1 SpaceTwist: A Flexible Approach for Hiding Query User Location Speaker: Man Lung Yiu Aalborg University Joint work with Christian S. Jensen, Xuegang.

Slides:



Advertisements
Similar presentations
Efficient Evaluation of k-Range Nearest Neighbor Queries in Road Networks Jie BaoChi-Yin ChowMohamed F. Mokbel Department of Computer Science and Engineering.
Advertisements

Nearest Neighbor Search in High Dimensions Seminar in Algorithms and Geometry Mica Arie-Nachimson and Daniel Glasner April 2009.
Quality Aware Privacy Protection for Location-based Services Zhen Xiao, Xiaofeng Meng Renmin University of China Jianliang Xu Hong Kong Baptist University.
Efficient access to TIN Regular square grid TIN Efficient access to TIN Let q := (x, y) be a point. We want to estimate an elevation at a point q: 1. should.
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 7.3 Secure and Resilient Location Discovery in Wireless.
Packet Leashes: Defense Against Wormhole Attacks Authors: Yih-Chun Hu (CMU), Adrian Perrig (CMU), David Johnson (Rice)
PrivacyGrid Visualization Balaji Palanisamy Saurabh Taneja.
Mohamed F. Mokbel University of Minnesota
Effectively Indexing Uncertain Moving Objects for Predictive Queries School of Computing National University of Singapore Department of Computer Science.
A Crowd-Enabled Approach for Efficient Processing of Nearest Neighbor Queries in Incomplete Databases Samia Kabir, Mehnaz Tabassum Mahin Department of.
A Generic Framework for Handling Uncertain Data with Local Correlations Xiang Lian and Lei Chen Department of Computer Science and Engineering The Hong.
Spatial Data Security Methods Avinash Kumar Sahu Under Guidance of Prof. (Mrs.) P. Venkatachalam Centre of Studies in Resources Engineering Indian Institute.
Wireless Broadcasting with Optimized Transmission Efficiency Jehn-Ruey Jiang and Yung-Liang Lai National Central University, Taiwan.
Location Privacy in Casper: A Tale of two Systems
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
Spatio-temporal Databases Time Parameterized Queries.
Optimization of Spatial Joins on Mobile Devices N. Mamoulis 1, P. Kalnis 2, S. Bakiras 3, X. Li 2 1 Department of Computer Science and Information Systems,
1 Jun Wang, 2 Sanjiv Kumar, and 1 Shih-Fu Chang 1 Columbia University, New York, USA 2 Google Research, New York, USA Sequential Projection Learning for.
A Trust Based Assess Control Framework for P2P File-Sharing System Speaker : Jia-Hui Huang Adviser : Kai-Wei Ke Date : 2004 / 3 / 15.
1 SINA: Scalable Incremental Processing of Continuous Queries in Spatio-temporal Databases Mohamed F. Mokbel, Xiaopeng Xiong, Walid G. Aref Presented by.
Computer Science Approximately Uniform Random Sampling in Sensor Networks Boulat A. Bash, John W. Byers and Jeffrey Considine.
Tracking Moving Objects in Anonymized Trajectories Nikolay Vyahhi 1, Spiridon Bakiras 2, Panos Kalnis 3, and Gabriel Ghinita 3 1 St. Petersburg State University.
1 SINA: Scalable Incremental Processing of Continuous Queries in Spatio-temporal Databases Mohamed F. Mokbel, Xiaopeng Xiong, Walid G. Aref Presented by.
1 Location-Based Services Using GSM Cell Information over Symbian OS Final Year Project LYU0301 Mok Ming Fai (mfmok1) Lee Kwok Chau (leekc1)
Laurent Itti: CS599 – Computational Architectures in Biological Vision, USC Lecture 7: Coding and Representation 1 Computational Architectures in.
MobiHide: A Mobile Peer-to-Peer System for Anonymous Location-Based Queries Gabriel Ghinita, Panos Kalnis, Spiros Skiadopoulos National University of Singapore.
Trip Planning Queries F. Li, D. Cheng, M. Hadjieleftheriou, G. Kollios, S.-H. Teng Boston University.
PRIVACY CRITERIA. Roadmap Privacy in Data mining Mobile privacy (k-e) – anonymity (c-k) – safety Privacy skyline.
C LOAKING AND M ODELING T ECHNIQUES FOR LOCATION P RIVACY PROTECTION Ying Cai Department of Computer Science Iowa State University Ames, IA
Image Based Positioning System Ankit Gupta Rahul Garg Ryan Kaminsky.
Research Overview Kyriakos Mouratidis Assistant Professor School of Information Systems Singapore Management University
Gabriel Ghinita1 Panos Kalnis1 Ali Khoshgozaran2 Cyrus Shahabi2
Privacy Preserving Data Mining on Moving Object Trajectories Győző Gidófalvi Geomatic ApS Center for Geoinformatik Xuegang Harry Huang Torben Bach Pedersen.
VLDB '2006 Haibo Hu (Hong Kong Baptist University, Hong Kong) Dik Lun Lee (Hong Kong University of Science and Technology, Hong Kong) Victor.
Christian S. Jensen joint work with Man Lung Yiu, Hua Lu, Jesper Møller, Gabriel Ghinita, and Panos Kalnis Privacy for Spatial Queries.
Location Privacy CompSci Instructor: Ashwin Machanavajjhala Some slides are from a tutorial by Mohamed Mokbel (ICDM 2008) Lecture 19: Fall.
Content-Based Music Information Retrieval in Wireless Ad-hoc Networks.
Energy-Aware Scheduling with Quality of Surveillance Guarantee in Wireless Sensor Networks Jaehoon Jeong, Sarah Sharafkandi and David H.C. Du Dept. of.
Systems and Internet Infrastructure Security (SIIS) LaboratoryPage Systems and Internet Infrastructure Security Network and Security Research Center Department.
ACOMP 2011 A Novel Framework for LBS Privacy Preservation in Dynamic Context Environment.
This document is for academic purposes only. © 2012 Department of Computer Science, Hong Kong Baptist University. All rights reserved. 1 Authenticating.
Efficient Processing of Top-k Spatial Preference Queries
Spatio-temporal Pattern Queries M. Hadjieleftheriou G. Kollios P. Bakalov V. J. Tsotras.
Preserving Privacy in GPS Traces via Uncertainty- Aware Path Cloaking Baik Hoh, Marco Gruteser, Hui Xiong, Ansaf Alrabady Presented by Joseph T. Meyerowitz.
On Computing Top-t Influential Spatial Sites Authors: T. Xia, D. Zhang, E. Kanoulas, Y.Du Northeastern University, USA Appeared in: VLDB 2005 Presenter:
9/2/2005VLDB 2005, Trondheim, Norway1 On Computing Top-t Most Influential Spatial Sites Tian Xia, Donghui Zhang, Evangelos Kanoulas, Yang Du Northeastern.
Wei-Shinn Ku Slide 1 Auburn University Computer Science and Software Engineering Query Integrity Assurance of Location-based Services Accessing Outsourced.
Geo-Indistinguishability: Differential Privacy for Location Based Services Miguel Andres, Nicolas Bordenabe, Konstantinos Chatzikokolakis, Catuscia Palamidessi.
Monitoring k-NN Queries over Moving Objects Xiaohui Yu University of Toronto Joint work with Ken Pu and Nick Koudas.
A Hybrid Technique for Private Location-Based Queries with Database Protection Gabriel Ghinita 1 Panos Kalnis 2 Murat Kantarcioglu 3 Elisa Bertino 1 1.
1 30 November 2006 An Efficient Nearest Neighbor (NN) Algorithm for Peer-to-Peer (P2P) Settings Ahmed Sabbir Arif Graduate Student, York University.
Bloom Cookies: Web Search Personalization without User Tracking Authors: Nitesh Mor, Oriana Riva, Suman Nath, and John Kubiatowicz Presented by Ben Summers.
Preserving Privacy GPS Traces via Uncertainty-Aware Path Cloaking Baik Hoh, Marco Gruteser, Hui Xiong, Ansaf Alrabady Presenter:Yao Lu ECE 256, Spring.
Location Privacy Protection for Location-based Services CS587x Lecture Department of Computer Science Iowa State University.
Probabilistic km-anonymity (Efficient Anonymization of Large Set-valued Datasets) Gergely Acs (INRIA) Jagdish Achara (INRIA)
Indexing Time Series. Outline Spatial Databases Temporal Databases Spatio-temporal Databases Multimedia Databases Time Series databases Text databases.
Spatial Range Querying for Gaussian-Based Imprecise Query Objects Yoshiharu Ishikawa, Yuichi Iijima Nagoya University Jeffrey Xu Yu The Chinese University.
Secure Data Outsourcing
Similarity Measurement and Detection of Video Sequences Chu-Hong HOI Supervisor: Prof. Michael R. LYU Marker: Prof. Yiu Sang MOON 25 April, 2003 Dept.
Privacy Vulnerability of Published Anonymous Mobility Traces Chris Y. T. Ma, David K. Y. Yau, Nung Kwan Yip (Purdue University) Nageswara S. V. Rao (Oak.
Center for E-Business Technology Seoul National University Seoul, Korea Private Queries in Location Based Services: Anonymizers are not Necessary Gabriel.
 A Two-level Protocol to Answer Private Location-based Queries Roopa Vishwanathan Yan Huang [RoopaVishwanathan, Computer Science and.
Gabriel Ghinita1 Panos Kalnis1 Ali Khoshgozaran2 Cyrus Shahabi2
SIMILARITY SEARCH The Metric Space Approach
Feeling-based location privacy protection for LBS
Preference Query Evaluation Over Expensive Attributes
Location Privacy.
Spatio-temporal Pattern Queries
Efficient Evaluation of k-NN Queries Using Spatial Mashups
Efficient Processing of Top-k Spatial Preference Queries
Presentation transcript:

1 SpaceTwist: A Flexible Approach for Hiding Query User Location Speaker: Man Lung Yiu Aalborg University Joint work with Christian S. Jensen, Xuegang Huang, Hua Lu

2 Outline Motivation Related work Our solution and its privacy analysis Experimental results Conclusions

3 Why location privacy? Queries in location-based services (LBS) POI Points-of-interest (e.g., cinema locations) Nearest neighbor (NN) query Find the closest POI to user location q Client-server architecture Client (user) sends the point q to server (LBS server) Server reports the result (i.e., p 1 ) back to client Server may not be trusted clientserver What should I do? Want to find my result Don ’ t want to leak my location

4 Related work: spatial cloaking Extend the point q into a cloaked region Q’ K-anonymous region, trusted anonymizer [Mokbel et al., 2006] Other types: dummy, obfuscation Other architectures: peer communication, client itself Server receives Q’ (instead of q) Computes a candidate result set that contains the result of any possible query location in Q’ Example: candidate set: {p 1, p 2, p 3, p 4, p 5, p 6 } Returns the candidate result set Disadvantages Server incurs high processing and communication cost Requires specialized query processing algorithms, not readily implemented in existing LBS servers Anonymizer LBS server

5 Related work: transformation-based matching Evaluates the query in a transformed space No guarantee for the exact result Theoretical study [Indyk et al., 2006] A protocol with asymptotic communication cost  N Hilbert transformation [Khoshgozaran et al., 2007] Key ( H ) for specifying the Hilbert ordering, known by client and a trusted entity but not server Preprocessing: a trusted entity converts each point p (e.g., restaurant) to the value H (p), uploads it to server Query time: client sends H (q) to server, which reports the closest Hilbert value to H (q), client decodes the reported value into the result location Double Hilbert curve, improve result accuracy drawbacks

6 Features of our solution Our solution (SpaceTwist) retrieves POI’s from the server incrementally until the client is guaranteed to have accurate results Fundamental differences from previous approaches No cloaked region (unlike spatial cloaking) Query evaluated in the original space (unlike transformation-based matching) Readily applicable on existing systems Simple client-server architecture (i.e., no trusted components, peers) Simple server-side query processing: incremental nearest neighbor search Granular search (optional server-side functionality) Reduces communication cost but guarantees accuracy bound of results Spatial cloaking incurs high cost at the server Transformation-based matching does not offer result accuracy guarantees

7 SpaceTwist: overview Anchor location (fake client location) Define an ordering of points in the space Client fetches points from server incrementally Supply space Space of objects retrieved from the server Supply space known by both server and client Grows as more objects retrieved Demand space Target space guaranteed to cover the actual result Demand space known only by client Shrinks when a “better” result is found Termination: supply space contains the demand space the beginning the end

8 Transmission of points Communication cost number of packets received by the client Points are sent from server to client through (TCP/IP) packets Inefficient to use one packet for one point Multiple points are packed into a packet before transmission Packet capacity  : number of points in a packet Actual value of  ? Depends on Maximum Transmission Unit (MTU) Our experiments: MTU=576 bytes, and  =67

9 SpaceTwist: example Input: user location q, anchor location q’ Client asks server to report points in ascending distance from anchor q’ iteratively [Hjaltason et al. 1999] Note: server only knows q’ and reported points Supply space radius , initially 0 Distance of the current reported point from anchor q’ Demand space radius , initially  Nearest neighbor distance to user (found so far) Update  to dist(q,p) when a point p closer to q is found Stop when dist(q,q’) +  ≤  Supply space covers demand space Guarantee that exact nearest neighbor of q found 1 st point 2 nd point 3 rd point

10 Privacy analysis What does the server (malicious attacker) know? Anchor location q’ Reported points (in reported order): p 1, p 2, …, p m  Termination condition: dist(q,q’) +  ≤  Possible query location q c Client did not stop at the point p (m-1)  dist(q c, q’) + min{ dist(q c, p i ) : i  [1,(m-1)  ] } > dist(q’, p (m-1)  ) Client stops at the point p m  dist(q c, q’) + min{ dist(q c, p i ) : i  [1,m  ] } ≤ dist(q’, p m  ) Inferred privacy region  : the set of all possible q c Quantification of privacy Privacy value:  (q,  ) = average dist. of location in  from q …… 1 2 m m-1

11 Visualization of  Visualization with different types of points Characteristics of  (i.e., possible locations q c ) A ring with center at q’ Radius approx. dist(q,q’) What if the server considers searching on a small sample instead of the whole dataset Low communication cost  becomes large at low data density But less accurate result How this can be done?  =4 coarser granularity

12 Granular search requirement Granular search: search POI’s at coarser granularity Advantages Reduce communication cost Enhance location privacy protection Accuracy requirement User specifies an error bound  A point p  P is a relaxed NN of q if dist(q, p)   + min { dist(q, p’) : p’  P } Actual NN distance

13 Granular search Given an error bound , impose a grid in the space with cell length =  /  2 As in incremental search, the server still reports points in ascending distance from anchor q’ Server discards a data point p if it falls in the same cell of any reported point With granular searching (anchor q’) Server reports p 1, client updates its NN to p 1 Server discards p 2, p 3 Server reports p 4, client updates its NN to p 4 Client receives fewer points and has a larger inferred privacy region  regular grid

14 Granular search implementation Materialization of results not feasible Error bound  only known at query time Different users specify different values of  Data points are indexed by a (disk-based) R-tree on server We extend the incremental NN search [Hjaltason et al. 1999] Use a cell list V to keep track of the cells of reported points Discard entries or points that are fully covered by cells in V Remove cells in V when they are not useful anymore

15 Parameter selection guide Appropriate parameter values for the user (client)? Error bound  Set  = v max  t max based on t max : maximum time delay acceptable by user v max : maximum travel speed (walking, cycling, driving) Anchor point q’ Decide the anchor distance dist(q, q’) Based on privacy value, i.e., privacy value at least dist(q, q’) Or, based on acceptable value of m (communication cost) Set the anchor q’ to a random location with distance dist(q, q’) from q

16 Experimental study Our solution GST (Granular SpaceTwist) Client-side: SpaceTwist ; Server-side: granular search Spatial datasets (domain: [0,10000] 2 ) Two real datasets: SC ( pts), TG ( pts) Synthetic uniform random UI datasets Performance metrics (workload size=100) Communication cost (in number of packets) Result error (result NN distance – actual NN distance) Privacy value of inferred privacy region  Default parameter values Anchor distance dist(q,q’): 200 Error bound  : 200, Data size N (million): 0.5 packet capacity=67, derived from MTU

17 Transformation-based matching vs. GST Hilbert transformation [Khoshgozaran et al., 2007] SHB: single Hilbert curve DHB: two orthogonal Hilbert curves GST computes result with low error Very low error on real data (skewed) distribution Stable error for different data distribution result error

18 Spatial cloaking vs. GST Our problem setting: no trusted middleware Competitor: client-side spatial cloaking (CLK) Trusted third party cloaking not applicable to our problem! CLK: enlarge q into a square with side length 2*dist(q,q’) Extent comparable to inferred privacy region  of GST GST produces result at low communication cost Low cost even at high privacy Cost independent of N varying dist(q,q ’ ) varying data size N communication cost (# of packets)

19 Effect of error bound communication cost result error privacy value

20 Effect of anchor distance result error privacy value communication cost

21 Effect of data size (UI data only) result error privacy value communication cost

22 Conclusion Develop a novel solution for protecting location privacy of query users SpaceTwist at client Granular search at server Advantages Low communication cost (due to granular searching) Low result error Sufficient privacy protection Future work Extension for other location based queries Road network application

23 References M. F. Mokbel, C.-Y. Chow, and W. G. Aref. The New Casper: Query Processing for Location Services without Compromising Privacy. In VLDB, P. Indyk and D.Woodruff. Polylogarithmic Private Approximations and Efficient Matching. In Theory of Cryptography Conference, A. Khoshgozaran and C. Shahabi. Blind Evaluation of Nearest Neighbor Queries Using Space Transformation to Preserve Location Privacy. In SSTD, G. R. Hjaltason and H. Samet. Distance Browsing in Spatial Databases. TODS, 24(2):265–318, 1999.