A Survey of Computational Location Privacy John Krumm Microsoft Research Redmond, WA USA.

Slides:



Advertisements
Similar presentations
Opportunity Knocks: A Community Navigation Aid Henry Kautz Don Patterson Dieter Fox Lin Liao University of Washington Computer Science & Engineering.
Advertisements

On the Optimal Placement of Mix Zones Julien Freudiger, Reza Shokri and Jean-Pierre Hubaux PETS, 2009.
Preserving Location Privacy Uichin Lee KAIST KSE Slides based on by Ling Liuhttp://
Expressive Privacy Control with Pseudonyms Seungyeop Han, Vincent Liu, Qifan Pu, Simon Peter, Thomas Anderson, Arvind Krishnamurthy, David Wetherall University.
Self-Organized Anonymous Authentication in Mobile Ad Hoc Networks Julien Freudiger, Maxim Raya and Jean-Pierre Hubaux SECURECOMM, 2009.
FixtureFinder: Discovering the Existence of Electrical and Water Fixtures Vijay Srinivasan*, John Stankovic, Kamin Whitehouse University of Virginia *(Currently.
Quantifying Location Privacy: The Case of Sporadic Location Exposure Reza Shokri George Theodorakopoulos George Danezis Jean-Pierre Hubaux Jean-Yves Le.
Security and Privacy Issues in Wireless Communication By: Michael Glus, MSEE EEL
Dynamic Anonymity Emin İslam Tatlı, Dirk Stegemann, Stefan Lucks University of Mannheim, Germany.
1 A Distortion-based Metric for Location Privacy Workshop on Privacy in the Electronic Society (WPES), Chicago, IL, USA - November 9, 2009 Reza Shokri.
Suman Nath Microsoft Research. Contextual Computing Make computing context-aware Context: location, activity, preference, history A lot of progresses.
Privacy Preserving Publication of Moving Object Data Joey Lei CS295 Francesco Bonchi Yahoo! Research Avinguda Diagonal 177, Barcelona, Spain 6/10/20151CS295.
ITIS 3200 Intro to Security and Privacy Dr. Weichao Wang.
1 Location Information Management and Moving Object Databases “Moving Object Databases: Issues and Solutions” Ouri, Bo, Sam and Liqin.
Computational Location Privacy: Present and Future John Krumm Microsoft Research Redmond, WA USA.
Location Systems for Ubiquitous Computing Jeffrey Hightower and Gaetano Borriello.
Cumulative Violation For any window size  t  Communication-Efficient Tracking for Distributed Cumulative Triggers Ling Huang* Minos Garofalakis.
Inference Attacks on Location Tracks John Krumm Microsoft Research Redmond, WA USA.
Error Checking continued. Network Layers in Action Each layer in the OSI Model will add header information that pertains to that specific protocol. On.
Algorithms behind Global Positioning Murray Grace Josh Collins.
Rutgers: Gayathri Chandrasekaran, Tam Vu, Marco Gruteser, Rich Martin,
Ubiquitous Advertising: the Killer Application for the 21st Century Author: John Krumm Presenter: Anh P. Nguyen
This slide brought to you by What to Do With Thousands of GPS Tracks John Krumm, PhD Microsoft Research Redmond, WA.
1 Preserving Privacy in GPS Traces via Uncertainty-Aware Path Cloaking by: Baik Hoh, Marco Gruteser, Hui Xiong, Ansaf Alrabady ACM CCS '07 Presentation:
ByBrendanMalindaRachael. Electronic Monitoring Electronic monitoring can take many forms, this happens because technology is becoming cheaper and very.
Wang, Z., et al. Presented by: Kayla Henneman October 27, 2014 WHO IS HERE: LOCATION AWARE FACE RECOGNITION.
Smart Environments for Occupancy Sensing and Services Paper by Pirttikangas, Tobe, and Thepvilojanapong Presented by Alan Kelly December 7, 2011.
On the Anonymity of Anonymity Systems Andrei Serjantov (anonymous)
Chapter 10: Authentication Guide to Computer Network Security.
Cong Wang1, Qian Wang1, Kui Ren1 and Wenjing Lou2
Preserving Privacy in Location-Based Services using Sudoku Structures A Presentation for ICISS-2014 IDRBT, Hyderabad Authors : Sumitra Biswal, Goutam Paul.
Signatures As Threats to Privacy Brian Neil Levine Assistant Professor Dept. of Computer Science UMass Amherst.
Mobile IP: Introduction Reference: “Mobile networking through Mobile IP”; Perkins, C.E.; IEEE Internet Computing, Volume: 2 Issue: 1, Jan.- Feb. 1998;
Extracting Places and Activities from GPS Traces Using Hierarchical Conditional Random Fields Yong-Joong Kim Dept. of Computer Science Yonsei.
Snooping based privacy attacks based on transmission timing and wireless fingerprinting Master’s project presentation Vijay Srinivasan University of Virginia.
Quantifying Location Privacy Reza Shokri George Theodorakopoulos Jean-Yves Le Boudec Jean-Pierre Hubaux May 2011.
Hidden Markov Map Matching Through Noise and Sparseness Paul Newson and John Krumm Microsoft Research ACM SIGSPATIAL ’09 November 6 th, 2009.
Optimizing Hybrid Vehicles via Route Prediction jon froehlich & john krumm HCI Intern Talk July 26 th, 2007.
Lecture 17 Page 1 CS 236 Online Network Privacy Mostly issues of preserving privacy of data flowing through network Start with encryption –With good encryption,
Lecture 20 Hacking. Over the Internet Over LAN Locally Offline Theft Deception Modes of Hacker Attack.
On the Age of Pseudonyms in Mobile Ad Hoc Networks Julien Freudiger, Mohammad Hossein Manshaei, Jean-Yves Le Boudec and Jean-Pierre Hubaux Infocom 2010.
A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University.
1 Hiding Stars with Fireworks: Location Privacy through Camouflage Joseph Meyerowitz Romit Roy Choudhury ECE and PhysicsDept. of ECE and CS.
Lecture 7 Page 1 CS 236, Spring 2008 Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know.
User Fingerprinting Jeffrey Pang 1 Ben Greenstein 2 Ramakrishna Gummadi 3 Srinivasan Seshan 1 David Wetherall 2,4 Presenter: Nan Jiang Most Slides:
Preserving Location Privacy in Wireless LANs Jiang, Wang and Hu MobiSys 2007 Presenter: Bibudh Lahiri.
Alastair R. Beresford Frank Stajano University of Cambridge Presented by Arcadiy Kantor — CS4440 September 13, 2007.
GPS Provider:  GPS signal Network Location Provider:  Cell ID  Wi-Fi.
How Others Compromise Your Location Privacy: The Case of Shared Public IPs at Hotspots N. Vratonjic, K. Huguenin, V. Bindschaedler, and J.-P. Hubaux PETS.
Preserving Privacy in GPS Traces via Uncertainty- Aware Path Cloaking Baik Hoh, Marco Gruteser, Hui Xiong, Ansaf Alrabady Presented by Joseph T. Meyerowitz.
1 Mobile Computing and Wireless Networking CS 851 Seminar 2002 Fall University of Virginia.
Human Tracking System Using DFP in Wireless Environment 3 rd - Review Batch-09 Project Guide Project Members Mrs.G.Sharmila V.Karunya ( ) AP/CSE.
Microsoft Research Faculty Summit John Krumm Microsoft Research Redmond, WA.
Virtual Trip Lines for Distributed Privacy- Preserving Traffic Monitoring Baik Hoh et al. MobiSys08 Slides based on Dr. Hoh’s MobiSys presentation.
Privacy Preserving Payments in Credit Networks By: Moreno-Sanchez et al from Saarland University Presented By: Cody Watson Some Slides Borrowed From NDSS’15.
1 Covert Communication based Privacy Preservation in Mobile Vehicular Networks Rasheed Hussain*, Donghyun Kim**, Alade O. Tokuta**, Hayk M. Melikyan**,
Inferring High-Level Behavior from Low-Level Sensors Donald J. Patterson, Lin Liao, Dieter Fox, and Henry Kautz.
1 Jong Hee Kang, William Welbourne, Benjamin Stewart, Gaetano Borriello, October 2004, Proceedings of the 2nd ACM international workshop on Wireless mobile.
Location Privacy Protection for Location-based Services CS587x Lecture Department of Computer Science Iowa State University.
SEMINAR ON IP SPOOFING. IP spoofing is the creation of IP packets using forged (spoofed) source IP address. In the April 1989, AT & T Bell a lab was among.
Pervasive Computing MIT SMA 5508 Spring 2006 Larry Rudolph 1 Tracking Indoors.
1 Travel Times from Mobile Sensors Ram Rajagopal, Raffi Sevlian and Pravin Varaiya University of California, Berkeley Singapore Road Traffic Control TexPoint.
1. ABSTRACT Information access through Internet provides intruders various ways of attacking a computer system. Establishment of a safe and strong network.
Privacy Vulnerability of Published Anonymous Mobility Traces Chris Y. T. Ma, David K. Y. Yau, Nung Kwan Yip (Purdue University) Nageswara S. V. Rao (Oak.
COMPSCI 720 Security for Smart-devices Tracking Mobile Web Users Through Motion Sensors: Attacks and Defenses [1] Harry Jackson hjac660 [1] Das, Anupam,
Introduction Wireless devices offering IP connectivity
Anonymous Communication
Anonymous Communication
A Unified Framework for Location Privacy
Anonymous Communication
Presentation transcript:

A Survey of Computational Location Privacy John Krumm Microsoft Research Redmond, WA USA

Subtleties of Location Privacy “… a special type of information privacy which concerns the claim of individuals to determine for themselves when, how, and to what extent location information about them is communicated to others.” Duckham, M. and L. Kulik, Location privacy and location-aware computing, in Dynamic & Mobile GIS: Investigating Change in Space and Time, J. Drummond, et al., Editors. 2006, CRC Press: Boca Raton, FL USA. p When: For D-Day attack, troop location privacy not important 60 years later How: Alert fires to tell your family whenever you stop for pancakes “Michael Mischers Chocolates” “Weight Watchers” To what extent: Accuracy high enough to distinguish?

Computational Location Privacy Encryption – Applies to any type of data. Computational Location Privacy – Exploits geometric nature of data with algorithms Law – Privacy regulations enforced by government Policy – Trust-based, often from institutions

Outline Why reveal your location? Do people care about location privacy? Computational location privacy threats Computational countermeasures Quantifying location privacy Research issues

Why Reveal Your Location? If you want to know your location, sometimes have to tell someone else. Loki Wi-Fi locator – send your Wi-Fi fingerprint and get back (lat,long) Quova Reverse IP – send your IP address and get back (lat,long) Exceptions UbiSense – static sensors receive UWB to compute (x,y,z) Cricket – MIT POLS – Intel Research

Variable Pricing Congestion Pricing Pay As You Drive (PAYD) Insurance

Traffic Probes

Social Applications Dodgeball Geotagged Flickr Geotagged Twitter MotionBased

Location-Based Services Navigation Local Information Games Tracking Location Alerts

Research OpenStreetMap (London) MSMLS (Seattle)

Outline Why reveal your location? Do people care about location privacy? Computational location privacy threats Computational countermeasures Quantifying location privacy Research issues

People Don’t Care about Location Privacy (1) Danezis, G., S. Lewis, and R. Anderson. How Much is Location Privacy Worth? in Fourth Workshop on the Economics of Information Security Harvard University. 74 U. Cambridge CS students Would accept £10 to reveal 28 days of measured locations (£20 for commercial use) (1) 226 Microsoft employees 14 days of GPS tracks in return for 1 in 100 chance for $200 MP3 player 62 Microsoft employees Only 21% insisted on not sharing GPS data outside 11 with location-sensitive message service in Seattle Privacy concerns fairly light (2) (2) Iachello, G., et al. Control, Deception, and Communication: Evaluating the Deployment of a Location-Enhanced Messaging Service. in UbiComp 2005: Ubiquitous Computing Tokyo, Japan. (3) Kaasinen, E., User Needs for Location- Aware Mobile Services. Personal and Ubiquitous Computing, (1): p Finland interviews on location-aware services “It did not occur to most of the interviewees that they could be located while using the service.” (3)

Documented Privacy Leaks How Cell Phone Helped Cops Nail Key Murder Suspect – Secret “Pings” that Gave Bouncer Away New York, NY, March 15, 2006 Stalker Victims Should Check For GPS Milwaukee, WI, February 6, 2003 A Face Is Exposed for AOL Searcher No New York, NY, August 9, 2006 Real time celebrity sightings

Subtleties of Location Privacy (1) Barkhuus, L., Privacy in Location-Based Services, Concern vs. Coolness, in Workshop on Location System Privacy and Control, Mobile HCI : Glasgow, UK. Interviews of location based services users Less worry about location privacy in closed campus (1) Interviews in 5 EU countries Price for location varied depending on intended use (2) (2) Cvrček, D., et al., A Study on The Value of Location Privacy, in Fifth ACM Workshop on Privacy in the Electronic Society. 2006, ACM: Alexandria, Virginia, USA. p Greeks significantly more concerned about location privacy Study two months after wiretapping of Greek politicians (2)

Outline Why reveal your location? Do people care about location privacy? Computational location privacy threats Computational countermeasures Quantifying location privacy Research issues

Computational Location Privacy Threats Not computational: stalking, spying, peeping Not computational: browsing geocoded images Not computational: browsing GPS tracks

Significant Locations From GPS Traces comMotion (Marmasse & Schmandt, 2000) consistent loss of GPS signal → salient location user gives label (e.g. “Grandma’s”) Ashbrook & Starner, 2003 cluster places with lost GPS signal user gives label Kang, Welbourne, Stewart, & Borriello, 2004 time-based clustering of GPS (lat,long) Project Lachesis (Hariharan & Toyama, 2004) time/space clustering hierarchical Common aim: find user’s significant locations, e.g. home, work

Context Inference Patterson, Liao, Fox & Kautz, 2003 GPS traces Infer mode of transportation (bus, foot, car) Route prediction Krumm, Letchner & Horvitz, 2006 Noisy GPS matched to road driven Constraints from speed & road connectivity Predestination (Krumm & Horvitz, 2006) Predict destination Extends privacy attack into future Location says a lot about you

Context Inference - Wow Indoor location sensors Machine learning to infer these properties based only on time-stamped location history IJCAI 2007 Good:TEAM, ROOM OK:AGE, COFFEE, SMOKING Bad:POSITION, WORK FREQUENCY

Location is Quasi-Identifier Quasi-Identifier – “their values, in combination, can be linked with external information to reidentify the respondents to whom the information refers. A typical example of a single- attribute quasi-identifier is the Social Security Number, since knowing its value and having access to external sources it is possible to identify a specific individual.” Secure Data Management, VLDB workshop, 2005

Simulated Location Privacy Attack 1 IEEE Pervasive Computing Magazine, Jan/March 2003 Active BAT indoor location system Experiment Attach pseudonym to each person’s location history Check Where does person spend majority of time? Who spends most time at any given desk? Found correct name of all participants

Simulated Location Privacy Attack 2 IEEE Pervasive Computing Magazine, Oct/Dec 2006 Experiment GPS histories from 65 drivers Cluster points at stops Homes are clusters 4 p.m. – midnight Found plausible homes of 85%

Simulated Location Privacy Attack 3 Pervasive 2007 GPS Tracks (172 people) Home Location (61 meters) Home Address (12%) Identity (5%) MapPoint Web Service reverse geocoding Windows Live Search reverse white pages

Simulated Location Privacy Attack 4 Security in Pervasive Computing, 2005 Three GPS traces with no ID or pseudonym Successful data association from physical constraints From “multi-target tracking“ algorithms originally designed for military tracking

Simulated Location Privacy Attack 5 Pervasive, 2005 Home with three occupants Two-state sensors Continuity analysis on thousands of sensor readings 85% correct data association

Simulated Location Privacy Attack 6 GIScience 2006 Refinement operators for working around obfuscated location data originalσ= 50 meters noise added Example refinement sources Must stay on connected graph of locations Movements are goal-directed Maximum speed constraint

Outline Why reveal your location? Do people care about location privacy? Computational location privacy threats Computational countermeasures Quantifying location privacy Research issues

Computational Countermeasures Dynamic & Mobile GIS: Investigating Change in Space and Time, CRC Press, 2006 Four ways to enhance location privacy 1.Regulations – govt. enforced 2.Policies – trust-based agreements 3.Anonymity – pseudonyms and/or ambiguity 4.Obfuscation – reduce quality of data

Computational Countermeasures: Pseudonyms Pseudonimity Replace owner name of each point with untraceable ID One unique ID for each owner Example “Larry Page” → “yellow” “Bill Gates” → “red” Beresford & Stajano (2003) propose frequently changing pseudonym Gruteser & Hoh (2005) showed “multi-target tracking” techniques defeat complete anonymity

Computational Countermeasures: k-Anonymity I’m chicken # 341, and I’m in this building (along with k-1 other chickens). k-anonymity introduced for location privacy by Gruteser & Grunwald, 2003 They note that temporal ambiguity also gives k-anonymity Pattern of service requests could break k-anonymity (Bettini, Wang, Jajodia 2005) I’m chicken # 341, and I visited this place in the past 21 minutes (along with k-1 other chickens).

Computational Countermeasures: Mix Zones Beresford & Stajano, 2003 New, unused pseudonym given when user is between “application zones” “k-anonymous” when you can be confused with k-1 other people Anonymity (i.e. k) varies with busyness of mix zone Attack by trying to list all pseudonyms given to a person Can use probabilistic paths to associate pseudonyms

Computational Countermeasures: False Reports Pervasive Services, 2005 false true false Mix true location report with multiple false reports Act only on response from true report Communication overhead (addressed in paper) Attack by finding most sensible sequence of location reports Counter by making false sequences sensible (addressed in paper) (fun research project)

Computational Countermeasures: Obfuscation Pervasive 2005 originallow accuracylow precision Formalizes obfuscation techniques Client & server can negotiate what needs to be revealed for successful location based service (from Krumm 2007)

Computational Countermeasures: Obfuscation Conclusion: need lots of obfuscation to counter privacy attack

Computational Countermeasures: Obfuscation SECURECOMM 2005 Confuse the multi-target tracker by perturbing paths so they cross

Outline Why reveal your location? Do people care about location privacy? Computational location privacy threats Computational countermeasures Quantifying location privacy Research issues

Quantifying Location Privacy location privacy quality of service (QoS) You have a friend in this room. You have a friend on this block. Somewhere, you have a friend. How do you measure the x axis?

Quantifying Location Privacy SECURECOMM 2005 Location privacy = expected error in attacker’s estimate of location Simple to understand, easy to compute Ignores semantics of (lat,long), e.g. vs.

Quantifying Location Privacy location privacy = accuracy of location data Same semantic problems as previous

Quantifying Location Privacy COSIT 2005 You: I am somewhere in this circle Server: Given this, I can narrow down the nearest gas station to three possibilities location privacy ~= size of circle

Quantifying Location Privacy location privacy = k I’m chicken # 341, and I’m in this building (along with k-1 other chickens). k-anonymity Mobisys 2003

Quantifying Location Privacy Beresford & Stanjano, IEEE Pervasive Computing Magazine, 2003 location privacy = entropy in location estimate p(cathedral)p(Hooters)entropy

Outline Why reveal your location? Do people care about location privacy? Computational location privacy threats Computational countermeasures Quantifying location privacy Research issues

Research Opportunities Privacy Attitudes – In the abstract, people don’t care. But attitudes depend on many things. What are the dependencies and how strong? Privacy Attacks – Do one to raise consciousness of problem Inference Attacks – Find weaknesses in proposed algorithms Hacker Challenge – Challenge people to break your scheme False Location Reports – simulate actual motion to make it plausible. Arms race between white hats and black hats. Location Privacy vs. QoS – Tradeoff location privacy for quality of service Quantify Location Privacy – find a way that matches perceptions 16 th USENIX Security Symposium, 2007

End