Related Works LOFConclusion Introduction Contents ICISS 20142
3
LOF is a security framework protecting privacy for SIL and other training-free localization algorithms. SIL: Search-based Indoor Localization Training-free: no need pre-built map for localization save resources (human labor, time, money) Why SIL needs protection? Introduction ICISS 20144
5
SIL Training-Free Localization SSID list KG MECH Branch Reliance Trends NMDC Head Office URL list d/reliance-trends Potential address list Khanij Bhavan, Masab Tank, Hyderabad – /1, Masab Tank, Mehdipatnam, Hyderabad – to 44, Begumpet, Hyderabad, AP /A/12/1 Masab Tank, Hyderabad – … Search Engine query SSID Scanning Geo-Info Retrieving Address Processing component /1 Masab Tank, Hyderabad, Masab Tank Road ICISS 20146
SIL Framework Address Processing Evaluate & Rank Addresses Geo-Info Retrieving Search Engine Crawl Webs & Retrieve Geo-Info. SSID Scanning Scan APs Pre-process APs SSID SCANNING GEO-INFO RETRIEVING ADDRESS PROCESSING ICISS 20147
Accuracy: ~80% (1 km error-range) Time response: 1 min (acceptable for indoor movement) Bandwidth cost: ~2MB per location Geo-Retrieving component consumes much bandwidth & time Solution: crowd-sourcing (cloud) to share geo- info between users Result: negligible cost (2.5KB & 1 second per location) SIL Overview Result ICISS 20148
Ask third-party for geo-info: Location privacy threat Leakage of user location information while asking for geo-information through the cloud (third-parties, …) Geo-Info Third-Party Geo-Info SIL User Location device User SSID set SIL Problem ??? ICISS 20149
LOCATION OBFUSCATION FRAMEWORK ICISS
K-Anonymity: Anonymize information Add distortion information in the query sent to the third-party PIH – Partial Information Hiding: Reduce amount of actual information exposed to third-party LOF Approach Preserve the location anonymity Keeping the bandwidth cost at acceptable level Preserve the location anonymity Keeping the bandwidth cost at acceptable level ICISS
Idea: Add K-1 users’ info to disguise actual user’s info Trusted anonymizer LOF K-Anonymity Apply: No anonymizer Add disguised SSIDs to the query sent to third-party ICISS
LOF Approach original set request set disguised set PIH K-Anonymity Third-Party obfuscated set Geo-Info request set self-process set self-process set ICISS
LOF Parameters original set request set α disguised set β α 100%: bandwidth is negligible since the whole original set is queried α increase anonymity decrease β 200%: means disguised SSIDs are two times more than original set β increase anonymity increase ICISS
LOF Distribution of Disguised SSIDs RD – Random Distribution: The SSIDs are scattered randomly and have no geo-relation with each other. ID – Inter-proximate Distribution: The SSIDs are geo-correlated and in close proximity with each other. ICISS
LOF Effect of α and β on Anonymity and Overhead α=50% β=100%: bandwidth reduced in half α=100% β=100%: negligible bandwidth Anonymity in both cases is at least 90% Fixed β, error range = 500m with ID SSIDs Fixed β, error range = 500m with RD SSIDs ICISS
LOF Effect of ID and RD distributions on Anonymity ID is better in obfuscating data than RD due to geo-correlation attribute of CGSIL Anonymity level with fixed α, error range = 500m ICISS
LOF Correlation of α and β Low values of β: the anonymity is dependent upon α’s value High values of β: the anonymity is dependent upon β’s value Hit-Rate of Third-Party Prediction with β=0% Hit-Rate of Third-Party Prediction with β=200% ICISS
ICISS
LOF efficiently keeps the bandwidth overhead of SIL at minimal level while offering 90% anonymity. Parameters (α, β) are configurable: CONCLUSION αβBandwidthAnonymity 50%100%½ reduced90% 100% Negligible85% ICISS
References 1.Truc D. Le, Thong M. Doan, Han N. Dinh, Nam T. Nguyen, “ISIL: Instant Search-based Indoor Localization”, in Conference “CCNC Mobile Device & Platform & Applications”, The 10th Annual IEEE CCNC, Las Vegas, NV, USA, Thong M. Doan, Han N. Dinh, Nam T. Nguyen, “CGSIL: Collaborative Geo-clustering Search- based Indoor Localization”. Accepted in the 16th IEEE International Conference on High Performance Computing and Communications (HPCC), Paris, France, Han N. Dinh, Thong M. Doan, Nam T. Nguyen, “CGSIL: A Viable Training-Free Wi-Fi Localization”, in the Eighth International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies (UBICOMM), Rome, Italy, L. Sweeney: k-Anonymity: A Model for Protecting Privacy. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems (2002) Panos Kalnis, Gabriel Ghinita, Kyriakos Mouratidis, and Dimitris Papadias: Preventing Location- Based Identity Inference in Anonymous Spatial Queries, Vol 19, No. 12. IEEE Transactions on Knowledge and Data Engineering ( ) Buğra Gedik, Ling Liu: A Customizable k-Anonymity Model for Protecting Location Privacy. ICDCS (2004) 620–629 7.Ge Zhong, Urs Hengartner: A Distributed k-Anonymity Protocol for Location Privacy. IEEE Int. Conference on Pervasive Computing and Communications (PerCom) (2009) Buğra Gedik, Ling Liu: Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms, Vol. 7, No. 1. IEEE Transactions on Mobile Computing (2008) 9.Aris Gkoulalas–Divanis, Panos Kalnis, Vassilios S. Verykios: Providing K–Anonymity in Location Based Services, Vol. 12, Issue 1. SIGKDD Explorations ICISS
Q&A ICISS
SIL SIL vs. Training-Required Localization Algorithms ICISS
LOF Overhead Analysis 90% anonymity: α=50% and β=100% Cost: 6MB per location. No bandwidth cost: α=100% and β=100% (anonymity is reduced by 4%) Bandwidth Overhead with a Variety of α Values ICISS