2010 Updated February 4, Starting in TEA will collect Teacher Class Assignments and Student Course Completion data at the.
January 12, 2010 Updated April 9, Starting in TEA will collect Teacher Class Assignments and Student Course Completion data at the classroom.
Shibboleth Development and Support Services SAML Protected Resources The theory and practice of granularity and management data Ed Dee EDINA.
5/20/2010Blesser-Salter © Aural Architecture Contributes to the Experience of Space and Place Dr. Barry Blesser Dr. Linda-Ruth Salter
NJJN JUNE Fulfilling the Promise of Juvenile Justice by Engaging Crime Victims & Survivors and Those Who Serve Them Presented by: ANNE SEYMOUR
HiRadMat Window Design report v4.0 1Michael MONTEIL - 29 April 2010.
® Microsoft Office 2010 Excel Tutorial 3: Working with Formulas and Functions.
HOW MEDIA CONSUMPTION HAS CHANGED SINCE 2000 News is pervasive, portable, personalized, participatory – and a social experience Lee Rainie Director – Pew.
1 Whats Up: P2P news recommender Anne-Marie Kermarrec Joint work with Antoine Boutet, Davide Frey (INRIA) and Rachid Guerraoui (EPFL) Gossple workshop.
An Analysis of the P2P Traffic Characteristics on File Transfers Between Prefectures and Between Autonomous Systems in the Winny Network Nov. 1,
LECTURE 21, NOVEMBER 16, 2010 ASTR 101, SECTION 3 INSTRUCTOR, JACK BRANDT 1ASTR 101-3, FALL 2010.
Operations Management
4/6/20100Office/Department || Understanding Academic Probation & Academic Rules and Regulations Presented by the Academic Advisement Center UNVH
August 4, The following PEIMS reporting changes have been made to the PEIMS Collection in order to collect the Classroom Link information.
Chapter 14 – Resource Planning
Chapter 9– Capacity Planning & Facility Location
District Choice State Testing (DCST) Training Workshop
Linked Lists in C and C++ CS-2303, C-Term Linked Lists in C and C++ CS-2303 System Programming Concepts (Slides include materials from The C Programming.
Operations Management R. Dan Reid & Nada R. Sanders
A useful testing technique and more…
Hash Tables and Constant Access Time CS-2303, C-Term Hash Tables and Constant Access Time CS-2303 System Programming Concepts (Slides include materials.
Tutorial 5: Working with Excel Tables, PivotTables, and PivotCharts
Preparing to Automate Data Management
Tutorial 1 Creating a Database
ACOT Intro/Copyright Succeeding in Business with Microsoft Excel 2010: Chapter1.
Location Based Services and Privacy Issues
Tutorial 3: Communicating Project Information
Muntaha Gharaibeh RN PhD Associate Professor and Dean of Nursing Director of WHOCC for Human Resource Development in Nursing Faculty of Nursing Jordan.
® Microsoft Office 2010 Excel Tutorial 1: Getting Started with Excel.
Overblik over fusionsdiagnostikker. Poul Kerff Michelsen.
LECTURE 18, NOVEMBER 2, 2010 ASTR 101, SECTION 2 INSTRUCTOR, JACK BRANDT 1ASTR 101-3, FALL 2010.
PERFORMANCE MANAGEMENT WORKSHOP FOR MANAGERS
© Wiley Chapter 1 - Introduction to Operations Management Operations Management by R. Dan Reid & Nada R. Sanders 4th Edition © Wiley 2010.
Tutorial on KMIP and FCEAP/GPSK
User Working Group Yannis Ioannidis University of Athens, Greece DL.org All Working Groups Meeting, Rome, May 2010.
The Digital Library Reference Model: Functionality Domain Carlo Meghini CNR-ISTI DL.org Autumn School, Athens, 3-8 October 2010.
2010 User Fee Study RESULTS ORIENTATION 2010 User Fee Study RESULTS ORIENTATION Presentation to the Coronado City Council by: Chad Wohlford, MPPA June.
Student Learning Outcome Assessment Plan Backward Design with the ending in mind SLOAC Thinking on Paper 11/29/2010 1PRIE Draft.
Collaboration Works! 10/20/20101 Planning Research Institutional Effectiveness.
Quick Training Guide New SpringerLink, August 2010.
CHAPTER 7. Chapter 7Mugan-Akman Current assets assets that are expected to be converted into cash within one year or within the operating cycle.
Chapter 13 – Aggregate Planning
[Networking Hardwares] [Maninder Kaur]
The Vocal Pedagogy Workshop 2011 Vocal Registers: Stephen F. Austin, M.M., Ph.D. Associate Professor of Voice University of North Texas 9/30/20101.
Importance of Modeling & Simulation Throughout In-service Lifecycle Phase Leigh Jarman Senior Reliability Engineer.
LECTURE 16, OCTOBER 26, 2010 ASTR 101, SECTION 3 INSTRUCTOR, JACK BRANDT 1ASTR 101-3, FALL 2010.
Tutorial 8 Sharing, Integrating, and Analyzing Data
Chapter 2 - Operations Strategy and Competitiveness
Erik Amerikaner Oak Park High School Oak Park, California
August VLSI Memory Design Shmuel Wimer Bar Ilan University, School of Engineering.
Quality Aware Privacy Protection for Location-based Services Zhen Xiao, Xiaofeng Meng Renmin University of China Jianliang Xu Hong Kong Baptist University.
Efficient Information Retrieval for Ranked Queries in Cost-Effective Cloud Environments Presenter: Qin Liu a,b Joint work with Chiu C. Tan b, Jie Wu b,
PrivacyGrid Visualization Balaji Palanisamy Saurabh Taneja.
Mohamed F. Mokbel University of Minnesota
1 Draft of a Matchmaking Service Chuang liu. 2 Matchmaking Service Matchmaking Service is a service to help service providers to advertising their service.
Systems and Internet Infrastructure Security (SIIS) LaboratoryPage Systems and Internet Infrastructure Security Network and Security Research Center Department.
Location Privacy Protection for Location-based Services CS587x Lecture Department of Computer Science Iowa State University.
Privacy Vulnerability of Published Anonymous Mobility Traces Chris Y. T. Ma, David K. Y. Yau, Nung Kwan Yip (Purdue University) Nageswara S. V. Rao (Oak.
Feeling-based location privacy protection for LBS
SocialMix: Supporting Privacy-aware Trusted Social Networking Services
Location Privacy.
Presentation transcript:

Anonymizing User Location and Profile Information for Privacy-aware Mobile Services Masanori Mano, Yoshiharu Ishikawa Nagoya University 11/2/2010 1

Outline 1.Background & Motivation 2.Related Work 3.System Framework 4.Matching Degree 5.Algorithm 6.Experimental Evaluation 7.Conclusions and Future work 11/2/20102

BACKGROUND & MOTIVATION 11/2/20103

Location-Based Services (LBSs) 11/2/20104 Where is the nearest café? Location- based Services Positioning Technologies Mobile Communication Database Technologies

Profile-Based LBSs LBSs typically utilize user locations and map information –Finding nearby restaurants –Presenting a map around the user –Computing the best route to the destination Use of user profiles (users property) can improve the quality of service –Property- and location-based services –Application areas Mobile shopping Mobile advertisements 11/2/20105

Example: Mobile Advertisements Provides local ads to mobile users –Example: Announcement of time-limited sales of nearby shops Use of user profiles –Properties: age, sex, address, marital status, etc. –Send selected ads to appropriate person Example: {sex: F, age: 28, has_kids: yes} –Cosmetics for women: good –Computers: maybe –Cosmetics for men: bad –Toys for kids: good 11/2/20106 Alice

Example: Mobile Advertisements 11/2/20107 Alice came to a shopping mall Alice Mobile Ads Provider Shopping Mall

Example: Mobile Advertisements 11/2/20108 Alice wanted ads Mobile Ads Provider Alice Shopping Mall

Example: Mobile Advertisements 11/2/20109 Anonymizer construct a cloaked region and send property Mobile Ads Provider Cloaked Region Request with (sex: F, age: 28, …)

Example: Mobile Advertisements 11/2/ Ads provider returns selected ads for Alice Mobile Ads Provider Alice

Example: Mobile Advertisements 11/2/ But, Alice is the only female within the region Cloaked Region Security Camera Mobile Ads Provider

Example: Mobile Advertisements 11/2/ Identify Adversary Get information If an adversary obtains information, he can detect target user Security Camera Mobile Ads Provider

Example 11/2/ In this anonymization, the adversary cant identify the user Cant Identify Security Camera Adversary Mobile Ads Provider

RELATED WORK 11/2/201014

Related Work (1) Techniques for location anonymity are classified into two extreme types [Ling Liu, 2009] –Anonymous location services: Only consider user locations –Identity-driven location services: Also consider user identities Our method lies between the two extremes, but considers user properties –Another dimension 11/2/ AnonymousPartial IdentityIdentity-driven Use of User PropertiesOur Approach No User Properties

Related Work (2) k-anonymity is the most popular approach in the proposals for location anonymity –Users location is indistinguishable from locations of at least other k -1 users Our approach is also based on the concept of k-anonymity –Extended by considering user properties 11/2/201016

Related Work (3) Various approaches to anonymous location services Casper [Mokbel+06]: The anonymizer utilize a grid-based pyramid data structure like quad-tree PrivacyGrid [Bamba+08]: Computes cloaked region by dynamic cell expansion XStar [Wang+09]: Intended for the problem for automobiles on road networks 11/2/201017

SYSTEM FRAMEWORK 11/2/201018

System Architecture (1) There is a service called Matchmaker between users and ads providers Roles of Matchmaker –Maintains user & ad profiles –Matchmaking: Recommend good ads for a given ads request –Anonymization of locations and user properties 11/2/ User Ads Provider Ad Matchmaker

System Architecture (2) Matchmaker is a trusted third-party server Given an ad request, Matchmaker sends anonymized request to ads providers –Use of the users profile/location and ad profiles –Even if some providers are untrusted, the users privacy is protected 11/2/ User Ads provider Matchmaker raw data trusted route anonymized data

User Profile Represents the users properties – k : minimum population A cloaked region should contain at least k users – l : minimum length Minimum length of each side of a cloaked region (square) – s : distance threshold The user wants ads within this distance –Additional attributes (e.g., age and sex) Value ranges are specified ID kls agesex u M-M u F-* k users l s 11/2/201021

Advertisement Profile Represents properties of each advertisement An advertisement that satisfies the following conditions should be sent –The ad area overlaps with the users requesting area –Other properties (age and sex) match (overlap) the users properties IDad areaagesex a1(100, 200, 400, 500)[20, 29]M a2(500, 500, 700, 700) [60, ] * Ad1 Ad2 s 11/2/201022

MATCHING DEGREE 11/2/201023

Motivation: Bad Anonymization The cloaked region contains aged/young and male/female users –The properties of the region is vague The ads provider has a cosmetic ad for female The ads provider may have a question: Is it valuable to send the ad? 11/2/ Ads provider ? Age: young to aged Sex: * (all)

Motivating Example: Good Anonymization Good anonymization would be that the users in the cloaked region have similar properties to the target user –Matching degree is introduced as a similarity 11/2/ Bad AnonymizationGood Anonymization different sexdifferent agesimilar sex and age

Matching Degree A matching degree is computed as the overlapped area of attribute values –Range: [0, 1] –Treated as if it were a probability value 11/2/ Attribute Values of Target User Overlapped Area Attribute Values of Other User Matching Degree for Spatial Attributes Matching Degree for Interval Attributes

Matching Degree 11/2/ nameage Alice21-30 Bob21-25 Dave61-80 Target user is Bob Compared user is Alice match = 1.0 Target user is Alice Compared user is Bob match = 0.5 Target user is Dave Compared user is Alice match = 0.0 Attribute of target user

ANONYMIZATION ALGORITHM 11/2/201028

Anonymity Conditions The cloaked region contains the target user The region contains at least k – 1 other users The length of each side of the region is longer than l The matching degrees between the target user and k - 1 users are more than a certain threshold value 11/2/ target user l k-1 users

Anonymization Process 1.Consider a rectangular region centered target user 2.Randomly select one user as a seed from the users within the region 3.Compute a rectangle around the seed 4.If the rectangle contains at least k users with good matching degrees, anonymization is completed Q A B C D E F 11/2/201030

Anonymization Example 11/2/ Alice Alice required ad –k = 3 –Threshold for matching degree = 0.5 Joe Kent Dave Mary Mike

Anonymization Example 11/2/ Alice Alice is young woman –match = 1.0 Mary is also young woman –match = 1.0 Kent is young man –match = 0.5 Joe is aged man –match = 0.0 Dave and Mike are middle age men – match = Joe Dave Kent Mary Mike

Anonymization Example 11/2/ Alice A region centered Alice contains Kent and Mike We assume that Kent is selected as the seed user 1.0 Joe Dave Kent Mary Mike

Anonymization Example 11/2/ Alice Compute region around Kent Check whether anonymization is appropriate 1.0 Joe Dave Kent Mary Mike

Anonymization Example 11/2/ Alice Cloaked region contains three users with good matching degrees We cant detect target user –Alice, Kent and Mary are young person It is good anonymization target user is young person 1.0 Joe Dave Kent Mary Mike

EXPERIMENTAL EVALUATION 11/2/201036

Experimental Evaluation CPU 2.8GHz RAM 512MB Linux Evaluation on synthetic data Experimental Settings 11/2/ PropertyValue Target area[(0.0, 0.0), (100.0, 100.0)] No. User1000 k[5, 10] l[2.0, 10.0] s[0.1, 5.0] No. of Profile Attributes 2 Attribute Value[0, 1], [0, 2], [0, 3], [0, 4], [1, 2], [1, 3], [1, 4], [2, 3], [2, 4], [3, 4] (randomly)

Threshold Values and Success Rates Matchmaker specifies a threshold value of matching degree –Find out an appropriate threshold Success rate is sensitive to population –Need to change threshold flexibly 11/2/ Containing more than or equal to k users with good matching degree (i.e. threshold) is successful anonymization

Computation Time We compare computation times of two approaches –Compute matching degrees –Does not compute matching degrees Only consider the number of users Computing of matching degrees takes more than twice times –Well try to improve algorithms of computing matching degrees 11/2/201039

CONCLUSIONS & FUTURE WORK 11/2/201040

Conclusions and Future work Conclusions –Proposed an approach to anonymization for LBSs –Utilizing user profiles to specify users properties and anonymization preferences –Property-aware anonymization using matching degrees Future work –More experimental evaluation –Improving algorithm 11/2/201041

Thank you 11/2/201042