Related Works LOFConclusion Introduction Contents ICISS 20142.

Slides:



Advertisements
Similar presentations
Quality Aware Privacy Protection for Location-based Services Zhen Xiao, Xiaofeng Meng Renmin University of China Jianliang Xu Hong Kong Baptist University.
Advertisements

PIR-Tor: Scalable Anonymous Communication Using Private Information Retrieval Prateek Mittal University of Illinois Urbana-Champaign Joint work with: Femi.
Efficient Information Retrieval for Ranked Queries in Cost-Effective Cloud Environments Presenter: Qin Liu a,b Joint work with Chiu C. Tan b, Jie Wu b,
Presenter: Nguyen Ba Anh HCMC University of Technology Information System Security Course.
1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.
Quantifying Location Privacy: The Case of Sporadic Location Exposure Reza Shokri George Theodorakopoulos George Danezis Jean-Pierre Hubaux Jean-Yves Le.
Mohamed F. Mokbel University of Minnesota
1 A Distortion-based Metric for Location Privacy Workshop on Privacy in the Electronic Society (WPES), Chicago, IL, USA - November 9, 2009 Reza Shokri.
1 Placement of Continuous Media in Wireless Peer-to-Peer Networks Shahram Ghadeharizadeh, Bhaskar Krishnamachari, Shanshan Song, IEEE Transactions on Multimedia,
1 On the Anonymization of Sparse High-Dimensional Data 1 National University of Singapore 2 Chinese University of Hong.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
PRIVÉ : Anonymous Location-Based Queries in Distributed Mobile Systems 1 National University of Singapore 2 University.
MobiHide: A Mobile Peer-to-Peer System for Anonymous Location-Based Queries Gabriel Ghinita, Panos Kalnis, Spiros Skiadopoulos National University of Singapore.
A Customizable k-Anonymity Model for Protecting Location Privacy Written by: B. Gedik, L.Liu Presented by: Tal Shoseyov.
Cloud Usability Framework
CrowdSearch: Exploiting Crowds for Accurate Real-Time Image Search on Mobile Phones Original work by Yan, Kumar & Ganesan Presented by Tim Calloway.
ALBERT PARK EEL 6788: ADVANCED TOPICS IN COMPUTER NETWORKS Energy-Accuracy Trade-off for Continuous Mobile Device Location, In Proc. of the 8th International.
Joining the Future. Superfast Britain – What does this mean for you  High data connection both up and down  Not shared with other people  Business.
Location Privacy Location privacy in mobile systems: A personalized Anonymization Model Burga Gedik, Ling Liu.
R 18 G 65 B 145 R 0 G 201 B 255 R 104 G 113 B 122 R 216 G 217 B 218 R 168 G 187 B 192 Core and background colors: 1© Nokia Solutions and Networks 2014.
Cong Wang1, Qian Wang1, Kui Ren1 and Wenjing Lou2
Privacy and trust in social network
Overview of Privacy Preserving Techniques.  This is a high-level summary of the state-of-the-art privacy preserving techniques and research areas  Focus.
UNIVERSITY of NOTRE DAME COLLEGE of ENGINEERING Preserving Location Privacy on the Release of Large-scale Mobility Data Xueheng Hu, Aaron D. Striegel Department.
Gabriel Ghinita1 Panos Kalnis1 Ali Khoshgozaran2 Cyrus Shahabi2
Privacy Preserving Data Mining on Moving Object Trajectories Győző Gidófalvi Geomatic ApS Center for Geoinformatik Xuegang Harry Huang Torben Bach Pedersen.
APPLYING EPSILON-DIFFERENTIAL PRIVATE QUERY LOG RELEASING SCHEME TO DOCUMENT RETRIEVAL Sicong Zhang, Hui Yang, Lisa Singh Georgetown University August.
Solutions to Security and Privacy Issues in Mobile Social Networking
Software Architecture Framework for Ubiquitous Computing Divya ChanneGowda Athrey Joshi.
© 2009 Mobile VCE 6 October 2011 Core 4 Secure Applications ‘Instant Knowledge’ Programme Achievements Nigel Jefferies Huawei.
Master Thesis Defense Jan Fiedler 04/17/98
Introduction to: 1.  Goal[DEN83]:  Provide frequency, average, other statistics of persons  Challenge:  Preserving privacy[DEN83]  Interaction between.
Research at MSEC Vincent Naessens – Jorn Lapon – Jan Vossaert – Koen Decroix – Faysal Boukayoua – Laurens Lemaire.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
KAIS T Wireless Network Security and Interworking Minho Shin, et al. Proceedings of the IEEE, Vol. 94, No. 2, Feb Hyeongseop Shim NS Lab, Div. of.
Preserving Privacy in Participatory Sensing Systems Authors: Kuan Lun Huang, Salil S. Kanhere (School of CS & Engg., The University of New South Wales,
1 Collaborative Processing in Sensor Networks Lecture 2 - Mobile-agent-based Computing Hairong Qi, Associate Professor Electrical Engineering and Computer.
Collaborative Sampling in Wireless Sensor Networks Minglei Huang Yu Hen Hu 2010 IEEE Global Telecommunications Conference 1.
College of Engineering Robert Akl, D.Sc. Department of Computer Science and Engineering.
Privacy Preserving In LBS
György Kálmán, Josef Noll IEEE Symposium on Wireless Pervasive Computing, Santorini, Greece Speaker: 黃韋綸 User Controlled Content Access.
1.Research Motivation 2.Existing Techniques 3.Proposed Technique 4.Limitations 5.Conclusion.
Privacy Preserving Payments in Credit Networks By: Moreno-Sanchez et al from Saarland University Presented By: Cody Watson Some Slides Borrowed From NDSS’15.
A Hybrid Technique for Private Location-Based Queries with Database Protection Gabriel Ghinita 1 Panos Kalnis 2 Murat Kantarcioglu 3 Elisa Bertino 1 1.
Security Issues in Distributed Sensor Networks Yi Sun Department of Computer Science and Electrical Engineering University of Maryland, Baltimore County.
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
Bloom Cookies: Web Search Personalization without User Tracking Authors: Nitesh Mor, Oriana Riva, Suman Nath, and John Kubiatowicz Presented by Ben Summers.
EVALUATING LBS PRIVACY IN DYNAMIC CONTEXT 1. Outline 2  Overview Attack Model  Classification Defend Model  Evaluation Module  Conclusion.
Location Privacy Protection for Location-based Services CS587x Lecture Department of Computer Science Iowa State University.
Efficient Resource Allocation for Wireless Multicast De-Nian Yang, Member, IEEE Ming-Syan Chen, Fellow, IEEE IEEE Transactions on Mobile Computing, April.
Efficient OLAP Operations in Spatial Data Warehouses Dimitris Papadias, Panos Kalnis, Jun Zhang and Yufei Tao Department of Computer Science Hong Kong.
A Protocol for Tracking Mobile Targets using Sensor Networks H. Yang and B. Sikdar Department of Electrical, Computer and Systems Engineering Rensselaer.
Privacy-Preserving Publication of User Locations in the Proximity of Sensitive Sites Bharath Krishnamachari Gabriel Ghinita Panos Kalnis National University.
KAIS T Sensor Deployment Based on Virtual Forces Reference: Yi Zou and Krishnendu Chakarabarty, “Sensor Deployment and Target Localization Based on Virtual.
Energy Efficient Detection of Compromised Nodes in Wireless Sensor Networks Haengrae Cho Department of Computer Engineering, Yeungnam University Gyungbuk.
Information Technology Part 2. Part2-2 Next Three Chapters Copyright © 2016 Pearson Education, Inc. Chapter 4 discusses hardware, software, and mobile.
ENERGY EFFICIENT TIME SYNCHRONIZATION PROTOCOL FOR MOBILE UNDERWATER ACOUSTIC SENSOR NETWORKS Under the Guidance of Submitted by Mr. P. Mukunthan, AP/CSE.
Center for E-Business Technology Seoul National University Seoul, Korea Private Queries in Location Based Services: Anonymizers are not Necessary Gabriel.
Overview Issues in Mobile Databases – Data management – Transaction management Mobile Databases and Information Retrieval.
 A Two-level Protocol to Answer Private Location-based Queries Roopa Vishwanathan Yan Huang [RoopaVishwanathan, Computer Science and.
Gabriel Ghinita1 Panos Kalnis1 Ali Khoshgozaran2 Cyrus Shahabi2
Efficient Multi-User Indexing for Secure Keyword Search
Improving searches through community clustering of information
Hybrid Cloud Architecture for Software-as-a-Service Provider to Achieve Higher Privacy and Decrease Securiity Concerns about Cloud Computing P. Reinhold.
563.10: Bloom Cookies Web Search Personalization without User Tracking
Efficient Evaluation of k-NN Queries Using Spatial Mashups
“Location Privacy Protection for Smartphone Users”
A Unified Framework for Location Privacy
TDT49 Mobile Information Systems, Jørgen Birkeland
Trust-based Privacy Preservation for Peer-to-peer Data Sharing
Presentation transcript:

Related Works LOFConclusion Introduction Contents ICISS 20142

3

 LOF is a security framework protecting privacy for SIL and other training-free localization algorithms.  SIL: Search-based Indoor Localization  Training-free: no need pre-built map for localization  save resources (human labor, time, money)  Why SIL needs protection? Introduction ICISS 20144

5

SIL Training-Free Localization SSID list KG MECH Branch Reliance Trends NMDC Head Office URL list d/reliance-trends Potential address list Khanij Bhavan, Masab Tank, Hyderabad – /1, Masab Tank, Mehdipatnam, Hyderabad – to 44, Begumpet, Hyderabad, AP /A/12/1 Masab Tank, Hyderabad – … Search Engine query SSID Scanning Geo-Info Retrieving Address Processing component /1 Masab Tank, Hyderabad, Masab Tank Road ICISS 20146

SIL Framework Address Processing Evaluate & Rank Addresses Geo-Info Retrieving Search Engine Crawl Webs & Retrieve Geo-Info. SSID Scanning Scan APs Pre-process APs SSID SCANNING GEO-INFO RETRIEVING ADDRESS PROCESSING ICISS 20147

 Accuracy: ~80% (1 km error-range)  Time response: 1 min (acceptable for indoor movement)  Bandwidth cost: ~2MB per location  Geo-Retrieving component consumes much bandwidth & time  Solution: crowd-sourcing (cloud) to share geo- info between users  Result: negligible cost (2.5KB & 1 second per location) SIL Overview Result ICISS 20148

 Ask third-party for geo-info:  Location privacy threat  Leakage of user location information while asking for geo-information through the cloud (third-parties, …) Geo-Info Third-Party Geo-Info SIL User Location device User SSID set SIL Problem ??? ICISS 20149

LOCATION OBFUSCATION FRAMEWORK ICISS

 K-Anonymity:  Anonymize information  Add distortion information in the query sent to the third-party  PIH – Partial Information Hiding:  Reduce amount of actual information exposed to third-party LOF Approach Preserve the location anonymity Keeping the bandwidth cost at acceptable level Preserve the location anonymity Keeping the bandwidth cost at acceptable level ICISS

 Idea:  Add K-1 users’ info to disguise actual user’s info  Trusted anonymizer LOF K-Anonymity  Apply:  No anonymizer  Add disguised SSIDs to the query sent to third-party ICISS

LOF Approach original set request set disguised set PIH K-Anonymity Third-Party obfuscated set Geo-Info request set self-process set self-process set ICISS

LOF Parameters original set request set α disguised set β  α  100%: bandwidth is negligible since the whole original set is queried  α increase  anonymity decrease  β  200%: means disguised SSIDs are two times more than original set  β increase  anonymity increase ICISS

LOF Distribution of Disguised SSIDs  RD – Random Distribution: The SSIDs are scattered randomly and have no geo-relation with each other.  ID – Inter-proximate Distribution: The SSIDs are geo-correlated and in close proximity with each other. ICISS

LOF Effect of α and β on Anonymity and Overhead  α=50% β=100%: bandwidth reduced in half  α=100% β=100%: negligible bandwidth  Anonymity in both cases is at least 90% Fixed β, error range = 500m with ID SSIDs Fixed β, error range = 500m with RD SSIDs ICISS

LOF Effect of ID and RD distributions on Anonymity  ID is better in obfuscating data than RD due to geo-correlation attribute of CGSIL Anonymity level with fixed α, error range = 500m ICISS

LOF Correlation of α and β  Low values of β: the anonymity is dependent upon α’s value  High values of β: the anonymity is dependent upon β’s value Hit-Rate of Third-Party Prediction with β=0% Hit-Rate of Third-Party Prediction with β=200% ICISS

ICISS

 LOF efficiently keeps the bandwidth overhead of SIL at minimal level while offering 90% anonymity.  Parameters (α, β) are configurable: CONCLUSION αβBandwidthAnonymity 50%100%½ reduced90% 100% Negligible85% ICISS

References 1.Truc D. Le, Thong M. Doan, Han N. Dinh, Nam T. Nguyen, “ISIL: Instant Search-based Indoor Localization”, in Conference “CCNC Mobile Device & Platform & Applications”, The 10th Annual IEEE CCNC, Las Vegas, NV, USA, Thong M. Doan, Han N. Dinh, Nam T. Nguyen, “CGSIL: Collaborative Geo-clustering Search- based Indoor Localization”. Accepted in the 16th IEEE International Conference on High Performance Computing and Communications (HPCC), Paris, France, Han N. Dinh, Thong M. Doan, Nam T. Nguyen, “CGSIL: A Viable Training-Free Wi-Fi Localization”, in the Eighth International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies (UBICOMM), Rome, Italy, L. Sweeney: k-Anonymity: A Model for Protecting Privacy. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems (2002) Panos Kalnis, Gabriel Ghinita, Kyriakos Mouratidis, and Dimitris Papadias: Preventing Location- Based Identity Inference in Anonymous Spatial Queries, Vol 19, No. 12. IEEE Transactions on Knowledge and Data Engineering ( ) Buğra Gedik, Ling Liu: A Customizable k-Anonymity Model for Protecting Location Privacy. ICDCS (2004) 620–629 7.Ge Zhong, Urs Hengartner: A Distributed k-Anonymity Protocol for Location Privacy. IEEE Int. Conference on Pervasive Computing and Communications (PerCom) (2009) Buğra Gedik, Ling Liu: Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms, Vol. 7, No. 1. IEEE Transactions on Mobile Computing (2008) 9.Aris Gkoulalas–Divanis, Panos Kalnis, Vassilios S. Verykios: Providing K–Anonymity in Location Based Services, Vol. 12, Issue 1. SIGKDD Explorations ICISS

Q&A ICISS

SIL SIL vs. Training-Required Localization Algorithms ICISS

LOF Overhead Analysis  90% anonymity: α=50% and β=100% Cost: 6MB per location.  No bandwidth cost: α=100% and β=100% (anonymity is reduced by 4%) Bandwidth Overhead with a Variety of α Values ICISS