Preserving Location Privacy Uichin Lee KAIST KSE Slides based on by Ling Liuhttp://www.vldb.org/conf/2007/papers/tutorials/p1429-liu.pdf.

Slides:



Advertisements
Similar presentations
On the Optimal Placement of Mix Zones Julien Freudiger, Reza Shokri and Jean-Pierre Hubaux PETS, 2009.
Advertisements

Location Based Services and Privacy Issues
University of Minnesota Mohamed F. Mokbel1ICDM 2008 Privacy-Preserving Location Services Mohamed F. Mokbel Department of Computer Science.
1 (ECE 256: Wireless Networking and Mobile Computing) Location Privacy in Mobile Computing Topics: Pseudonymns, CliqueCloak, Path Confusion, CacheCloak.
Quality Aware Privacy Protection for Location-based Services Zhen Xiao, Xiaofeng Meng Renmin University of China Jianliang Xu Hong Kong Baptist University.
Ruckus Smart Wi-Fi for Retail
Virtual Trip Lines for Distributed Privacy-Preserving Traffic Monitoring Baik Hoh, Marco Gruteser WINLAB / ECE Dept., Rutgers University Ryan Herring,
1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.
Quantifying Location Privacy: The Case of Sporadic Location Exposure Reza Shokri George Theodorakopoulos George Danezis Jean-Pierre Hubaux Jean-Yves Le.
PrivacyGrid Visualization Balaji Palanisamy Saurabh Taneja.
Mohamed F. Mokbel University of Minnesota
Software Structure CHAPTER 4 The overall structure of the online learning community system : 1.user database 2.content database 3.user/content map 4.user/user.
Location Privacy in Casper: A Tale of two Systems
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
Privacy Preserving Publication of Moving Object Data Joey Lei CS295 Francesco Bonchi Yahoo! Research Avinguda Diagonal 177, Barcelona, Spain 6/10/20151CS295.
On Reducing Communication Cost for Distributed Query Monitoring Systems. Fuyu Liu, Kien A. Hua, Fei Xie MDM 2008 Alex Papadimitriou.
CSCE 790: Computer Network Security Chin-Tser Huang University of South Carolina.
© nCode 2000 Title of Presentation goes here - go to Master Slide to edit - Slide 1 Reliable Communication for Highly Mobile Agents ECE 7995: Term Paper.
Chapter 5. Database Aspects of Location-Based Services Lee Myong Soo Mobile Data Engineering Lab. Dept. of.
Malicious parties may employ (a) structure-based or (b) label-based attacks to re-identify users and thus learn sensitive information about their rating.
Freenet A Distributed Anonymous Information Storage and Retrieval System I Clarke O Sandberg I Clarke O Sandberg B WileyT W Hong.
Privacy and Networks CPS 96 Eduardo Cuervo Amre Shakimov.
Admission Control and Dynamic Adaptation for a Proportional-Delay DiffServ-Enabled Web Server Yu Cai.
A Customizable k-Anonymity Model for Protecting Location Privacy Written by: B. Gedik, L.Liu Presented by: Tal Shoseyov.
1 Preserving Privacy in GPS Traces via Uncertainty-Aware Path Cloaking by: Baik Hoh, Marco Gruteser, Hui Xiong, Ansaf Alrabady ACM CCS '07 Presentation:
Baik Hoh Marco Gruteser Hui Xiong Ansaf Alrabady All images are credited to “ACM” Hoh et al (2007), pp
On the Anonymity of Anonymity Systems Andrei Serjantov (anonymous)
Location Privacy Location privacy in mobile systems: A personalized Anonymization Model Burga Gedik, Ling Liu.
Privacy in P2P based Data Sharing Muhammad Nazmus Sakib CSCE 824 April 17, 2013.
The Internet in Education Objectives Introduction Overview –The World Wide Web –Web Page v. Web Site v. Portal Unique and Compelling Characteristics Navigation.
Overview of Privacy Preserving Techniques.  This is a high-level summary of the state-of-the-art privacy preserving techniques and research areas  Focus.
Quantifying Location Privacy Reza Shokri George Theodorakopoulos Jean-Yves Le Boudec Jean-Pierre Hubaux May 2011.
Privacy Preserving Data Mining on Moving Object Trajectories Győző Gidófalvi Geomatic ApS Center for Geoinformatik Xuegang Harry Huang Torben Bach Pedersen.
1 Realtime Location Privacy Via Mobility Prediction Creating Confusion at Crossroads Joseph Meyerowitz Romit Roy Choudhury Undergraduate Senior,Asst. Professor.
Mobile Technologies Introduction Basics of GSM Value Added Services SMS Short Codes Asterisk * LBS.
2: Application Layer1 Chapter 2 outline r 2.1 Principles of app layer protocols r 2.2 Web and HTTP r 2.3 FTP r 2.4 Electronic Mail r 2.5 DNS r 2.6 Socket.
Location Privacy CompSci Instructor: Ashwin Machanavajjhala Some slides are from a tutorial by Mohamed Mokbel (ICDM 2008) Lecture 19: Fall.
Anonymity on the Internet Presented by Randy Unger.
Hiding in the Mobile Crowd: Location Privacy through Collaboration.
On the Age of Pseudonyms in Mobile Ad Hoc Networks Julien Freudiger, Mohammad Hossein Manshaei, Jean-Yves Le Boudec and Jean-Pierre Hubaux Infocom 2010.
ACOMP 2011 A Novel Framework for LBS Privacy Preservation in Dynamic Context Environment.
1 Hiding Stars with Fireworks: Location Privacy through Camouflage Joseph Meyerowitz Romit Roy Choudhury ECE and PhysicsDept. of ECE and CS.
Preserving Location Privacy in Wireless LANs Jiang, Wang and Hu MobiSys 2007 Presenter: Bibudh Lahiri.
Alastair R. Beresford Frank Stajano University of Cambridge Presented by Arcadiy Kantor — CS4440 September 13, 2007.
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
Preserving Privacy in GPS Traces via Uncertainty- Aware Path Cloaking Baik Hoh, Marco Gruteser, Hui Xiong, Ansaf Alrabady Presented by Joseph T. Meyerowitz.
Virtual Trip Lines for Distributed Privacy- Preserving Traffic Monitoring Baik Hoh et al. MobiSys08 Slides based on Dr. Hoh’s MobiSys presentation.
Lecture 13: Anonymity on the Web Modified from Levente Buttyan, Michael K. Reiter and Aviel D. Rubin.
Privacy Preserving Payments in Credit Networks By: Moreno-Sanchez et al from Saarland University Presented By: Cody Watson Some Slides Borrowed From NDSS’15.
A Hybrid Technique for Private Location-Based Queries with Database Protection Gabriel Ghinita 1 Panos Kalnis 2 Murat Kantarcioglu 3 Elisa Bertino 1 1.
Privacy-Preserving Location- Dependent Query Processing Mikhail J. Atallah and Keith B. Frikken Purdue University.
Preserving Privacy GPS Traces via Uncertainty-Aware Path Cloaking Baik Hoh, Marco Gruteser, Hui Xiong, Ansaf Alrabady Presenter:Yao Lu ECE 256, Spring.
Location Privacy Protection for Location-based Services CS587x Lecture Department of Computer Science Iowa State University.
H IDING S TARS WITH F IREWORKS : L OCATION P RIVACY THROUGH C AMOUFLAGE H IDING S TARS WITH F IREWORKS : L OCATION P RIVACY THROUGH C AMOUFLAGE J OSEPH.
Secure Data Outsourcing
Unraveling an old cloak: k-anonymity for location privacy
P2P Networking: Freenet Adriane Lau November 9, 2004 MIE456F.
Improving the WWW: Caching or Multicast? Pablo RodriguezErnst W. BiersackKeith W. Ross Institut EURECOM 2229, route des Cretes. BP , Sophia Antipolis.
MarketEye™ Interactivity and Local Based Services via Text Messages (SMS) A Business Opportunity for Service Provider.
1 Anonymity. 2 Overview  What is anonymity?  Why should anyone care about anonymity?  Relationship with security and in particular identification 
BUILD SECURE PRODUCTS AND SERVICES
VANET.
Anonymous Communication
Mining Spatio-Temporal Reachable Regions over Massive Trajectory Data
Location Privacy.
Location Privacy.
Anonymous Communication
Secure WNM Requirements
A Unified Framework for Location Privacy
Anonymous Communication
Presentation transcript:

Preserving Location Privacy Uichin Lee KAIST KSE Slides based on by Ling Liuhttp:// by Romit Choudhury

Location Based Service (LBS): Examples Location based emergency services & traffic monitoring – How many cars on the highway 85 north? – What is the estimated time of travel to my destination? – Give me the location of 5 nearest Toyota maintenance stores? Location based advertisement & entertainment – Send E-coupons to all customers within five miles of my store – Where are the nearest movie theater to my current location? Location finder – Where are the gas stations within five miles of my location? – Where is nearest movie theater?

Location privacy The claim/right of individuals, groups and institutions to determine for themselves, when, how and to what extent location information about them is communicated to others (similar to Westins def) Location privacy also refers to the ability to prevent other parties from learning ones current or past location.

Privacy threats through LBS Communication privacy threats – Sender anonymity? Location inference threats – Precise location tracking Successive position updates can be linked together, even if identifiers are removed from location updates – Observation identification If external observation is available, it can be used to link a position update to an identity (e.g., Bluetooth scanning) – Restricted space identification A known location owned by identity relationship can link an update to an identity (e.g., home)

Location privacy architecture Centralized trusted third party location anonymization model – A trusted third party anonymization proxy server is served for both location updates and location anonymization. – Capable of supporting customizable and personalized location k- anonymization Client-based non-cooperative location anonymization model – Mobile clients maintain their location privacy based on their knowledge – Location cloaking without location k-anonymity support Decentralized corporative mobility group model – Group of mobile clients collaborate with one another to provide location privacy of a single user without involving a centralized trusted authority. Distributed Hybrid Architecture with limited cooperation

Assume Trusted Privacy Provider (TPP) –Reveal location to TPP –TPP exposes anonymized location to Loc. App (or LBS) Centralized trusted third party arch. Privacy Provider Loc. App1 Loc. App2 Loc. App3 Loc. App4

How to preserve location privacy? Pseudonymns Spatio-temporal cloaking: – K-anonymity + Mix zones Location perturbation (adding noise) –PoolView (sensys08)

Pseudonymns Just Call Yourself ``Freddy [Gruteser04] –Effective only when infrequent location exposure –Else, spatio-temporal patterns enough to deanonymize … think breadcrumbs Romits Office John LeslieJack Susan Alex Slides from:

K-anonymity K-anonymity [Gedic05] –Convert location to a space-time bounding box –Ensure K users in the box –Location Apps reply to boxed region Issues –Poor quality of location –Degrades in sparse regions –Not real-time (e.g., wait until k is reached as in CliqueCloak) You Bounding Box K=4

Mix zone: confuse via mixing Path intersections is an opportunity for privacy –If users intersect in space-time, cannot say who is who later

Mix zone: confuse via mixing Path intersections is an opportunity for privacy –If users intersect in space-time, cannot say who is who later Unfortunately, users may not intersect in both space and time Unfortunately, users may not intersect in both space and time Hospital Airport ? ?

Mix zone/time: hiding until mixed Partially hide locations until users mixed [Hoh et al., CCS07] –Expose after a delay Hospital Airport

Mix zone/time: hiding until mixed Partially hide locations until users mixed [Hoh et al., CCS07] –Expose after a delay But delays unacceptable to real-time apps Hospital Airport

Mix zone/time+caching: predict & cache Predict until paths intersect [Meyerowitz et al., Mobicom09] Hospital Airport Predict

Mix zone/time+caching: predict & cache Predict until paths intersect [Meyerowitz et al., Mobicom09] –Expose predicted intersection to application Hospital Airport Cache the information on each predicted location Predict

Summary: R-U Confidentiality Map 16 No Data Data Utility U Disclosure Risk R Original Data Maximum Tolerable Risk Released Data Slide from: George Duncan 2001