Privacy of Location Trajectory

Slides:



Advertisements
Similar presentations
Numbers Treasure Hunt Following each question, click on the answer. If correct, the next page will load with a graphic first – these can be used to check.
Advertisements

1 A B C
Scenario: EOT/EOT-R/COT Resident admitted March 10th Admitted for PT and OT following knee replacement for patient with CHF, COPD, shortness of breath.
AGVISE Laboratories %Zone or Grid Samples – Northwood laboratory
Variations of the Turing Machine
Angstrom Care 培苗社 Quadratic Equation II
AP STUDY SESSION 2.
1
Select from the most commonly used minutes below.
Copyright © 2003 Pearson Education, Inc. Slide 1 Computer Systems Organization & Architecture Chapters 8-12 John D. Carpinelli.
Sequential Logic Design
Copyright © 2013 Elsevier Inc. All rights reserved.
STATISTICS Joint and Conditional Distributions
STATISTICS HYPOTHESES TEST (I)
STATISTICS INTERVAL ESTIMATION Professor Ke-Sheng Cheng Department of Bioenvironmental Systems Engineering National Taiwan University.
STATISTICS POINT ESTIMATION Professor Ke-Sheng Cheng Department of Bioenvironmental Systems Engineering National Taiwan University.
David Burdett May 11, 2004 Package Binding for WS CDL.
Whiteboardmaths.com © 2004 All rights reserved
Properties of Real Numbers CommutativeAssociativeDistributive Identity + × Inverse + ×
Local Customization Chapter 2. Local Customization 2-2 Objectives Customization Considerations Types of Data Elements Location for Locally Defined Data.
CALENDAR.
1 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt BlendsDigraphsShort.
1 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt RhymesMapsMathInsects.
1 Click here to End Presentation Software: Installation and Updates Internet Download CD release NACIS Updates.
1 00/XXXX © Crown copyright Carol Roadnight, Peter Clark Met Office, JCMM Halliwell Representing convection in convective scale NWP models : An idealised.
Media-Monitoring Final Report April - May 2010 News.
Biostatistics Unit 5 Samples Needs to be completed. 12/24/13.
1 Combination Symbols A supplement to Greenleafs QR Text Compiled by Samuel Marateck ©2009.
Break Time Remaining 10:00.
This module: Telling the time
The basics for simulations
Turing Machines.
Table 12.1: Cash Flows to a Cash and Carry Trading Strategy.
PP Test Review Sections 6-1 to 6-6
The Fourier Transform I
Outline Minimum Spanning Tree Maximal Flow Algorithm LP formulation 1.
1 The Royal Doulton Company The Royal Doulton Company is an English company producing tableware and collectables, dating to Operating originally.
Operating Systems Operating Systems - Winter 2012 Chapter 4 – Memory Management Vrije Universiteit Amsterdam.
Exarte Bezoek aan de Mediacampus Bachelor in de grafische en digitale media April 2014.
Copyright © 2012, Elsevier Inc. All rights Reserved. 1 Chapter 7 Modeling Structure with Blocks.
GIS Lecture 8 Spatial Data Processing.
1 RA III - Regional Training Seminar on CLIMAT&CLIMAT TEMP Reporting Buenos Aires, Argentina, 25 – 27 October 2006 Status of observing programmes in RA.
1..
Adding Up In Chunks.
MaK_Full ahead loaded 1 Alarm Page Directory (F11)
1 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt Synthetic.
Artificial Intelligence
: 3 00.
5 minutes.
1 hi at no doifpi me be go we of at be do go hi if me no of pi we Inorder Traversal Inorder traversal. n Visit the left subtree. n Visit the node. n Visit.
Speak Up for Safety Dr. Susan Strauss Harassment & Bullying Consultant November 9, 2012.
1 Titre de la diapositive SDMO Industries – Training Département MICS KERYS 09- MICS KERYS – WEBSITE.
Essential Cell Biology
Converting a Fraction to %
Numerical Analysis 1 EE, NCKU Tien-Hao Chang (Darby Chang)
Clock will move after 1 minute
famous photographer Ara Guler famous photographer ARA GULER.
PSSA Preparation.
Immunobiology: The Immune System in Health & Disease Sixth Edition
Physics for Scientists & Engineers, 3rd Edition
Energy Generation in Mitochondria and Chlorplasts
Select a time to count down from the clock above
Murach’s OS/390 and z/OS JCLChapter 16, Slide 1 © 2002, Mike Murach & Associates, Inc.
Copyright Tim Morris/St Stephen's School
1.step PMIT start + initial project data input Concept Concept.
9. Two Functions of Two Random Variables
1 Dr. Scott Schaefer Least Squares Curves, Rational Representations, Splines and Continuity.
FIGURE 3-1 Basic parts of a computer. Dale R. Patrick Electricity and Electronics: A Survey, 5e Copyright ©2002 by Pearson Education, Inc. Upper Saddle.
Presentation transcript:

Privacy of Location Trajectory Chi-Yin Chow Department of Computer Science City University of Hong Kong Mohamed F. Mokbel Department of Computer Science and Engineering University of Minnesota

Outline Introduction Protecting Trajectory Privacy in Location-based Services Protecting Privacy in Trajectory Publication Future Research Directions

Data Privacy Example: Hospitals want to publish medical records for public health research Contain personal sensitive information Natural way: remove known identifiers (de-identify)

Is De-identification Enough?

Is De-identification Enough?

Data Privacy-Preserving Techniques k-anonymity (Sweeney, IJUFKS’02) Indistinguishable among at least k records l-diversity (Machanavajjhala et al., TKDD’07) At least l values for sensitive attributes t-closeness (Li et al., TKDE’10) Distribution of sensitive attributes (in equivalence class vs in entire data set)

Location Privacy Location-Based Services (LBS) Untrustable LBS Service Provider – Location Privacy Leakage

Location Privacy-Preserving Techniques False Location Users generate fake locations Space Transformation Transform into another space Spatial Cloaking Blur user’s location into cloaked region

More Challenging: Trajectory Privacy The hospital example Suppose the trajectories of patients should be published Trajectory T: De-identified Suppose adversary know a patient visited (1, 5) and (8, 10) at timestamps 2 and 5, respectively Sensitive Attribute Powerful quasi-identifiers! He has a disease of HIV!

Two Kinds of Trajectory Real-time Trajectory -- Continuous LBS “Continuously inform me the traffic condition within 1 mile from my vehicle” “Let me know my friends’ locations if they are within 2km from my location” Off-line Trajectory -- Historical Trajectory Publish trajectory data for public research Answer spatio-temporal range queries

Continuous Location-based Services vs. Trajectory Publication Scalability Requirement Continuous LBS: Real-time Historical Trajectory: Off-line Applicability of Global Optimization Continuous LBS: Dynamic, Uncertain Historical Trajectory: Static

Outline Introduction Protecting Trajectory Privacy in Location-based Services Protecting Privacy in Trajectory Publication Future Research Directions

Protecting Trajectory Privacy in LBS Category-I LBS: Require consistent user identities. “Let me know my friends’ locations if they are within 2km from my location” Category-II LBS: Do not require consistent user identities. “Send e-coupons to users within 1km from my coffee shop”

Protecting Trajectory Privacy in LBS Spatial cloaking Mix-zones Vehicular mix-zones Path confusion Path confusion with mobility prediction and data caching Euler histogram-based on short IDs Dummy trajectories

Spatial Cloaking Main Idea: Blur user’s location into cloaked region k-anonymity Challenge: From snapshot location to continuous trajectory Trajectory tracing attack Anonymity-set tracing attack Support consistent user identity

Trajectory Tracing Attack (1/2) Suppose R1 and R2 are two cloaked regions for user U at t1 and t2, respectively. Suppose attacker knows U’s maximum speed.

Trajectory Tracing Attack (2/2) Attacker could infer which user is U! (Here it is C)

Trajectory Tracing Attack: Solution Patching Technique Delaying Technique (Cheng et al., PETS’06)

Anonymity-set Tracing Attack At time t1 At time t2

Anonymity-set Tracing Attack: Solution Solution 1: Group-based Approach Solution 2: Distortion-based Approach Solution 3: Prediction-based Approach

Solution 1: Group-based Approach At time t1 At time t2 At time t3 Group members are fixed All members need to report their locations to the anonymizer server periodically (Chow et al., SSTD’07)

Solution 2: Distortion-based Approach At time t1 At time ti Do not need other members to report their locations periodically Use their initial directions and velocities to calculate distortion regions Use distortion regions as new cloaked regions (Pan et al., SIGSPATIAL’09)

Solution 3: Prediction-based Approach Predict user’s trajectory Cloak it with other users’ historical trajectories (Xu et al., INFOCOM’08)

Protecting Trajectory Privacy in LBS Spatial cloaking Mix-zones Vehicular mix-zones Path confusion Path confusion with mobility prediction and data caching Euler histogram-based on short IDs Dummy trajectories

Mix-Zones (1/2) Main Idea: Users change pseudonyms when entering mix-zones Do not reveal their location when they are in mix-zones k-anonymity Not support consistent user identity

Mix-Zones (2/2) Ensuring k-anonymity (Freudiger et al., PETS’09) At least k users in mix-zone at a certain time point Each user spends a completely random duration of time in the mix-zone Each user is equally likely to exit in any exit points no matter entering through any entry points

Vehicular Mix-Zones (1/2) Mix-zone designed for Euclidean space not secure enough when it comes to vehicle movements Physical roads Vehicle directions Speed limits Traffic conditions Road conditions

Vehicular Mix-Zones (2/2) Adaptive mix-zones: Road intersection, together with outgoing road segments (Palanisamy et al., ICDE’11)

Protecting Trajectory Privacy in LBS Spatial cloaking Mix-zones Vehicular mix-zones Path confusion Path confusion with mobility prediction and data caching Euler histogram-based on short IDs Dummy trajectories

Path Confusion Goal: Avoid linking consecutive location samples to individual vehicles Main Idea: A central server controls the release of location data to satisfy “time-to-confusion” Not support consistent user identity (Gruteser et al., MobiSys’03)

Path Confusion with Mobility Prediction and Data Caching Main Idea: The location anonymizer predicts vehicular movement paths, pre-fetches the spatial data on predicted paths, stores the data in a cache Service provider can only see queries for a series of interweaving paths (Meyerowitz et al., MobiCom’09)

Protecting Trajectory Privacy in LBS Spatial cloaking Mix-zones Vehicular mix-zones Path confusion Path confusion with mobility prediction and data caching Euler histogram-based on short IDs Dummy trajectories

Euler Histogram-based on Short IDs (EHSID) Goal: Privacy-aware Traffic Monitoring (answering aggregate queries of a given region) ID-based query (count of unique vehicles) (need ID?) Entry-based query (count of entries) Short ID: Partial ID information about objects Full ID: 1 1 0 1 1 1 0 1 1 Bit Pattern: 1, 3, 4, 7 Short ID: 1 0 1 0 Euler Histogram: Answer aggregate queries Not support consistent user identity (Xie et al., IEEE Trans. ITS’10)

Euler Histogram Use an Euler histogram to count distinct rectangles in a query region R F is the sum of face counts inside R V is the sum of vertex counts inside R (excluding its boundary) E is the sum of edge counts inside R (excluding its boundary) = 6 + 1 – 5 = 2 Query region F = 1+2+1+2 = 6 E = 1+1+1+2 = 5 V = 1

Euler Histogram-based on Short IDs (EHSID) Answering four types of queries ID-based cross-border ID-based distinct-objects Entry-based cross-border Entry-based distinct-objects How to calculate these answers using Euler Histogram?

Define Four Types of Vertices Query Region Road Segment Two Trajectories

Euler Histogram-based on Short IDs (EHSID) Query Region Road Segment Two Trajectories

Protecting Trajectory Privacy in LBS Spatial cloaking Mix-zones Vehicular mix-zones Path confusion Path confusion with mobility prediction and data caching Euler histogram-based on short IDs Dummy trajectories

Dummy Trajectories Main Idea: User generate fake location trajectories How to choose dummy trajectories? How to measure the degree of privacy protection? Support consistent user identity (You et al., PALMS’07)

How to Choose Dummy Trajectories Snapshot disclosure (SD): Average probability of successfully inferring each true location Trajectory disclosure (TD): Probability of successfully identifying the true trajectory among all possible trajectories Distance deviation (DD): Average distance between the ith location samples of real trajectory and each dummy trajectory

Outline Introduction Protecting Trajectory Privacy in Location-based Services Protecting Privacy in Trajectory Publication Future Research Directions

Protecting Privacy in Trajectory Publication Clustering-based Anonymization Approach Generalization-based Anonymization Approach Suppression-based Anonymization Approach Grid-based Anonymization Approach

Clustering-based Anonymization Approach Main Idea: Group k co-localized trajectories within the same time period to form a k-anonymized aggregate trajectory. Trajectory Uncertainty Model (Abul et al., ICDE’08)

Clustering-based Anonymization Approach Aggregate trajectory of a set of 2-anonymized co-localized trajectories

Protecting Privacy in Trajectory Publication Clustering-based Anonymization Approach Generalization-based Anonymization Approach Suppression-based Anonymization Approach Grid-based Anonymization Approach

Generalization-based Anonymization Approach Main Idea: Step1: Generalize a trajectory data set into a sequence of k-anonymized regions Step2: Uniformly select k atomic points from each anonymized region and reconstruct k trajectories (Nergiz et al., TDP’09)

Protecting Privacy in Trajectory Publication Clustering-based Anonymization Approach Generalization-based Anonymization Approach Suppression-based Anonymization Approach Grid-based Anonymization Approach

Suppression-based Anonymization Approach Main Idea: Iteratively suppress locations until the privacy constraint is met Privacy constraint Difference between transformed trajectories and original ones (Terrovitis et al., MDM’08) Suppress location a1

Suppression-based Anonymization Approach The probability adversary can identify the actual user of any location pi Suppress location a1

Suppression-based Anonymization Approach Calculate difference between transformed trajectory and the original

Suppression-based Anonymization Approach

Protecting Privacy in Trajectory Publication Clustering-based Anonymization Approach Generalization-based Anonymization Approach Suppression-based Anonymization Approach Grid-based Anonymization Approach

Grid-based Anonymization Approach Main Idea: Replace locations with grids (could have different resolutions) (Gidofalvi et al., MDM’07)

Outline Introduction Protecting Trajectory Privacy in Location-based Services Protecting Privacy in Trajectory Publication Future Research Directions

Future Directions Personalized LBS (require more user semantics) User preferences and background information could be used as quasi-identifiers Trajectory publication supporting more complex queries Spatio-temporal queries Spatio-temporal data analysis