Location Privacy Location privacy in mobile systems: A personalized Anonymization Model Burga Gedik, Ling Liu.

Slides:



Advertisements
Similar presentations
Cipher Techniques to Protect Anonymized Mobility Traces from Privacy Attacks Chris Y. T. Ma, David K. Y. Yau, Nung Kwan Yip and Nageswara S. V. Rao.
Advertisements

Location Based Services and Privacy Issues
Preserving Location Privacy Uichin Lee KAIST KSE Slides based on by Ling Liuhttp://
An Interactive-Voting Based Map Matching Algorithm
Efficient Evaluation of k-Range Nearest Neighbor Queries in Road Networks Jie BaoChi-Yin ChowMohamed F. Mokbel Department of Computer Science and Engineering.
Quality Aware Privacy Protection for Location-based Services Zhen Xiao, Xiaofeng Meng Renmin University of China Jianliang Xu Hong Kong Baptist University.
1 Efficient Self-Healing Group Key Distribution with Revocation Capability by Donggang Liu, Peng Ning, Kun Sun Presented by Haihui Huang
Bidding Protocols for Deploying Mobile Sensors Reporter: Po-Chung Shih Computer Science and Information Engineering Department Fu-Jen Catholic University.
Presenter: Nguyen Ba Anh HCMC University of Technology Information System Security Course.
1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.
PrivacyGrid Visualization Balaji Palanisamy Saurabh Taneja.
Mohamed F. Mokbel University of Minnesota
TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P Systems Aameek Singh and Ling Liu Presented by: Korporn Panyim.
1 Networking through Linux Partha Sarathi Dasgupta MIS Group Indian Institute of Management Calcutta.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
Privacy Preserving Publication of Moving Object Data Joey Lei CS295 Francesco Bonchi Yahoo! Research Avinguda Diagonal 177, Barcelona, Spain 6/10/20151CS295.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Maximal Independent Set Distributed Algorithms for Multi-Agent Networks Instructor: K. Sinan YILDIRIM.
A Customizable k-Anonymity Model for Protecting Location Privacy Written by: B. Gedik, L.Liu Presented by: Tal Shoseyov.
PRIVACY CRITERIA. Roadmap Privacy in Data mining Mobile privacy (k-e) – anonymity (c-k) – safety Privacy skyline.
C LOAKING AND M ODELING T ECHNIQUES FOR LOCATION P RIVACY PROTECTION Ying Cai Department of Computer Science Iowa State University Ames, IA
F EELING - BASED L OCATION P RIVACY P ROTECTION FOR L OCATION - BASED S ERVICES CS587x Lecture Department of Computer Science Iowa State University Ames,
Overview of Privacy Preserving Techniques.  This is a high-level summary of the state-of-the-art privacy preserving techniques and research areas  Focus.
Mobility Limited Flip-Based Sensor Networks Deployment Reporter: Po-Chung Shih Computer Science and Information Engineering Department Fu-Jen Catholic.
Efficient Gathering of Correlated Data in Sensor Networks
Preserving Link Privacy in Social Network Based Systems Prateek Mittal University of California, Berkeley Charalampos Papamanthou.
Privacy Preserving Data Mining on Moving Object Trajectories Győző Gidófalvi Geomatic ApS Center for Geoinformatik Xuegang Harry Huang Torben Bach Pedersen.
Network Aware Resource Allocation in Distributed Clouds.
C. Anagnostopoulos 1 K. Kolomvatsos 2 & S. Hadjiefthymiades 2 1 Ionian University, Corfu, Greece 2 National and Kapodistrian University of Athens, Greece.
WALKING IN FACEBOOK: A CASE STUDY OF UNBIASED SAMPLING OF OSNS junction.
Mobile Traffic Sensor Network versus Motion-MIX: Tracing and Protecting Mobile Wireless Nodes JieJun Kong Dapeng Wu Xiaoyan Hong and Mario Gerla.
1 Mobility Increases the Capacity of Ad-hoc Wireless Networks Matthias Grossglauser, David Tse IEEE Infocom 2001 (Best paper award) Oct 21, 2004 Som C.
1 Nasser Alsaedi. The ultimate goal for any computer system design are reliable execution of task and on time delivery of service. To increase system.
Preserving Privacy in Participatory Sensing Systems Authors: Kuan Lun Huang, Salil S. Kanhere (School of CS & Engg., The University of New South Wales,
Survey on Privacy-Related Technologies Presented by Richard Lin Zhou.
On the Age of Pseudonyms in Mobile Ad Hoc Networks Julien Freudiger, Mohammad Hossein Manshaei, Jean-Yves Le Boudec and Jean-Pierre Hubaux Infocom 2010.
JWITC 2013Jan. 19, On the Capacity of Distributed Antenna Systems Lin Dai City University of Hong Kong.
1 Hiding Stars with Fireworks: Location Privacy through Camouflage Joseph Meyerowitz Romit Roy Choudhury ECE and PhysicsDept. of ECE and CS.
A Mobile Terminal Based Trajectory Preserving Strategy for Continuous Querying LBS Users Yunxia Feng, Peng Liu, Jianhui Zhang May , 2012 Hangzhou,
Privacy Preserving In LBS
Preserving Privacy in GPS Traces via Uncertainty- Aware Path Cloaking Baik Hoh, Marco Gruteser, Hui Xiong, Ansaf Alrabady Presented by Joseph T. Meyerowitz.
Dual-Region Location Management for Mobile Ad Hoc Networks Yinan Li, Ing-ray Chen, Ding-chau Wang Presented by Youyou Cao.
Virtual Trip Lines for Distributed Privacy- Preserving Traffic Monitoring Baik Hoh et al. MobiSys08 Slides based on Dr. Hoh’s MobiSys presentation.
EEC 688/788 Secure and Dependable Computing Lecture 10 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
Distributed and hierarchical deadlock detection, deadlock resolution
Measuring Behavioral Trust in Social Networks
Privacy Preserving Payments in Credit Networks By: Moreno-Sanchez et al from Saarland University Presented By: Cody Watson Some Slides Borrowed From NDSS’15.
Privacy Protection in Social Networks Instructor: Assoc. Prof. Dr. DANG Tran Khanh Present : Bui Tien Duc Lam Van Dai Nguyen Viet Dang.
Building Dependable Distributed Systems, Copyright Wenbing Zhao
Vertex Coloring Distributed Algorithms for Multi-Agent Networks
Preserving Privacy GPS Traces via Uncertainty-Aware Path Cloaking Baik Hoh, Marco Gruteser, Hui Xiong, Ansaf Alrabady Presenter:Yao Lu ECE 256, Spring.
Location Privacy Protection for Location-based Services CS587x Lecture Department of Computer Science Iowa State University.
U of Minnesota DIWANS'061 Energy-Aware Scheduling with Quality of Surveillance Guarantee in Wireless Sensor Networks Jaehoon Jeong, Sarah Sharafkandi and.
Privacy Preserving in Social Network Based System PRENTER: YI LIANG.
Unraveling an old cloak: k-anonymity for location privacy
Toward Reliable and Efficient Reporting in Wireless Sensor Networks Authors: Fatma Bouabdallah Nizar Bouabdallah Raouf Boutaba.
Saving Bitrate vs. Users: Where is the Break-Even Point in Mobile Video Quality? ACM MM’11 Presenter: Piggy Date:
Similarity Measurement and Detection of Video Sequences Chu-Hong HOI Supervisor: Prof. Michael R. LYU Marker: Prof. Yiu Sang MOON 25 April, 2003 Dept.
Energy Efficient Detection of Compromised Nodes in Wireless Sensor Networks Haengrae Cho Department of Computer Engineering, Yeungnam University Gyungbuk.
SYNERGY: A Game-Theoretical Approach for Cooperative Key Generation in Wireless Networks Jingchao Sun, Xu Chen, Jinxue Zhang, Yanchao Zhang, and Junshan.
Privacy Vulnerability of Published Anonymous Mobility Traces Chris Y. T. Ma, David K. Y. Yau, Nung Kwan Yip (Purdue University) Nageswara S. V. Rao (Oak.
Introduction to Algorithms
Feeling-based location privacy protection for LBS
Location Cloaking for Location Safety Protection of Ad Hoc Networks
Visual Inspection Planning with Sensor Constraint Graph
Privacy and Fault-Tolerance in Distributed Optimization Nitin Vaidya University of Illinois at Urbana-Champaign.
Towards Measuring Anonymity
Graph-based Security and Privacy Analytics via Collective Classification with Joint Weight Learning and Propagation Binghui Wang, Jinyuan Jia, and Neil.
Presentation transcript:

Location Privacy Location privacy in mobile systems: A personalized Anonymization Model Burga Gedik, Ling Liu

Location privacy threats  An adversary learns the locations that a subjected visited as well as the times of visit.  Can receive clues about private information such as political affiliations, medical problems.  If a subject is identified at any point, her complete movement can be exposed.

K-anonymity  Originally introduced in the context of relational data privacy research.  In context of LBS, refers to k-anonymous usage of location information  A subject is considered k-anonymous with respect to location information if this location information is indistinguishable from the location information of at least k-1 other subjects.  The adversary will have uncertainty in matching the mobile node to a location-identity association  The uncertainty increases with increasing value of k.

Overview  To ensure that a subject is k-anonymous one can perturb the location information by replacing relatively large spatial region or by delaying the message long enough.  May result in poor quality of service.  Allow personalization: Enable each node to specify I.minimum level of anonymity it desires II.maximum temporal and spatial resolutions  Efficient message perturbation engine  Cliquecloak: spatio-temporal cloaking

Personalized location k-anonymity  Assumptions  LBS system consists of mobile nodes, wireless networks, anonymity servers and LBS servers.  Source of location information : GPS receiver in vehicle (includes time information as well)  Nodes communicate with third party LBS servers through anonymity servers.  Each node specifies anonymity level (k value), spatial tolerance and temporal tolerance.

 Spatial cloaking: Degree of location anonymity maintained by decreasing the location accuracy through enlarging the exposed spatial area such that there are k-1 mobile nodes present in the area.  Temporal cloaking : Location anonymity achieved by delaying the message until k nodes have visited the area located by message sender.

Set up  S: Set of messages received from the mobile nodes.  a message in set S is denoted by m s = (u id, r no ) sender's identifier and message reference number pair L(m s ) → {t,x,y} (spatio-temporal location point) K → anonymity level. (k=1 anonymity not required) {d t, d x, d y } → tolerances

Set up Let Φ(v,d)= [v-d,v+d] Spatio-temporal Constraint box of message m s denoted by B cn (m s ) Φ(m s.x, m s.d x ), Φ(m s.y, m s.d y ), Φ(m s.t, m s.d t ) Denote the set of perturbed (anonymized) messages as T message in T denoted by m t Spatio-temporal cloaking box of a perturbed message B cl (m t ) -> (m t.X:[x s,x e ], m t.Y:[y s,y e ], m t.I:[t s,t e ])

Basic propertiesthat must hold  Spatio-temporal Containment  Spatio-temporal Resolution  Content Preservation

Message perturbation engine Zoom-in Detection Perturbation Expiration

Data structures Message Queue (FIFO): collects messages sent from the mobile node Multi-dimensional index: contains a 3D point L(m s ) as key and m s as data. Expiration heap: A mean heap sorted based on the deadline of the messages

Constraint graph An undirected graph represented by G(S,E) S is the set of vertices, each representing a message received at the message perturbation en gine edge e = (m si, m sj ) ∈ E between two vertices m si and m sj, if and only if the following condition s hold: (i) L(m si ) ∈ B cn (m sj ), (ii) L(m sj ) ∈ B cn (m si ), (iii) m si.u id = m sj.u id m t is a valid perturbed message of m s if there exists an l-clique in the constraint grapg such tha t l>=m s.k

Cliquecloak theorem Let M = {m s1, m s2,..., m sl } be a set of messages in S. For each message m si in M, we defi ne m ti = m si.u id,m si.r no, B m (M ), m si.C. Then m ti,1 ≤ i ≤ l, is a valid perturbed format of m s i if a nd only if the set M of messages form an l-clique in the constraint graph G(S, E) with the additi onal condition that for any message m si in S, we have m si.k ≤ l (i.e. m si ’s user specified k value is not larger than the cardinality of the set M )

Optimizations Neighbor_k instead of local_k Deferred Cliquecloak vs Immediate Cliquecloak

Success rate : defined over a set S' ⊂ S of messages as the percentage of messages that are successfully anonymized. Relative anonymity level : measure of the level of anonymity provided by the cloaking algorith m, normalized by the level of anonymity required by the messages. Relative spatial resolution : measure of the spatial resolution provided by the cloaking algorith m, normalized by the minimum acceptable spatial resolution de-fined by the spatial tolerances Relative temporal resolution : measure of the temporal resolution provided by the cloaking alg orithm, normalized by the minimum acceptable temporal resolution de- fined by the temporal tolerances Evaluation metrics

Experiments Success rate Spatio-temporal resoluton Each message specifies an anonymity level (k value) from the list {5,4,3,2}

Success Rate Best average success rate achieved is arou nd 70% Success rate for messages with k=2 is aroun d 30% higher than the success rate for mess ages with k=5

Relative anonymity level Nbr-k shows relative anonymity level of 1.7 f or k=2. For local-k the value is 1.4

Message processing time

success rate vs spatial and temporal tolerances

Relative temporal and spatial resolution distributi on

THANK YOU