Id 1 id k id 2 … λ = 60 sec even odd PRIVACY-PRESERVING TRAJECTORY COLLECTION Győző Gidófalvi Xuegang Huang and Torben Bach Pedersen Problem Setting Accurate.

Slides:



Advertisements
Similar presentations
Presenter: Nguyen Ba Anh HCMC University of Technology Information System Security Course.
Advertisements

Modeling & Simulation. System Models and Simulation Framework for Modeling and Simulation The framework defines the entities and their Relationships that.
Preference Elicitation Partial-revelation VCG mechanism for Combinatorial Auctions and Eliciting Non-price Preferences in Combinatorial Auctions.
Mining Long Sharable Patterns in Trajectories of Moving Objects Győző Gidofalvi and Torben Bach Pedersen Arrrrgggg, all this spatio- temporal data from.
Ranveer Chandra , Kenneth P. Birman Department of Computer Science
Detecting Phantom Nodes in Wireless Sensor Networks Joengmin Hwang Tian He Yongdae Kim Department of Computer Science, University of Minnesota, Minneapolis.
PRIVACY AND SECURITY ISSUES IN DATA MINING P.h.D. Candidate: Anna Monreale Supervisors Prof. Dino Pedreschi Dott.ssa Fosca Giannotti University of Pisa.
TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P Systems Aameek Singh and Ling Liu Presented by: Korporn Panyim.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Chien-Hao Chien, Shun-Yun Hu, Jehn-Ruey Jiang Adaptive Computing and Networking (ACN) Laboratory Department of Computer Science and Information Engineering.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
Beneficial Caching in Mobile Ad Hoc Networks Bin Tang, Samir Das, Himanshu Gupta Computer Science Department Stony Brook University.
1 PERFORMANCE EVALUATION H Often one needs to design and conduct an experiment in order to: – demonstrate that a new technique or concept is feasible –demonstrate.
1 Experimental Methodology H Experimental methods can be used to: – demonstrate that a new concept, technique, or algorithm is feasible –demonstrate that.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
OS Fall ’ 02 Performance Evaluation Operating Systems Fall 2002.
Probabilistic Data Aggregation Ling Huang, Ben Zhao, Anthony Joseph Sahara Retreat January, 2004.
Performance Evaluation
Data Sharing in OSD Environment Dingshan He September 30, 2002.
Privacy Preserving Data Mining Yehuda Lindell & Benny Pinkas.
OS Fall ’ 02 Performance Evaluation Operating Systems Fall 2002.
A Customizable k-Anonymity Model for Protecting Location Privacy Written by: B. Gedik, L.Liu Presented by: Tal Shoseyov.
MOCA : Mobile Certificate Authority for Wireless Ad Hoc Networks The 2nd Annual PKI Research Workshop (PKI 2003) Seung Yi, Robin Kravets September. 25,
Presented by: Michal Nir, Saar Gross Supervisors: Nadav Golbandi, Oren Somekh Computer Science Department Industrial Project (234313) Tuesday, January.
Detecting Distance-Based Outliers in Streams of Data Fabrizio Angiulli and Fabio Fassetti DEIS, Universit `a della Calabria CIKM 07.
Key Management Lifecycle. Cryptographic key management encompasses the entire lifecycle of cryptographic keys and other keying material. Basic key management.
Learner Modelling in a Multi-Agent System through Web Services Katerina Kabassi, Maria Virvou Department of Informatics, University of Piraeus.
A Generalized Processor Sharing Approach to Flow Control in Integrated Services Networks: The Single-Node Case Abhay K. Parekh, Member, IEEE, and Robert.
F EELING - BASED L OCATION P RIVACY P ROTECTION FOR L OCATION - BASED S ERVICES CS587x Lecture Department of Computer Science Iowa State University Ames,
1 Yolanda Gil Information Sciences InstituteJanuary 10, 2010 Requirements for caBIG Infrastructure to Support Semantic Workflows Yolanda.
Privacy Preserving Data Mining on Moving Object Trajectories Győző Gidófalvi Geomatic ApS Center for Geoinformatik Xuegang Harry Huang Torben Bach Pedersen.
UbiStore: Ubiquitous and Opportunistic Backup Architecture. Feiselia Tan, Sebastien Ardon, Max Ott Presented by: Zainab Aljazzaf.
Network Security Lecture 9 Presented by: Dr. Munam Ali Shah.
Department of Information Engineering The Chinese University of Hong Kong A Framework for Monitoring and Measuring a Large-Scale Distributed System in.
Privacy-Aware Personalization for Mobile Advertising
Instant Social Ride-Sharing Győző Gidófalvi * Uppsala University, Dept. of Information Technology Gergely Herényi motoros.hu: Online Hungarian Forum for.
IRB Belmont Report Federally mandated Risks -> minimized & reasonable Informed consent rospective Approval Prospective Approval Monitoring for subject.
Utilizing Call Admission Control for Pricing Optimization of Multiple Service Classes in Wireless Cellular Networks Authors : Okan Yilmaz, Ing-Ray Chen.
CONTACT INFORMATION Győző Gidófalvi: KTH Royal Institute of Technology – Geodesy and Geoinformatics – Manohar Kaul: Uppsala.
Shape-based Similarity Query for Trajectory of Mobile Object NTT Communication Science Laboratories, NTT Corporation, JAPAN. Yutaka Yanagisawa Jun-ichi.
1 SpaceTwist: A Flexible Approach for Hiding Query User Location Speaker: Man Lung Yiu Aalborg University Joint work with Christian S. Jensen, Xuegang.
Frequent Route Based Continuous Moving Object Location- and Density Prediction on Road Networks KTH – Royal Institute of Technology Uppsala University.
Winter, 2004CSS490 Synchronization1 Textbook Ch6 Instructor: Munehiro Fukuda These slides were compiled from the textbook, the reference books, and the.
Spatio-temporal Pattern Queries M. Hadjieleftheriou G. Kollios P. Bakalov V. J. Tsotras.
Replicating Memory Behavior for Performance Skeletons Aditya Toomula PC-Doctor Inc. Reno, NV Jaspal Subhlok University of Houston Houston, TX By.
1 City With a Memory CSE 535: Mobile Computing Andreea Danielescu Andrew McCord Brandon Mechtley Shawn Nikkila.
From Trajectories of Moving Objects to Route-Based Traffic Prediction and Management by Gyozo Gidofalvi Ehsan Saqib Presented by Bo Mao Developing a Benchmark.
Network Computing Laboratory 1 Vivaldi: A Decentralized Network Coordinate System Authors: Frank Dabek, Russ Cox, Frans Kaashoek, Robert Morris MIT Published.
Privacy-preserving data publishing
Shambhu Upadhyaya 1 Sensor Networks – Hop- by-Hop Authentication Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 22)
Bloom Cookies: Web Search Personalization without User Tracking Authors: Nitesh Mor, Oriana Riva, Suman Nath, and John Kubiatowicz Presented by Ben Summers.
King Mongkut’s University of Technology Network Security 8. Password Authentication Methods Prof. Reuven Aviv, Jan Password Authentication1.
Ghislain Fouodji Tasse Supervisor: Dr. Karen Bradshaw Computer Science Department Rhodes University 24 March 2009.
1 Limiting Privacy Breaches in Privacy Preserving Data Mining In Proceedings of the 22 nd ACM SIGACT – SIGMOD – SIFART Symposium on Principles of Database.
Location Privacy Protection for Location-based Services CS587x Lecture Department of Computer Science Iowa State University.
Large Scale Sharing Marco F. Duarte COMP 520: Distributed Systems September 19, 2004.
1 Diffie-Hellman (Key Exchange) Protocol Rocky K. C. Chang 9 February 2007.
Relying on Safe Distance to Achieve Strong Partitionable Group Membership in Ad Hoc Networks Authors: Q. Huang, C. Julien, G. Roman Presented By: Jeff.
Privacy-Preserving Trajectory Collection Győző Gidófalvi * Uppsala University, Dept. of Information Technology Geomatic ApS Xuegang Huang and Torben Bach.
V.16 Upgrade Express Serials Doron Greenshpan. v.16 Serials 2 Session Agenda Serials workflow demo Publication Schedule goes Prediction modes New and.
Performance Comparison of Ad Hoc Network Routing Protocols Presented by Venkata Suresh Tamminiedi Computer Science Department Georgia State University.
Privacy Vulnerability of Published Anonymous Mobility Traces Chris Y. T. Ma, David K. Y. Yau, Nung Kwan Yip (Purdue University) Nageswara S. V. Rao (Oak.
Center for E-Business Technology Seoul National University Seoul, Korea Private Queries in Location Based Services: Anonymizers are not Necessary Gabriel.
COMPUTER NETWORKS CS610 Lecture-21 Hammad Khalid Khan.
Hybrid Cloud Architecture for Software-as-a-Service Provider to Achieve Higher Privacy and Decrease Securiity Concerns about Cloud Computing P. Reinhold.
Spatio-temporal Pattern Queries
CPSC 531: System Modeling and Simulation
Mining Long, Sharable Patterns in Trajectories of Moving Objects
Spatial Databases: Spatio-Temporal Databases
Presentation transcript:

id 1 id k id 2 … λ = 60 sec even odd PRIVACY-PRESERVING TRAJECTORY COLLECTION Győző Gidófalvi Xuegang Huang and Torben Bach Pedersen Problem Setting Accurate trajectory patterns are necessary for Location-Based Services. A method that can collect exact trajectories in a privacy-preserving manner is needed. A method that uses free and energy-saving short-range P2P communication is desirable. However, during such communication a fixed hardware ID is exposed. Hence it is necessary that when a data item, which contains the private trajectory with possibly secret or embarrassing locations, is communicated, the link between public and private information is broken. Location Privacy Definitions k-anonymity requires that each data item can be associated with at least k moving objects and vice versa. α-diversity requires some spatial or spatio- temporal diversity in a set of locations / trajectories. Finally, k-α-anonymity combines the two. HIDPrivate trajectory y t x Secret or embarrassing visit / location Data Item Privacy-Preserving Trajectory Collection in Five Stages Empirical Evaluation and Results Realistic simulation shows that the method works under reasonable conditions and anonymity settings (communication range = 10 meters and k = 5 is shown). In particular, most clients can report most of the collected data in a privacy- preserving fashion. The collection is virtually lossless. In summary, the proposed system collects exact trajectories without loss, does not require trusted components, and provides strong privacy guarantees. Győző Gidófalvi: Uppsala University – Department of Information Technology – Xuegang Huang: Aalborg University – Department of Computer Science – Torben Bach Pedersen: Aalborg University – Department of Computer Science – Client Registration (CR) In the CR stage, the client expresses its privacy requirements (k,α). In response, the server approves a group of k clients and sends them timing parameters (start time: T s, reporting period: τ). The CR stage ensures the k-anonymity of clients. Trajectory Sampling and Anonymization (TSA) In the TSA stage, the client continuously samples its real trajectory and generates k-1 realistic and pair-wise α-diverse synthetic trajectories and cuts the trajectories into pieces at every λ-period. Trajectory pieces of a trajectory are tagged with an ID and form partial data items (pdis). At every λ-period an even number of copies of sampled pdi and odd number of copies of the generated pdis are stored in the trajectory DB of the client. The TSA stage ensures the k-α- anonymity of the client trajectory DB. Server Trajectory Exchange (TE) In the TE stage, the client periodically performs a Neighborhood Discovery (ND) process to find other clients to exchange pdis with. The pdis to be exchanged are randomly selected, but contain at least two sampled or generated-pdis and older pdis are prioritized. The TE stage ensures the k-α-anonymity of the exchanged data. DEF. k-anonymity : data itemsmoving objects mn ≥ k=5 DEF. α-diversity : x y AREA(MBR) ≥ α locations (extendable to trajectories) DEF. k-α-anonymity : k-anonymity + α-diversity ? ? Data Reporting (DR) After the reporting period has elapsed or the client DB is full, the client enters the DR stage. In the DR stage the client determines a maximal anonymity set of pdis, in which the number of pdis for each ID is statistically equal, and sends this set to the server. The DR stage ensures the k-α-anonymity of the reported data. Data Summarization (DS) In the DS stage the server continuously records the reports, merges trajectory pieces and monitors the number of pdis received for each trajectory piece. For a given trajectory, if after T s +2τ the majority parity of the number of pdis for the trajectory pieces is even the trajectory is real and is stored in the Trajectory Repository (TR), otherwise the trajectory is synthetic and is discarded. The DS stage ensures the k-anonymity of the data in TR. Neighborhood Discovery: Get neighbors with at least k respective neighbors! previously exchanged id 1 id k id 2 … id k+4 id k+3 id 2 id 1 id k id k+2 id k+1 Select pdis for exchange exchange x x x y t x TsTs sampled generated √α√α Maximal Anonymity Set Report at time T s +τ or if DB is full id 1 id k id 2 … id k+4 id k+3 id k+m … T s +2λ y t x TsTs Ts+λTs+λ # of copies Trajectory Repository Registration request (HID, k, α) Registration Queue … k Approval (T s, τ, τ max ) k = 5 α = 1000m Number of ExchangesAge of Oldest Data ItemAnonymity