Alastair R. Beresford Frank Stajano University of Cambridge Presented by Arcadiy Kantor — CS4440 September 13, 2007.

Slides:



Advertisements
Similar presentations
Self-Organized Anonymous Authentication in Mobile Ad Hoc Networks Julien Freudiger, Maxim Raya and Jean-Pierre Hubaux SECURECOMM, 2009.
Advertisements

SAMPLING DISTRIBUTIONS
Objectives Look at Central Limit Theorem Sampling distribution of the mean.
By: Mike Yerina. Internet Regulation: The Internet Regulation is a very important part of the world today and without it there would be huge changes in.
Topic 6: Introduction to Hypothesis Testing
1 A Distortion-based Metric for Location Privacy Workshop on Privacy in the Electronic Society (WPES), Chicago, IL, USA - November 9, 2009 Reza Shokri.
Prepared By: Eng.Ola M. Abd El-Latif
Reinforcement Learning Rafy Michaeli Assaf Naor Supervisor: Yaakov Engel Visit project’s home page at: FOR.
1/55 EF 507 QUANTITATIVE METHODS FOR ECONOMICS AND FINANCE FALL 2008 Chapter 10 Hypothesis Testing.
Business Statistics: A Decision-Making Approach, 7e © 2008 Prentice-Hall, Inc. Chap 9-1 Business Statistics: A Decision-Making Approach 7 th Edition Chapter.
Chapter 2 Fundamentals of Data and Signals
QM Spring 2002 Business Statistics Sampling Concepts.
Business Statistics: A Decision-Making Approach, 6e © 2005 Prentice-Hall, Inc. Chap 8-1 Business Statistics: A Decision-Making Approach 6 th Edition Chapter.
Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall Statistics for Business and Economics 7 th Edition Chapter 9 Hypothesis Testing: Single.
TEMPLATE DESIGN © Privacy Issues of Vehicular Ad-hoc Networks (VANETs) Hang Dok and Ruben Echevarria Advisor: Dr. Huirong.
Chapter 8 Introduction to Hypothesis Testing
1 Chapter 2 Fundamentals of Data and Signals Data Communications and Computer Networks: A Business User’s Approach.
Monté Carlo Simulation MGS 3100 – Chapter 9. Simulation Defined A computer-based model used to run experiments on a real system.  Typically done on a.
Christopher Dougherty EC220 - Introduction to econometrics (review chapter) Slideshow: sampling and estimators Original citation: Dougherty, C. (2012)
Privacy in Computing Legal & Ethical Issues in Computer …Security Information Security Management …and Security Controls Week-9.
Android Security Enforcement and Refinement. Android Applications --- Example Example of location-sensitive social networking application for mobile phones.
Welcome to the Sinclair Community College Online Employment Applicant Tutorial.
Information Age In Which We Live Session 2. Introduction Knowledge is Power What you don’t know will hurt you Business are using information to reel in.
Chapter 10 Hypothesis Testing
Confidence Intervals and Hypothesis Testing - II
Hypothesis Testing.
Fundamentals of Hypothesis Testing: One-Sample Tests
Supporting Small Communities: Doubling the Small Community Grant Program Overview of the new grant allocation formula.
UNCLASSIFIED User Guide Applicant. UNCLASSIFIED Table of Contents What is the SAFETY Act? Applicant Guide Help Desk.
Sampling. Concerns 1)Representativeness of the Sample: Does the sample accurately portray the population from which it is drawn 2)Time and Change: Was.
Chapter 10 Hypothesis Testing
1 Introduction to Hypothesis Testing. 2 What is a Hypothesis? A hypothesis is a claim A hypothesis is a claim (assumption) about a population parameter:
Lecture 7 Introduction to Hypothesis Testing. Lecture Goals After completing this lecture, you should be able to: Formulate null and alternative hypotheses.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
Additional analysis of poverty in Scotland 2013/14 Communities Analytical Services July 2015.
1 DSCI 3023 Forecasting Plays an important role in many industries –marketing –financial planning –production control Forecasts are not to be thought of.
Chapter 4 Linear Regression 1. Introduction Managerial decisions are often based on the relationship between two or more variables. For example, after.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Professor John Bacon-Shone Director, Social Sciences Research Centre & Chair, Human Research Ethics Committee The University of Hong Kong Re-identification.
Preserving Location Privacy in Wireless LANs Jiang, Wang and Hu MobiSys 2007 Presenter: Bibudh Lahiri.
Statistics for Managers Using Microsoft Excel, 4e © 2004 Prentice-Hall, Inc. Chap 8-1 Chapter 8 Fundamentals of Hypothesis Testing: One-Sample Tests Statistics.
Chap 8-1 A Course In Business Statistics, 4th © 2006 Prentice-Hall, Inc. A Course In Business Statistics 4 th Edition Chapter 8 Introduction to Hypothesis.
Chapter Thirteen Copyright © 2004 John Wiley & Sons, Inc. Sample Size Determination.
Chap 8-1 Fundamentals of Hypothesis Testing: One-Sample Tests.
Lecture 13: Anonymity on the Web Modified from Levente Buttyan, Michael K. Reiter and Aviel D. Rubin.
CONFIDENCE INTERVALS.
Sample Size Determination Determining Sample Size for Probability Samples Determining sample size for probability samples involves financial, statistical,
Fall 2006CS 395: Computer Security1 Confidentiality Using Symmetric Encryption.
Finishing up: Statistics & Developmental designs Psych 231: Research Methods in Psychology.
Location Privacy Protection for Location-based Services CS587x Lecture Department of Computer Science Iowa State University.
Digital Citizenship By Lisa Brackett ED 505. Netiquette on Social Media Sites What is it? “Netiquette is the etiquette guidelines that govern behavior.
Descriptive Research & Questionnaire Design. Descriptive Research Survey versus Observation  Survey Primary data collection method based on communication.
REU 2009-Traffic Analysis of IP Networks Daniel S. Allen, Mentor: Dr. Rahul Tripathi Department of Computer Science & Engineering Data Streams Data streams.
Chapter 5. An IP address is simply a series of binary bits (ones and zeros). How many binary bits are used? 32.
Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall Statistics for Business and Economics 8 th Edition Chapter 9 Hypothesis Testing: Single.
Authors: Jiang Xie, Ian F. Akyildiz
IP Addressing Part 11.
Hotspot Shield Protect Your Online Identity
Unit 2 GCSE Business Communication Systems
Chapter 7 Process Control.
Sample Size Determination
Chapter 9 Hypothesis Testing: Single Population
Introduction to Summary Statistics
THANK YOU… Welcome to Norton Internet Security Welcome to Norton Internet Security For More Visit on:
Location Privacy.
Introduction to Summary Statistics
Ebrahim Bagheri and Ali A. Ghorbani and
What are their purposes? What kinds?
Chapter 9 Hypothesis Testing: Single Population
Forecasting Plays an important role in many industries
Presentation transcript:

Alastair R. Beresford Frank Stajano University of Cambridge Presented by Arcadiy Kantor — CS4440 September 13, 2007

 Fifth-year CS major  Originally from Moscow, Russia, more recently from Alpharetta, GA  CS2200 Teaching Assistant  Opinions Editor, Technique  Highly involved in AIESECAIESEC

 Fourth Amendment to U.S. Constitution proclaims a right to privacy.  1948-Universal Declaration of Human Rights ◦ “Everyone has a right to privacy at home, with family, and in correspondence.”  Privacy on the internet and based upon new technologies is an ongoing issue.  One of the issues created by new technology is location privacy.

 The ability to prevent other parties from learning one’s current or past location.  The need is a recent development.  Pervasive computing applications may require certain location information.

 To protect the privacy of our location information while taking advantage of location-aware services.

 Location-based applications fall into three categories: 1. Applications that cannot work without the user’s identity. 2. Applications that can function completely anonymously. 3. Applications that cannot be accessed anonymously, but do not require the user’s true identity to function.

 While you trust the service provider and middleware, you do not trust any of the applications.  Therefore, you use the middleware to provide frequently-changing pseudonyms to the applications. ◦ Purpose: Not to establish reputation, but to provide a “return address.”

 Systems with high resolution ◦ Spatial ◦ Temporal  Can link old and new pseudonyms to one another.

 Mix network ◦ Store-and forward network used to anonymize communication. ◦ Hostile observers who can monitor all the links in the network cannot match up the sender and the receiver of a message.  Mix zones apply this concept to locations.

As you enter a mix zone, you are assigned a new pseudonym. The application no longer knows which user is which until you leave the mix zone with a new pseudonym.

 A mix zone’s security strongly depends on the number of users in it. ◦ If you are the only person in the mix zone, it provides zero anonymity.  Users moving in a direction are much more likely to continue moving the same way.  If two application zones are closer to one another than a third, the time of travel through the mix zone can reveal a user’s identity.

 Two measures ◦ Anonymity set (instant and average values) ◦ Entropy

 The group of people visiting a given mix zone at the same time as the user.  A rough determination of the level of privacy. ◦ i.e. a user may not wish to provide location updates to an application unless the anonymity set size is >= 20 people.  Average anonymity set size for current and neighboring mix zones can be used to estimate overall level of location privacy.

 Used installation of Active Bat system at AT&T Labs Cambridge. ◦ Each user carries a small “bat” device that provides location updates. ◦ System can locate bats with less than 3cm error up to 95 percent of the time. ◦ Typical update rate: 1-10 times per second.  Approximately 3.4 million samples taken over two weeks used for data.

Z1: first-floor hallway Z2: first-floor hallway and main corridor Z3: hallway, main corridor, stairwell on all floors.

Needed an 8-minute update period to provide anonymity set size of 2.

Needed only a 15-second update period to reach anonymity set size of 2. Much better, but still has issues.

 Level of privacy provided in experiment is rather low. ◦ High resolution of tracking system ◦ Low user population  May be significantly more effective for tracking systems based on locating cell phones via towers they use.

 The anonymity set’s size is only a good measure of anonymity when all the members of the set are equally likely to be the one of interest to an observer. ◦ i.e., an observer cannot narrow down the set of users by identifying patterns and trends. ◦ Maximum entropy.

 A user moving in a given direction is likely to keep moving in the same direction.  Suppose you define p as the user’s preceding location (location at time t-1) and s as the subsequent location (location at time t+1).  Can create a movement matrix to calculate the probabilities of movement from one zone to another.

Each element represents the frequency of movements from the preceding zone, p, at time t-1, to the subsequent zone, s, at time t+1.

 Conditional probability of coming out through zone s given that you have gone in through zone p:  Then the entropy can be calculated:

 Using the same set of results and the aforementioned formulas, one can calculate the probability of a person’s actions when they enter a zone.

 Suppose two people move into a zone, coming from opposite directions. ◦ Options for actions:  Each continues moving in the same direction.  Each turns around.  One turns around, other keeps moving the same way.  One can calculate the probability of both users doing a U-turn. ◦ Using the statistics in M, the probability of both doing a U-turn is 0.1 percent, while the probability of both going straight is 99.9 percent.

 The entropy in the aforementioned example is bits. ◦ Maximum entropy is a value of 1 bit.  When a hostile observer is able to observe the behavior of users over time the anonymity granted by mix zones and other anonymization methods greatly decreases.

 Half the battle is knowing how private and secure your information is.  Better methods of measuring location privacy allow users to make sound decisions about private data sharing.

 Managing application use of pseudonyms.  Reacting to insufficient anonymity.  Improving the models.  Dummy users.  Granularity.  Scalability.

Questions? Note: the link to this paper on the reading list is broken. Rather, you may download the full paper here: location.pdf location.pdf