Mohamed F. Mokbel University of Minnesota

Slides:



Advertisements
Similar presentations
Location Based Services and Privacy Issues
Advertisements

Preserving Location Privacy Uichin Lee KAIST KSE Slides based on by Ling Liuhttp://
Introduction to Algorithms Quicksort
University of Minnesota Mohamed F. Mokbel1ICDM 2008 Privacy-Preserving Location Services Mohamed F. Mokbel Department of Computer Science.
Efficient Evaluation of k-Range Nearest Neighbor Queries in Road Networks Jie BaoChi-Yin ChowMohamed F. Mokbel Department of Computer Science and Engineering.
Quality Aware Privacy Protection for Location-based Services Zhen Xiao, Xiaofeng Meng Renmin University of China Jianliang Xu Hong Kong Baptist University.
1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.
PrivacyGrid Visualization Balaji Palanisamy Saurabh Taneja.
Department of Computer Science Spatio-Temporal Histograms Hicham G. Elmongui*Mohamed F. Mokbel + Walid G. Aref* *Purdue University, Department of Computer.
U of Minnesota Spatial and Spatio-temporal Data Uncertainty: Modeling and Querying Mohamed F. Mokbel Department of Computer Science and Engineering University.
Constructing Popular Routes from Uncertain Trajectories Ling-Yin Wei 1, Yu Zheng 2, Wen-Chih Peng 1 1 National Chiao Tung University, Taiwan 2 Microsoft.
Spatial Mining.
A Crowd-Enabled Approach for Efficient Processing of Nearest Neighbor Queries in Incomplete Databases Samia Kabir, Mehnaz Tabassum Mahin Department of.
Privacy in Location-based Services: State-of-the-art and Research Directions Mohamed F. Mokbel Department of Computer Science and Engineering,
1 A Distortion-based Metric for Location Privacy Workshop on Privacy in the Electronic Society (WPES), Chicago, IL, USA - November 9, 2009 Reza Shokri.
Spatial Data Security Methods Avinash Kumar Sahu Under Guidance of Prof. (Mrs.) P. Venkatachalam Centre of Studies in Resources Engineering Indian Institute.
University of Minnesota 1 / 9 May 2011 Energy-Efficient Location-based Services Mohamed F. Mokbel Department of Computer Science and Engineering University.
Location Privacy in Casper: A Tale of two Systems
On Reducing Communication Cost for Distributed Query Monitoring Systems. Fuyu Liu, Kien A. Hua, Fei Xie MDM 2008 Alex Papadimitriou.
1 SINA: Scalable Incremental Processing of Continuous Queries in Spatio-temporal Databases Mohamed F. Mokbel, Xiaopeng Xiong, Walid G. Aref Presented by.
1 Location Information Management and Moving Object Databases “Moving Object Databases: Issues and Solutions” Ouri, Bo, Sam and Liqin.
PRIVÉ : Anonymous Location-Based Queries in Distributed Mobile Systems 1 National University of Singapore 2 University.
1 SINA: Scalable Incremental Processing of Continuous Queries in Spatio-temporal Databases Mohamed F. Mokbel, Xiaopeng Xiong, Walid G. Aref Presented by.
Lecture 6: Point Location Computational Geometry Prof. Dr. Th. Ottmann 1 Point Location 1.Trapezoidal decomposition. 2.A search structure. 3.Randomized,
MobiHide: A Mobile Peer-to-Peer System for Anonymous Location-Based Queries Gabriel Ghinita, Panos Kalnis, Spiros Skiadopoulos National University of Singapore.
Privacy of Location Information in Vehicular Ad Hoc Networks Walaa El-Din M. Moustafa.
A Customizable k-Anonymity Model for Protecting Location Privacy Written by: B. Gedik, L.Liu Presented by: Tal Shoseyov.
PRIVACY CRITERIA. Roadmap Privacy in Data mining Mobile privacy (k-e) – anonymity (c-k) – safety Privacy skyline.
Click to edit Present’s Name Trends in Location-based Services Muhammad Aamir Cheema.
C LOAKING AND M ODELING T ECHNIQUES FOR LOCATION P RIVACY PROTECTION Ying Cai Department of Computer Science Iowa State University Ames, IA
Location Privacy Location privacy in mobile systems: A personalized Anonymization Model Burga Gedik, Ling Liu.
F EELING - BASED L OCATION P RIVACY P ROTECTION FOR L OCATION - BASED S ERVICES CS587x Lecture Department of Computer Science Iowa State University Ames,
Gabriel Ghinita1 Panos Kalnis1 Ali Khoshgozaran2 Cyrus Shahabi2
Privacy Preserving Data Mining on Moving Object Trajectories Győző Gidófalvi Geomatic ApS Center for Geoinformatik Xuegang Harry Huang Torben Bach Pedersen.
Shiyuan Wang, Divyakant Agrawal, Amr El Abbadi Department of Computer Science UC Santa Barbara DBSec 2010.
Location Privacy CompSci Instructor: Ashwin Machanavajjhala Some slides are from a tutorial by Mohamed Mokbel (ICDM 2008) Lecture 19: Fall.
Privacy-Aware Personalization for Mobile Advertising
A Distributed Clustering Framework for MANETS Mohit Garg, IIT Bombay RK Shyamasundar School of Tech. & Computer Science Tata Institute of Fundamental Research.
Systems and Internet Infrastructure Security (SIIS) LaboratoryPage Systems and Internet Infrastructure Security Network and Security Research Center Department.
February 3, Location Based M-Services The numbers of on-line mobile personal devices increase. New types of context-aware e-services become possible.
ACOMP 2011 A Novel Framework for LBS Privacy Preservation in Dynamic Context Environment.
1 SpaceTwist: A Flexible Approach for Hiding Query User Location Speaker: Man Lung Yiu Aalborg University Joint work with Christian S. Jensen, Xuegang.
Nearest Neighbor Queries Chris Buzzerd, Dave Boerner, and Kevin Stewart.
Efficient Processing of Top-k Spatial Preference Queries
Privacy Preserving In LBS
How Others Compromise Your Location Privacy: The Case of Shared Public IPs at Hotspots N. Vratonjic, K. Huguenin, V. Bindschaedler, and J.-P. Hubaux PETS.
Preserving Privacy in GPS Traces via Uncertainty- Aware Path Cloaking Baik Hoh, Marco Gruteser, Hui Xiong, Ansaf Alrabady Presented by Joseph T. Meyerowitz.
Virtual Trip Lines for Distributed Privacy- Preserving Traffic Monitoring Baik Hoh et al. MobiSys08 Slides based on Dr. Hoh’s MobiSys presentation.
A Hybrid Technique for Private Location-Based Queries with Database Protection Gabriel Ghinita 1 Panos Kalnis 2 Murat Kantarcioglu 3 Elisa Bertino 1 1.
Information Technology (Some) Research Trends in Location-based Services Muhammad Aamir Cheema Faculty of Information Technology Monash University, Australia.
Spatial Indexing Techniques Introduction to Spatial Computing CSE 5ISC Some slides adapted from Spatial Databases: A Tour by Shashi Shekhar Prentice Hall.
1/14/ :59 PM1/14/ :59 PM1/14/ :59 PM Research overview Koen Victor, 12/2007.
Privacy-Preserving Location- Dependent Query Processing Mikhail J. Atallah and Keith B. Frikken Purdue University.
EVALUATING LBS PRIVACY IN DYNAMIC CONTEXT 1. Outline 2  Overview Attack Model  Classification Defend Model  Evaluation Module  Conclusion.
Range Monitoring Queries in Location-based Services Kien A. Hua School of EECS University of Central Florida.
Location Privacy Protection for Location-based Services CS587x Lecture Department of Computer Science Iowa State University.
Unraveling an old cloak: k-anonymity for location privacy
Privacy-Preserving Publication of User Locations in the Proximity of Sensitive Sites Bharath Krishnamachari Gabriel Ghinita Panos Kalnis National University.
CLUSTERING GRID-BASED METHODS Elsayed Hemayed Data Mining Course.
Center for E-Business Technology Seoul National University Seoul, Korea Private Queries in Location Based Services: Anonymizers are not Necessary Gabriel.
3D Perception and Environment Map Generation for Humanoid Robot Navigation A DISCUSSION OF: -BY ANGELA FILLEY.
Overview Issues in Mobile Databases – Data management – Transaction management Mobile Databases and Information Retrieval.
 A Two-level Protocol to Answer Private Location-based Queries Roopa Vishwanathan Yan Huang [RoopaVishwanathan, Computer Science and.
Data Mining Soongsil University
Location Privacy.
Efficient Evaluation of k-NN Queries Using Spatial Mashups
Continuous Density Queries for Moving Objects
Spatio-Temporal Histograms
Efficient Processing of Top-k Spatial Preference Queries
Presentation transcript:

Mohamed F. Mokbel University of Minnesota The New Casper: Query Processing for Location Services without Compromising Privacy Mohamed F. Mokbel University of Minnesota Chi-Yin Chow University of Minnesota Walid G. Aref Purdue University

Cover story, IEEE Spectrum, July 2003 Major Privacy Threats YOU ARE TRACKED…!!!! “New technologies can pinpoint your location at any time and place. They promise safety and convenience but threaten privacy and security” Cover story, IEEE Spectrum, July 2003 VLDB 2006

Major Privacy Threats VLDB 2006

WHY location-detection devices? With all its privacy threats, why do users still use location-detection devices? Location-based Database Server Wide spread of location-based services Location-based store finders Location-based traffic reports Location-based advertisements Location-based services rely on the implicit assumption that users agree on revealing their private user locations Location-based services trade their services with privacy VLDB 2006

Service-Privacy Trade-off Example: Where is my nearest bus Service 100% 0% Privacy VLDB 2006

The Casper Architecture Privacy-aware Query Processor 2: Query + blurred Spatial Region Location-based Database Server 3: Candidate Answer Third trusted party that is responsible on blurring the exact location information. Location Anonymizer 1: Query + Location Information 4: Candidate/Exact Answer VLDB 2006

System Users: Privacy Profile Each mobile user has her own privacy-profile that includes: K. A user wants to be k-anonymous Amin. The minimum required area of the blurred area Multiple instances of the above parameters to indicate different privacy profiles at different times Time k Amin 8:00 AM - 5:00 PM - 10:00 PM - 1 100 1000 ___ 1 mile 5 miles VLDB 2006

Location Anonymizer: Grid-based Pyramid Structure The entire system area is divided into grids. The Location Anonymizer incrementally keeps track the number of users residing in each grid. Traverse the pyramid structure from the bottom level to the top level, until a cell satisfying the user privacy profile is found. Disadvantages: High location update cost. High searching cost, Grid-based Pyramid Structure VLDB 2006

Adaptive Location Anonymizer Each sub-structure may have a different depth that is adaptive to the environmental changes and user privacy requirements. Cell Splitting: A cell cid at level i needs to be split into four cells at level i+1 if there is at least one user u in cid with a privacy profile that can be satisfied by some cell at level i+1. Cell Merging: Four cells at level i are merged into one cell at a higher level i-1 only if all users in the level i cells have strict privacy requirements that cannot be satisfied within level i. Adaptive Grid-based Pyramid Structure VLDB 2006

The Privacy-aware Query Processor Embedded inside the location-based database server Process queries based on cloaked spatial regions rather than exact location information Two types of data: Public data. Gas stations, restaurants, police cars Private data. Personal data records VLDB 2006

Privacy-aware Query Processor: Query Types Private queries over public data What is my nearest gas station Public queries over private data How many cars in the downtown area Private queries over private data Where is my nearest friend VLDB 2006

Private Queries over Public Data: Naive Approaches Complete privacy The Database Server returns all the target objects to the Location Anonymizer. High transmission cost Shifting the burden of query processing work onto the mobile user Nearest target object to center of the spatial query region Simple but NOT accurate Location Anonymizer (The correct NN object is T13.) VLDB 2006

Private Queries over Public Data Step 1: Locate four filters The NN target object for each vertex Step 2 : Find the middle points The furthest point on the edge to the two filters Step 3: Extend the query range Step 4: Candidate answer m34 m24 m13 m12 VLDB 2006

Private Queries over Public Data: Proof of Correctness Theorem 1 Given a cloaked area A for user u located anywhere within A, the privacy-aware query processor returns a candidate list that includes the exact nearest target to u. Theorem 2 Given a cloaked area A for a user u and a set of filter target object t1 to t4, the privacy-aware query processor issues the minimum possible range query to get the candidate list. (a) ti=tj (b) ti≠tj VLDB 2006

Private Queries over Private Data Step 1: Locate four filters The NN target object for each vertex Step 2: Find the middle points The furthest point on the edge to the two filters Step 3: Extend the query range Step 4: Candidate answer m34 m24 m13 m12 VLDB 2006

Private Queries over Private Data: Proof of Correctness Theorem 3 Given a cloaked area A for user u located anywhere within A and a set of target objects represented by their cloaked regions, the privacy-aware query processor returns a candidate list that includes the exact nearest target to u. Theorem 4 Given a cloaked area A for a user u and a set of filter target object t1 to t4 represented by their cloaked areas, the privacy-aware query processor issues the minimum possible range query to get the candidate list. (a) ti=tj (b) ti≠tj VLDB 2006

Experimental Settings We use the Network-based Generator of Moving Objects to generate a set of moving objects and moving queries. The input to the generator is the road map of Hennepin County, MN, USA. Compare the performance between Basic Location Anonymizer and Adaptive Location Anonymizer Study the performance of Casper on processing Private queries over public data Private queries over private data The Casper end-to-end performance VLDB 2006

Location Anonymizer: Number of Moving Users Parameter settings: k = [10, 50] Amin=[0.005, 0.1]% of the system area Pyramid height = 9 Basic LA and Adaptive LA are scalable to the number of moving users. Adaptive LA outperforms Basic LA in terms of the cloaking CPU time and the maintenance cost. VLDB 2006

Location Anonymizer: Effect of k Privacy Requirement Parameter settings: Amin=0 Pyramid height = 9 Basic LA and Adaptive LA are salable to the value of k. Adaptive LA also outperforms Basic LA, as the value of k gets larger. VLDB 2006

Privacy-aware Query Processor: Number of Public Target Objects Parameter settings: k = [10, 50] Amin=[0.005, 0.1]% of the system area # of moving users = 50K The case of 4 filters outperforms the case of 1 filter and 2 filters in terms of query processing CPU time and candidate answer size VLDB 2006

The Casper End-to-End Performance Parameter settings: Amin= 0 # of moving users = 10K # of target objects 5K Bandwidth = 20 Mbps Using 4 filters gives much better performance than that of using 1 filter The bottleneck is moved to be the transmission time. Public Data Private Data VLDB 2006

Summary Addressing a major privacy threat to the user in location-based service environment Casper Location Anonymizer Privacy-aware Query Processor Experiment results depict that Casper is Scalable Accurate Efficient VLDB 2006

Related Work (1/2) Adaptive-Interval Cloaking Algorithm Drawbacks Divide the entire system area into quadrants of equal area iteratively, until the quadrant includes the user and other k-1 users Drawbacks Not scalable to the number of users Not consider minimum required resolution of the cloaked region Not support query processing Compared with Casper Flexibility  Efficiency  Quality  Accuracy  M. Gruteser and D. Grunwald. Anonymous usage of location-based services through spatial and temporal cloaking, MobiSys, 2003 VLDB 2006

Related Work (2/2) Clique-Cloak Algorithm Drawbacks Each user has her own k-anonymity requirement. A clique graph is constructed to search for a minimum bounding rectangle that includes the user’s message and other k-1 messages. Drawbacks Not scalable to k Not consider minimum required resolution of the cloaked region Not support query processing An adversary can guess the location information of the users lying on the rectangle boundary with high probability. Compared with Casper Flexibility  Efficiency  Quality  Accuracy  B. Gedik and L. Liu. Location Privacy in Mobile Systems: A Personalized Anonymization Model. ICDCS, 2005. VLDB 2006

Location Anonymizer: Pyramid Height Parameter settings: k = [10, 50] Amin=[0.005, 0.1]% of the system area # of moving users = 50K Cloaking CPU time and maintenance cost get higher with increasing pyramid height Adaptive LA performs better than Basic LA, as the pyramid height increases VLDB 2006

Privacy-aware Query Processor: Number of Private Target Objects Parameter settings: k = [10, 50] Amin=[0.005, 0.1]% of the system area # of moving users = 50K The case of 4 filters outperforms the case of 1 filter and 2 filters in terms of query candidate answer size The case of 4 filters performs better than the case of 1 filter and 2 filters in terms of query processing CPU time when number of target object is over 8K VLDB 2006