Preserving Privacy in Participatory Sensing Systems Authors: Kuan Lun Huang, Salil S. Kanhere (School of CS & Engg., The University of New South Wales,

Slides:



Advertisements
Similar presentations
Cipher Techniques to Protect Anonymized Mobility Traces from Privacy Attacks Chris Y. T. Ma, David K. Y. Yau, Nung Kwan Yip and Nageswara S. V. Rao.
Advertisements

Protecting Location Privacy: Optimal Strategy against Localization Attacks Reza Shokri, George Theodorakopoulos, Carmela Troncoso, Jean-Pierre Hubaux,
Virtual Trip Lines for Distributed Privacy-Preserving Traffic Monitoring Baik Hoh, Marco Gruteser WINLAB / ECE Dept., Rutgers University Ryan Herring,
Ear-Phone: An End-to-End Participatory Urban Noise Mapping System -Rajib Kumar Rana, Chun Tung Chou, Salil S. Kanhere, Nirupama Bulusu, Wen Hu -School.
Presenter: Nguyen Ba Anh HCMC University of Technology Information System Security Course.
AnonySense: Privacy- Aware People-Centric Sensing Authors: Cory Cornelius, Apu Kapadia, David Kotz, Dan Peebles, Minho Shin (Inst. For Security Tech. Studies,
Claudia Diaz, Hannelore Dekeyser, Markulf Kohlweiss, Girma Nigusse K.U.Leuven IDIS Workshop 29/05/2008 [Work done in the context of the ADAPID project]
Location Based Trust for Mobile User – Generated Content : Applications, Challenges and Implementations Presented By : Anand Dipakkumar Joshi USC.
T OWARDS P RIVACY -S ENSITIVE P ARTICIPATORY S ENSING K.L. Huang, S. S. Kanhere and W. Hu Presented by Richard Lin Zhou.
Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
Quantifying Location Privacy: The Case of Sporadic Location Exposure Reza Shokri George Theodorakopoulos George Danezis Jean-Pierre Hubaux Jean-Yves Le.
PrivacyGrid Visualization Balaji Palanisamy Saurabh Taneja.
Fast Data Anonymization with Low Information Loss 1 National University of Singapore 2 Hong Kong University
Privacy Preserving in Ubiquitous Computing: Architecture Information Technology Journal 8 (6): , 2009 Tinghuai Ma, Sen Yang, Wei Tian, Wenjie Liu.
Trust Establishment in Pervasive Grid Environments Syed Naqvi, Michel Riguidel TÉLÉCOM PARIS ÉNST É cole N ationale S upérieur des T élécommunications.
1 A Distortion-based Metric for Location Privacy Workshop on Privacy in the Electronic Society (WPES), Chicago, IL, USA - November 9, 2009 Reza Shokri.
Anatomy: Simple and Effective Privacy Preservation Israel Chernyak DB Seminar (winter 2009)
APPLAUS: A Privacy-Preserving Location Proof Updating System for Location-based Services Zhichao Zhu and Guohong Cao Department of Computer Science and.
AnonySense: Privacy-Aware People-Centric Sensing Cory Conelius, Apu Kapadia, David Kotz, Dan Peebles, Minho Shin [Institute for Security Technology Studies.
PRIVACY CRITERIA. Roadmap Privacy in Data mining Mobile privacy (k-e) – anonymity (c-k) – safety Privacy skyline.
Quality Control Measurements for GIS data Presented by Amal Babour Kent State University
XACML Gyanasekaran Radhakrishnan. Raviteja Kadiyam.
An Intelligent Broker Architecture for Context-Aware Systems A PhD. Dissertation Proposal in Computer Science at the University of Maryland Baltimore County.
Location Privacy Location privacy in mobile systems: A personalized Anonymization Model Burga Gedik, Ling Liu.
A Survey on Context-Aware Computing Center for E-Business Technology Seoul National University Seoul, Korea 이상근, 이동주, 강승석, Babar Tareen Intelligent Database.
1. Human – the end-user of a program – the others in the organization Computer – the machine the program runs on – often split between clients & servers.
Presented by: Z.G. Huang May 04, 2011 Did You See Bob? Human Localization using Mobile Phones Romit Roy Choudhury Duke University Durham, NC, USA Ionut.
Satellites in Our Pockets: An Object Positioning System using Smartphones Justin Manweiler, Puneet Jain, Romit Roy Choudhury TsungYun
Opportunistic Sensing: Security Challenges for the New Paradigm Michael Betancourt UCF - EEL 6788 Dr. Turgut Apu Kapadia MIT Lincoln Laboratory David Kotz.
Overview of Privacy Preserving Techniques.  This is a high-level summary of the state-of-the-art privacy preserving techniques and research areas  Focus.
UNIVERSITY of NOTRE DAME COLLEGE of ENGINEERING Preserving Location Privacy on the Release of Large-scale Mobility Data Xueheng Hu, Aaron D. Striegel Department.
Quantifying Location Privacy Reza Shokri George Theodorakopoulos Jean-Yves Le Boudec Jean-Pierre Hubaux May 2011.
Preserving Link Privacy in Social Network Based Systems Prateek Mittal University of California, Berkeley Charalampos Papamanthou.
APPLYING EPSILON-DIFFERENTIAL PRIVATE QUERY LOG RELEASING SCHEME TO DOCUMENT RETRIEVAL Sicong Zhang, Hui Yang, Lisa Singh Georgetown University August.
Participatory Sensing in Commerce: Using Mobile Phones to Track Market Price Dispersion Nirupama Bulusu (Portland State University) Chun Tung Chou, Salil.
Differentially Private Data Release for Data Mining Noman Mohammed*, Rui Chen*, Benjamin C. M. Fung*, Philip S. Yu + *Concordia University, Montreal, Canada.
Protecting Sensitive Labels in Social Network Data Anonymization.
Refined privacy models
Hiding in the Mobile Crowd: Location Privacy through Collaboration.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data.
Data Warehousing Data Mining Privacy. Reading Bhavani Thuraisingham, Murat Kantarcioglu, and Srinivasan Iyer Extended RBAC-design and implementation.
Survey on Privacy-Related Technologies Presented by Richard Lin Zhou.
ACOMP 2011 A Novel Framework for LBS Privacy Preservation in Dynamic Context Environment.
Data Anonymization – Introduction and k-anonymity Li Xiong CS573 Data Privacy and Security.
Randomization in Privacy Preserving Data Mining Agrawal, R., and Srikant, R. Privacy-Preserving Data Mining, ACM SIGMOD’00 the following slides include.
A Mobile Terminal Based Trajectory Preserving Strategy for Continuous Querying LBS Users Yunxia Feng, Peng Liu, Jianhui Zhang May , 2012 Hangzhou,
Privacy vs. Utility Xintao Wu University of North Carolina at Charlotte Nov 10, 2008.
Participatory Privacy: Enabling Privacy in Participatory Sensing
Virtual Trip Lines for Distributed Privacy- Preserving Traffic Monitoring Baik Hoh et al. MobiSys08 Slides based on Dr. Hoh’s MobiSys presentation.
1.Research Motivation 2.Existing Techniques 3.Proposed Technique 4.Limitations 5.Conclusion.
1 Privacy Aware Incentive Mechanism to Collect Mobile Data While Preventing Duplication Junggab Son*, Donghyun Kim*, Rasheed Hussain**, Sung-Sik Kwon*,
Privacy-preserving data publishing
CSCI 347, Data Mining Data Anonymization.
The world’s libraries. Connected. Managing your Private and Public Data: Bringing down Inference Attacks against your Privacy Group Meeting in 2015.
Provenance in Sensornet Republishing Unkyu Park and John Heidemann University of Southern California Information Science Institute June 18, 2008.
Privacy Preserving in Social Network Based System PRENTER: YI LIANG.
Unraveling an old cloak: k-anonymity for location privacy
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Reconciling Confidentiality Risk Measures from Statistics and Computer Science Jerry Reiter Department of Statistical Science Duke University.
Privacy Vulnerability of Published Anonymous Mobility Traces Chris Y. T. Ma, David K. Y. Yau, Nung Kwan Yip (Purdue University) Nageswara S. V. Rao (Oak.
Privacy Issues in Graph Data Publishing Summer intern: Qing Zhang (from NC State University) Mentors: Graham Cormode and Divesh Srivastava.
Xiaowei Ying, Kai Pan, Xintao Wu, Ling Guo Univ. of North Carolina at Charlotte SNA-KDD June 28, 2009, Paris, France Comparisons of Randomization and K-degree.
Presented by Edith Ngai MPhil Term 3 Presentation
Xiaokui Xiao and Yufei Tao Chinese University of Hong Kong
Location Privacy.
Micro-Blog - CS546 - Anoop Nimkar
A Unified Framework for Location Privacy
Refined privacy models
Presentation transcript:

Preserving Privacy in Participatory Sensing Systems Authors: Kuan Lun Huang, Salil S. Kanhere (School of CS & Engg., The University of New South Wales, Sydney, Australia), Wen Hu (Autonomous Systems Lab, CSIRO ICT Centre, Australia) Journal: Computer Communications (Vol 33 Issue 11, July ‘10) Publisher: Butterworth-Heinemann Newton, MA, USA (Partly published at PerSeNs ’09) Presented by: Sara Gaffar

Contents Introduction A review of AnonySense Related Work System Model & Motivating example Implementation & Evaluation Important References

Two Major Attributes This paper focuses on the spatial and temporal privacy of users, the two universal attributes expected to be included in user reports for all participatory sensing applications.

Assumptions The adversary does not know true values of time and location of user reports. However, the adversary has means to find out the temporal and spatial properties of his victims. The adversary is able to observe submitted reports (eavesdropping).

AnonySense Architecture

Tessellation & Generalization

Perturbation Techniques Microaggregation and VMDAV Interpretation by Application Server by Euclidean Distance: In the Euclidean plane, if p = (p1, p2) and q = (q1, q2) then the distance is given by:Euclidean plane d(p,q) = √(p1-q1)² + (p2-q2)²

Problems with k-anonymity Tessellation & Generalization Identity disclosure Attribute disclosure Background Knowledge Attack Homogeneity Attack The example of Bob L-diversity

System Model

Anonymization Server (AS)

Petrolwatch An application which allows users to collect, contribute and share fuel pricing information using camera phones. Fuel prices are annotated with location coordinates of the service station and the time at which the capture takes place, and uploaded to the application server. Users can query the server to locate the cheapest petrol station in their vicinity.

K-anonymous Privacy-Preserving Schemes Tessellation Tessellation with tile center reporting (TwTCR) Location anonymization with microaggregation - VMDAV Location anonymization with Hybrid microaggregation

VMDAV Pseudo code

Hybrid Microaggregation

VMDAV enables an application to make better decisions when user distributions across different areas are relatively consistent On the contrary, in areas with dense distribution of users, TwTCR performs better

Gaussian Input Perturbation Why trust the AS? Perturbation Scheme – Artificially distort a user’s location prior to updating the AS.

L-Diversity Spatial AND temporal privacy Homogeneity and background knowledge attack

Eg.: 3-Anonymous Petrolwatch

Example of 2-Diversity in terms of location

Two Issues Semantic relationship between locations Timing accuracy

LD-VMDAV

1 st Step:

2 nd Step:

Evaluation

Metrics Application accuracy: Positive Identification Percentage (PIP)

Errors introduced by anonymization – Information Loss (IL)

Hybrid-VMDAV Improves percentage of positive identifications made by an application server by up to 100% and decreases amount of information loss by about 40%

LD-VMDAV Vs k-anonymity

References Cory Cornelius, Apu Kapadia, David Kotz, Dan Peebles, Minho Shin, Nikos Triandopoulos, Anonysense: privacy-aware people-centric sensing, Proceeding of the 6th international conference on Mobile systems, applications, and services, June 17-20, 2008, Breckenridge, CO, USA Cory Cornelius, Apu Kapadia, David Kotz, Dan Peebles, Minho Shin, Nikos Triandopoulos, Anonysense: privacy-aware people-centric sensing, Proceeding of the 6th international conference on Mobile systems, applications, and services, June 17-20, 2008, Breckenridge, CO, USA A. Solanas, A Martinez-Baellest. V-MDAV: a multivariate microaggregation with variable group size, in: 17th COMPSTAT Symposium of the IASC, Rome, 2006.