1 A Distortion-based Metric for Location Privacy Workshop on Privacy in the Electronic Society (WPES), Chicago, IL, USA - November 9, 2009 Reza Shokri.

Slides:



Advertisements
Similar presentations
On the Optimal Placement of Mix Zones Julien Freudiger, Reza Shokri and Jean-Pierre Hubaux PETS, 2009.
Advertisements

Location Based Services and Privacy Issues
Protecting Location Privacy: Optimal Strategy against Localization Attacks Reza Shokri, George Theodorakopoulos, Carmela Troncoso, Jean-Pierre Hubaux,
Privacy of Location Trajectory
Quality Aware Privacy Protection for Location-based Services Zhen Xiao, Xiaofeng Meng Renmin University of China Jianliang Xu Hong Kong Baptist University.
Self-Organized Anonymous Authentication in Mobile Ad Hoc Networks Julien Freudiger, Maxim Raya and Jean-Pierre Hubaux SECURECOMM, 2009.
Virtual Trip Lines for Distributed Privacy-Preserving Traffic Monitoring Baik Hoh, Marco Gruteser WINLAB / ECE Dept., Rutgers University Ryan Herring,
Quantifying Location Privacy: The Case of Sporadic Location Exposure Reza Shokri George Theodorakopoulos George Danezis Jean-Pierre Hubaux Jean-Yves Le.
Mohamed F. Mokbel University of Minnesota
Dynamic Anonymity Emin İslam Tatlı, Dirk Stegemann, Stefan Lucks University of Mannheim, Germany.
Mini-Project 2007 On Location Privacy in Vehicular Mix-Networks Julien Freudiger IC-29 Self-Organised Wireless and Sensor Networks Tutors: Maxim Raya Márk.
Privacy Preserving Publication of Moving Object Data Joey Lei CS295 Francesco Bonchi Yahoo! Research Avinguda Diagonal 177, Barcelona, Spain 6/10/20151CS295.
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
A Survey of Computational Location Privacy John Krumm Microsoft Research Redmond, WA USA.
1 Preserving Privacy in Collaborative Filtering through Distributed Aggregation of Offline Profiles The 3rd ACM Conference on Recommender Systems, New.
Computational Location Privacy: Present and Future John Krumm Microsoft Research Redmond, WA USA.
Long Term Evolution and Femtocells Mini-Project Security and Cooperation in Wireless Networks | EPFL January 19, 2010 By Igor Bilogrevic, LCA1 Supervisor:
PRIVÉ : Anonymous Location-Based Queries in Distributed Mobile Systems 1 National University of Singapore 2 University.
Tracking Moving Objects in Anonymized Trajectories Nikolay Vyahhi 1, Spiridon Bakiras 2, Panos Kalnis 3, and Gabriel Ghinita 3 1 St. Petersburg State University.
MobiHide: A Mobile Peer-to-Peer System for Anonymous Location-Based Queries Gabriel Ghinita, Panos Kalnis, Spiros Skiadopoulos National University of Singapore.
PRIVACY CRITERIA. Roadmap Privacy in Data mining Mobile privacy (k-e) – anonymity (c-k) – safety Privacy skyline.
Structure based Data De-anonymization of Social Networks and Mobility Traces Shouling Ji, Weiqing Li, and Raheem Beyah Georgia Institute of Technology.
1 Preserving Privacy in GPS Traces via Uncertainty-Aware Path Cloaking by: Baik Hoh, Marco Gruteser, Hui Xiong, Ansaf Alrabady ACM CCS '07 Presentation:
Baik Hoh Marco Gruteser Hui Xiong Ansaf Alrabady All images are credited to “ACM” Hoh et al (2007), pp
On the Anonymity of Anonymity Systems Andrei Serjantov (anonymous)
R 18 G 65 B 145 R 0 G 201 B 255 R 104 G 113 B 122 R 216 G 217 B 218 R 168 G 187 B 192 Core and background colors: 1© Nokia Solutions and Networks 2014.
Privacy-Triggered Communications in Pervasive Social Networks Murtuza Jadliwala, Julien Freudiger, Imad Aad, Jean-Pierre Hubaux and Valtteri Niemi.
Privacy and trust in social network
Social Networking and On-Line Communities: Classification and Research Trends Maria Ioannidou, Eugenia Raptotasiou, Ioannis Anagnostopoulos.
Location Privacy in Wireless Networks Xiuzhen Cheng CS/GWU 388 – Wireless and Mobile Security.
Optimizing Mixing in Pervasive Networks: A Graph-Theoretic Perspective
Mobile Networks - Module H2 Privacy in Mobile Networks Privacy notions and metrics Location privacy Privacy preserving routing in ad hoc networks Slides.
Overview of Privacy Preserving Techniques.  This is a high-level summary of the state-of-the-art privacy preserving techniques and research areas  Focus.
UNIVERSITY of NOTRE DAME COLLEGE of ENGINEERING Preserving Location Privacy on the Release of Large-scale Mobility Data Xueheng Hu, Aaron D. Striegel Department.
Quantifying Location Privacy Reza Shokri George Theodorakopoulos Jean-Yves Le Boudec Jean-Pierre Hubaux May 2011.
Preserving Link Privacy in Social Network Based Systems Prateek Mittal University of California, Berkeley Charalampos Papamanthou.
Privacy Preserving Data Mining on Moving Object Trajectories Győző Gidófalvi Geomatic ApS Center for Geoinformatik Xuegang Harry Huang Torben Bach Pedersen.
Protecting Sensitive Labels in Social Network Data Anonymization.
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
Hiding in the Mobile Crowd: Location Privacy through Collaboration.
Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data.
Survey on Privacy-Related Technologies Presented by Richard Lin Zhou.
On the Age of Pseudonyms in Mobile Ad Hoc Networks Julien Freudiger, Mohammad Hossein Manshaei, Jean-Yves Le Boudec and Jean-Pierre Hubaux Infocom 2010.
Related Works LOFConclusion Introduction Contents ICISS
Preserving Location Privacy in Wireless LANs Jiang, Wang and Hu MobiSys 2007 Presenter: Bibudh Lahiri.
Alastair R. Beresford Frank Stajano University of Cambridge Presented by Arcadiy Kantor — CS4440 September 13, 2007.
How Others Compromise Your Location Privacy: The Case of Shared Public IPs at Hotspots N. Vratonjic, K. Huguenin, V. Bindschaedler, and J.-P. Hubaux PETS.
Preserving Privacy in GPS Traces via Uncertainty- Aware Path Cloaking Baik Hoh, Marco Gruteser, Hui Xiong, Ansaf Alrabady Presented by Joseph T. Meyerowitz.
GameSec 2010 November 22, Berlin Mathias Humbert, Mohammad Hossein Manshaei, Julien Freudiger and Jean-Pierre Hubaux EPFL - Laboratory for Computer communications.
On Non-Cooperative Location Privacy: A Game-theoreticAnalysis
Virtual Trip Lines for Distributed Privacy- Preserving Traffic Monitoring Baik Hoh et al. MobiSys08 Slides based on Dr. Hoh’s MobiSys presentation.
On Your Social Network De-anonymizablity: Quantification and Large Scale Evaluation with Seed Knowledge NDSS 2015, Shouling Ji, Georgia Institute of Technology.
Privacy-preserving data publishing
Trajectory Data Mining Dr. Yu Zheng Lead Researcher, Microsoft Research Chair Professor at Shanghai Jiao Tong University Editor-in-Chief of ACM Trans.
Preserving Privacy GPS Traces via Uncertainty-Aware Path Cloaking Baik Hoh, Marco Gruteser, Hui Xiong, Ansaf Alrabady Presenter:Yao Lu ECE 256, Spring.
Location Privacy Protection for Location-based Services CS587x Lecture Department of Computer Science Iowa State University.
Mix networks with restricted routes PET 2003 Mix Networks with Restricted Routes George Danezis University of Cambridge Computer Laboratory Privacy Enhancing.
Effectiveness of Blending Attacks on Mixes Meng Tang.
O N THE O PTIMAL P LACEMENT OF M IX Z ONES : A G AME -T HEORETIC A PPROACH Mathias Humbert LCA1/EPFL January 19, 2009 Supervisors: Mohammad Hossein Manshaei.
Privacy Preserving in Social Network Based System PRENTER: YI LIANG.
Unraveling an old cloak: k-anonymity for location privacy
Optimizing the Location Obfuscation in Location-Based Mobile Systems Iris Safaka Professor: Jean-Pierre Hubaux Tutor: Berker Agir Semester Project Security.
Track Me If You Can: On the Effectiveness of Context-based Identifier Changes in Deployed Mobile Networks. Authors: Laurent Bindschaedler, Murtuza Jadliwala,
Privacy Vulnerability of Published Anonymous Mobility Traces Chris Y. T. Ma, David K. Y. Yau, Nung Kwan Yip (Purdue University) Nageswara S. V. Rao (Oak.
Quantifying Location Privacy
Quantifying Location Privacy
MA4404 Winter 2018 Introduction to Machine Learning
Presented By Siddartha Ailuri Graduate Student, EECS 04/07/17
A Unified Framework for Location Privacy
Presentation transcript:

1 A Distortion-based Metric for Location Privacy Workshop on Privacy in the Electronic Society (WPES), Chicago, IL, USA - November 9, 2009 Reza Shokri Julien Freudiger Murtuza Jadliwala Jean-Pierre Hubaux

2 Privacy in Mobile Networks Pervasive Networks Location-based Services

3 Privacy in Mobile Networks

4 Location Privacy Protection Several privacy preserving mechanisms No common notation in previous work Various metrics for location privacy How to compare different mechanisms? Which metric to use? Is location privacy captured properly?

5 Our Contributions 1.A generic framework for location privacy 2.Analysis of the effectiveness of existing location privacy metrics 3.A distortion-based metric that can capture location privacy more accurately

6 Outline A Framework for Location Privacy Location Privacy Metrics A Distortion-based Metric

7 A Framework for Location Privacy Mobile Users Actual Identities, Pseudonyms Events and Traces (Trajectories)

8 Actual Events/Traces events Color: user identity Number: time-stamp Position in the map: location-stamp 01

9 A Framework for Location Privacy Mobile Users Actual Identities, Pseudonyms Events and Traces (Trajectories) Location Privacy Preserving Mechanisms

10 Anonymization Location Privacy Preserving Mechanism Observation Reconstruction Obfuscation Elimination Attack Actual Events Observable Events A Framework for Location Privacy Transformation function

11 Location Privacy Preserving Mechanisms

12 Location Privacy Preserving Mechanisms Elimination

13 Location Privacy Preserving Mechanisms Elimination Obfuscation

14 Location Privacy Preserving Mechanisms Elimination Obfuscation Anonymization

15 A Framework for Location Privacy Mobile Users Actual Identities, Pseudonyms Events and Traces (Trajectories) Location Privacy Preserving Mechanisms Adversary

16 Adversary Knows the privacy preserving mechanism Knows how users tend to move Profiles users mobility –What is the probability of going from a location to another location in a given time period –What is the probability of being in a location at a time instance (density of users on the map) Aims at reconstructing users actual events

17 A Framework for Location Privacy Mobile Users Actual Identities, Pseudonyms Events and Traces (Trajectories) Location Privacy Preserving Mechanisms Adversary Location Privacy Metrics

18 Linkablity Graph Vertices: observed events Directed edges: linking subsequent events of the same user Weight of an edge: linkability probability

19 Outline A Framework for Location Privacy Location Privacy Metrics: Description A Distortion-based Metric

20 Existing Location Privacy Metrics Uncertainty-based “Clustering Error”-based K-anonymity

21 Uncertainty-based Metrics C. Diaz, S. Seys, J. Claessens, and B. Preneel. Towards measuring anonymity. In PET, A. Serjantov and G. Danezis. Towards an information theoretic metric for anonymity. In PET, A. R. Beresford and F. Stajano. Mix zones: User privacy in location-aware services. IEEE PerCom Workshops, User privacy at the time of an observed event adversary’s uncertainty (i.e., Entropy) in linking that event with its subsequent events

22 “Clustering Error”-based Metrics System privacy Average distance of the adversary set partition and the actual set partition B. Hoh and M. Gruteser. Protecting location privacy through path confusion. In SECURECOMM, L. Fischer, S. Katzenbeisser, and C. Eckert. Measuring unlinkability revisited. In ACM WPES, Actual set partition ■■ Adversary set partition ■■

23 K-anonymity P. Samarati and L. Sweeney. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. In IEEE Symposium Research in Security and Privacy, L. Sweeney. k-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl.-Based Syst., 10(5), M. Gruteser and D. Grunwald. Anonymous usage of location-based services through spatial and temporal cloaking. In ACM MobiSys, At an observed event, a user is k-anonymous if there are at least k-1 other users that have the same observed events 05

24 Outline A Framework for Location Privacy Location Privacy Metrics: Evaluation A Distortion-based Metric

25 Evaluation: Scenario 1 Drawback of uncertainty-based and k-anonymity metrics Adversary’s Probability of error Adversary’s tracking error

26 Evaluation: Scenario Drawback of “clustering error”-based metrics Adversary mistake The clustering error is high although both users are tracked most of the time

27 Outline A Framework for Location Privacy Location Privacy Metrics A Distortion-based Metric

28 A Distortion-based Metric (1) For each observed event for a given user For each time instance Predict the subsequent events (based on the adversary knowledge) Until the next observed event Distortion at each time instance The expected error (in space) in predicted events p2p2 p1p1 d1d1 d2d2 D = P 1.d 1 +p 2.d 2 observed predicted actual

Linkability graph Actual trace A Distortion-based Metric (2)

30 Evaluation: Scenario Adversary’s Probability of error Adversary’s tracking error

31 Evaluation: Scenario Adversary mistake

32 Sensitivity to Location/Time Home Work Place Sensitivity of a user to a locations at a specific time instance Friend’s Place We weight the distortion based on the sensitivity of a user to a location/time parir

33 Conclusion and Future Work A framework for location privacy Modeling different metrics within our framework A new distortion-metric for measuring location privacy that satisfies the expected criteria Future: Modeling time obfuscation methods Future: Using the metric in different scenarios