ITIS 3200 Intro to Security and Privacy Dr. Weichao Wang.

Slides:



Advertisements
Similar presentations
Cipher Techniques to Protect Anonymized Mobility Traces from Privacy Attacks Chris Y. T. Ma, David K. Y. Yau, Nung Kwan Yip and Nageswara S. V. Rao.
Advertisements

On the Optimal Placement of Mix Zones Julien Freudiger, Reza Shokri and Jean-Pierre Hubaux PETS, 2009.
The Role of History and Prediction in Data Privacy Kristen LeFevre University of Michigan May 13, 2009.
Virtual Trip Lines for Distributed Privacy-Preserving Traffic Monitoring Baik Hoh, Marco Gruteser WINLAB / ECE Dept., Rutgers University Ryan Herring,
Mobile Resource Manager v2. Core Pillars  Engine - High fuel costs, vehicle maintenance  Productivity - Customers expect increasing levels of service.
Quantifying Location Privacy: The Case of Sporadic Location Exposure Reza Shokri George Theodorakopoulos George Danezis Jean-Pierre Hubaux Jean-Yves Le.
Cyber-Physical Cloud(y) Computing: Good News, Bad News and Looking Forward Haibo Chen.
© Chery F. Kendrick & Kendrick Technical Services.
UTEPComputer Science Dept.1 University of Texas at El Paso Privacy in Statistical Databases Dr. Luc Longpré Computer Science Department Spring 2006.
Dynamic Anonymity Emin İslam Tatlı, Dirk Stegemann, Stefan Lucks University of Mannheim, Germany.
1 A Distortion-based Metric for Location Privacy Workshop on Privacy in the Electronic Society (WPES), Chicago, IL, USA - November 9, 2009 Reza Shokri.
Privacy Preserving Publication of Moving Object Data Joey Lei CS295 Francesco Bonchi Yahoo! Research Avinguda Diagonal 177, Barcelona, Spain 6/10/20151CS295.
Do You Trust Your Recommender? An Exploration of Privacy and Trust in Recommender Systems Dan Frankowski, Dan Cosley, Shilad Sen, Tony Lam, Loren Terveen,
FIT3105 Smart card based authentication and identity management Lecture 4.
A reactive location-based service for geo-referenced individual data collection and analysis Xiujun Ma Department of Machine Intelligence, Peking University.
A Survey of Computational Location Privacy John Krumm Microsoft Research Redmond, WA USA.
Nils Ole Tippenhauer, Kasper Bonne Rasmussen, Christina Pöpper, and Srdjan ˇCapkun Department of Computer Science, ETH Zurich Attacks on Public WLAN-based.
Computational Location Privacy: Present and Future John Krumm Microsoft Research Redmond, WA USA.
Location Systems for Ubiquitous Computing Jeffrey Hightower and Gaetano Borriello.
Inference Attacks on Location Tracks John Krumm Microsoft Research Redmond, WA USA.
User-level Internet Path Diagnosis R. Mahajan, N. Spring, D. Wetherall and T. Anderson.
1 User Centered Design and Evaluation. 2 Overview My evaluation experience Why involve users at all? What is a user-centered approach? Evaluation strategies.
1 Chapter 13: Representing Identity What is identity Different contexts, environments Pseudonymity and anonymity.
Survey Research Questionnaire construction Types of surveys
A Customizable k-Anonymity Model for Protecting Location Privacy Written by: B. Gedik, L.Liu Presented by: Tal Shoseyov.
Rutgers: Gayathri Chandrasekaran, Tam Vu, Marco Gruteser, Rich Martin,
This slide brought to you by What to Do With Thousands of GPS Tracks John Krumm, PhD Microsoft Research Redmond, WA.
1 Preserving Privacy in GPS Traces via Uncertainty-Aware Path Cloaking by: Baik Hoh, Marco Gruteser, Hui Xiong, Ansaf Alrabady ACM CCS '07 Presentation:
© 2008 QUALCOMM Incorporated. External presentation to (audience), prepared by QUALCOMM’s (presenters name) – Month Day, 2008 Hours of Service Driver Training.
Baik Hoh Marco Gruteser Hui Xiong Ansaf Alrabady All images are credited to “ACM” Hoh et al (2007), pp
ByBrendanMalindaRachael. Electronic Monitoring Electronic monitoring can take many forms, this happens because technology is becoming cheaper and very.
1 ______ ___ ____ ___ _____ _______ Seattle City Light Rate Design Outreach November 1, 2013 Summary of Online Survey Results 11/1 Review Panel Discussion.
Signatures As Threats to Privacy Brian Neil Levine Assistant Professor Dept. of Computer Science UMass Amherst.
Topic: Security / Privacy “Your Apps Are Watching You” Source: The Wall Street Journal Online Presented By: Corey Campbell.
Personal Safety Advice Compiled by DC Jeremy House States of Jersey Police Last Updated 03/02/2011 Not Protectively Marked.
Overview of Privacy Preserving Techniques.  This is a high-level summary of the state-of-the-art privacy preserving techniques and research areas  Focus.
How Does Topology Affect Security in Wireless Ad Hoc Networks? Ioannis Broustis CS 260 – Seminar on Network Topology.
Quantifying Location Privacy Reza Shokri George Theodorakopoulos Jean-Yves Le Boudec Jean-Pierre Hubaux May 2011.
Global NetWatch Copyright © 2003 Global NetWatch, Inc. Factors Affecting Web Performance Getting Maximum Performance Out Of Your Web Server.
ICT in Banking.
Easwari Engineering College Department of Computer Science and Engineering IDENTIFICATION AND ISOLATION OF MOBILE REPLICA NODES IN WSN USING ORT METHOD.
Toward Community Sensing Andreas Krause Carnegie Mellon University Joint work with Eric Horvitz, Aman Kansal, Feng Zhao Microsoft Research Information.
1 The SMP Program: Protect Yourself from Health Care Fraud Updated August 2014.
Deducing Mode and Purpose from GPS Data Peter Stopher, Jun Zhang and Eoin Clifford Institute of Transport and Logistics Studies The University of Sydney.
Road pricing. Why ? What is it ? How might it be introduced ? Where and when ? How might it work? Why ? What is it ? How might it be introduced ? Where.
Elastic Pathing: Your Speed Is Enough to Track You Presented by Ali.
How Others Compromise Your Location Privacy: The Case of Shared Public IPs at Hotspots N. Vratonjic, K. Huguenin, V. Bindschaedler, and J.-P. Hubaux PETS.
Alert Message Formats for SAR Points of Contact (SPOCs) - Overview and Interpretation - Tom Griffin, USMCC Senior Systems Analyst U.N./USA Training Course.
Preserving Privacy in GPS Traces via Uncertainty- Aware Path Cloaking Baik Hoh, Marco Gruteser, Hui Xiong, Ansaf Alrabady Presented by Joseph T. Meyerowitz.
Human Tracking System Using DFP in Wireless Environment 3 rd - Review Batch-09 Project Guide Project Members Mrs.G.Sharmila V.Karunya ( ) AP/CSE.
Microsoft Research Faculty Summit John Krumm Microsoft Research Redmond, WA.
Virtual Trip Lines for Distributed Privacy- Preserving Traffic Monitoring Baik Hoh et al. MobiSys08 Slides based on Dr. Hoh’s MobiSys presentation.
Analytical Queries on Road Networks: An Experimental Evaluation of Two System Architectures Shangfu PengHanan Samet Department.
ANALYSIS TOOL TO PROCESS PASSIVELY- COLLECTED GPS DATA FOR COMMERCIAL VEHICLE DEMAND MODELLING APPLICATIONS Bryce Sharman & Matthew Roorda University of.
Anonymity - Background Prof. Newman, instructor CSE-E (don’t leave message) Office Hours (tentative): 10-noon TR - subject:
Pervasive Computing MIT SMA 5508 Spring 2006 Larry Rudolph 1 Location, Location, Location Larry Rudolph.
Preserving Privacy GPS Traces via Uncertainty-Aware Path Cloaking Baik Hoh, Marco Gruteser, Hui Xiong, Ansaf Alrabady Presenter:Yao Lu ECE 256, Spring.
Location Privacy Protection for Location-based Services CS587x Lecture Department of Computer Science Iowa State University.
2/10/2016 Mobile Ad hoc Networks COE 549 Routing Protocols III Tarek Sheltami KFUPM CCSE COE
1 Travel Times from Mobile Sensors Ram Rajagopal, Raffi Sevlian and Pravin Varaiya University of California, Berkeley Singapore Road Traffic Control TexPoint.
March 9, Broadcasting with Bounded Number of Redundant Transmissions Majid Khabbazian.
Learning and Inferring Transportation Routines Lin Liao, Don Patterson, Dieter Fox, Henry Kautz Department of Computer Science and Engineering University.
Outline Historical note about Bayes’ rule Bayesian updating for probability density functions –Salary offer estimate Coin trials example Reading material:
Privacy Vulnerability of Published Anonymous Mobility Traces Chris Y. T. Ma, David K. Y. Yau, Nung Kwan Yip (Purdue University) Nageswara S. V. Rao (Oak.
COMPSCI 720 Security for Smart-devices Tracking Mobile Web Users Through Motion Sensors: Attacks and Defenses [1] Harry Jackson hjac660 [1] Das, Anupam,
Instructions for BPMI Interviewee Expense Report
Location Privacy.
Instructions for BPMI Interviewee Expense Report
Instructions for BPMI Interviewee Expense Report
A Unified Framework for Location Privacy
Presentation transcript:

ITIS 3200 Intro to Security and Privacy Dr. Weichao Wang

2 Inference Attacks on Location Tracks

3 Questions to Answer Do anonymized location tracks reveal your identity? If so, how much data corruption will protect you?

4 Motivation – Why Send Your Location? Congestion Pricing Location Based Services Pay As You Drive (PAYD) Insurance Collaborative Traffic Probes (DASH) Research (London OpenStreetMap)

5 GPS Data Microsoft Multiperson Location Survey (MSMLS) 55 GPS receivers 226 subjects 95,000 miles 153,000 kilometers 12,418 trips Home addresses & demographic data Greater Seattle Seattle DowntownClose-up Garmin Geko 201 $115 10,000 point memory median recording interval 6 seconds 63 meters

6 People Don’t Care About Location Privacy 74 U. Cambridge CS students Would accept £10 to reveal 28 days of measured locations (£20 for commercial use) 226 Microsoft employees 14 days of GPS tracks in return for 1 in 100 chance for $200 MP3 player 62 Microsoft employees Only 21% insisted on not sharing GPS data outside 11 with location-sensitive message service in Seattle Privacy concerns fairly light 55 Finland interviews on location-aware services “It did not occur to most of the interviewees that they could be located while using the service.”

7 Documented Privacy Leaks How Cell Phone Helped Cops Nail Key Murder Suspect – Secret “Pings” that Gave Bouncer Away New York, NY, March 15, 2006 Stalker Victims Should Check For GPS Milwaukee, WI, February 6, 2003 A Face Is Exposed for AOL Searcher No New York, NY, August 9, 2006 Real time celebrity sightings

8 Pseudonimity for Location Tracks Pseudonimity Replace owner name of each point with untraceable ID One unique ID for each owner Example “Larry Page” → “yellow” “Bill Gates” → “red”

9 Attack Outline Pseudonomized GPS tracks Infer home location Reverse white pages for identity

10 GPS Tracks → Home Location Algorithm 1 Last Destination – median of last destination before 3 a.m. Median error = 60.7 meters

11 GPS Tracks → Home Location Algorithm 2 Weighted Median – median of all points, weighted by time spent at point (no trip segmentation required) Median error = 66.6 meters

12 GPS Tracks → Home Location Algorithm 3 Largest Cluster – cluster points, take median of cluster with most points Median error = 66.6 meters

13 GPS Tracks → Home Location Algorithm 4 Best Time – location at time with maximum probability of being home Median error = meters (!)

14 Why Not More Accurate? GPS interval – 6 seconds and 63 meters GPS satellite acquisition -- ≈45 seconds on cold start, time to drive 300 meters at 15 mph Covered parking – no GPS signal Distant parking – far from home covered parkingdistant parking

15 GPS Tracks → Identity? Windows Live Search reverse white pages lookup

16 Identification GPS Tracks (172 people) Home Location (61 meters) Home Address (12%) Identity (5%) MapPoint Web Service reverse geocoding Windows Live Search reverse white pages AlgorithmCorrect out of 172 Percent Correct Last Destination 84.7% Weighted Median 95.2% Largest Cluster 95.2% Best Time21.2%

17 Why Not Better? Multiunit buildings Outdated white pages Poor geocoding

18 Similar Study Hoh, Gruteser, Xiong, Alrabady, Enhancing Security and Privacy in Traffic-Monitoring Systems, in IEEE Pervasive Computing p volunteer drivers in Detroit, MI area Cluster destinations to find home location arrive 4 p.m. to midnight must be in residential area Manual inspection on home location (no knowledge of drivers’ actual home address) 85% of homes found

19 Easy Way to Fix Privacy Leak? Location Privacy Protection Methods 1.Regulatory strategies – based on rules 2.Privacy policies – based on trust 3.Anonymity – e.g. pseudonymity 4.Obfuscation – obscure the data Duckham, M. and L. Kulik, Location Privacy and Location- Aware Computing, in Dynamic & Mobile GIS: Investigating Change in Space and Time, J. Drummond, et al., Editors. 2006, CRC Press: Boca Raton, FL.

20 Obfuscation Techniques (Duckham and Kulik, 2006) Spatial Cloaking – confuse with other people Noise – add noise to measurements Rounding – discretize measurements Vagueness – “home”, “work”, “school”, “mall” Dropped Samples – skip measurements

21 Countermeasure: Add Noise originalσ= 50 meters noise added Effect of added noise on address-finding rate

22 Countermeasure: Discretize originalsnap to 50 meter grid Effect of discretization on address-finding rate

23 Countermeasure: Cloak Home 1.Pick a random circle center within “r” meters of home 2.Delete all points in circle with radius “R”

24 Conclusions Privacy Leak from Location Data –Can infer identity: GPS → Home → Identity –Best was 5% –5% is lower bound, evil geniuses will do better Obfuscation Countermeasures –Need lots of corruption to approach zero risk

25 Next Steps How does data corruption affect applications?

26 End originalnoise discretizecloak reverse white pages