A Study of Smartphone User Privacy from the Advertiser's Perspective Yan Wang 1, Yingying Chen 1, Fan Ye 2, Jie Yang 3, Hongbo Liu 4 1 Department of Electrical.

Slides:



Advertisements
Similar presentations
<<Date>>
Advertisements

A Comparison of Implicit and Explicit Links for Web Page Classification Dou Shen 1 Jian-Tao Sun 2 Qiang Yang 1 Zheng Chen 2 1 Department of Computer Science.
THINKINGLEADINGDOING OI Society – Five Year Vision Workshop outcomes 29 th July, 2007.
Research Methods in Crime and Justice Chapter 4 Classifying Research.
Mining Frequent Spatio-temporal Sequential Patterns
Evaluation Research Pierre-Auguste Renoir: Le Grenouillere, 1869.
The Ladder of Inference:
An Agent-Based Approach to Inference Prevention in Distributed Database System Xue Ying Chen Department of Computer Science.
Funding Networks Abdullah Sevincer University of Nevada, Reno Department of Computer Science & Engineering.
The ATHA Environment: Experience with a User Friendly Environment for Opportunistic Computing M.A.R.Dantas Department of Informatics (INE) University of.
Topic-Sensitive PageRank Taher H. Haveliwala. PageRank Importance is propagated A global ranking vector is pre-computed.
University of Kansas Department of Electrical Engineering and Computer Science Dr. Susan Gauch April 2005 I T T C Dr. Susan Gauch Personalized Search Based.
1 Goal Setting. 2 Objectives 1.Understand the process of goal setting. 2. Follow the steps for setting club goals. 3. Develop a workable tool that will.
DAISY Data Analysis and Information SecuritY Lab
ABET Accreditation Board for Engineering and Technology
CrowdSearch: Exploiting Crowds for Accurate Real-Time Image Search on Mobile Phones Original work by Yan, Kumar & Ganesan Presented by Tim Calloway.
A Social Help Engine for Online Social Network Mobile Users Tam Vu, Akash Baid WINLAB, Rutgers University May 21,
Social Networking – The Ways and Means Rosey Broderick May 2011.
Predicting Missing Provenance Using Semantic Associations in Reservoir Engineering Jing Zhao University of Southern California Sep 19 th,
Copyright © 2005 Brooks/Cole, a division of Thomson Learning, Inc Chapter 24 Statistical Inference: Conclusion.
Extracting Places and Activities from GPS Traces Using Hierarchical Conditional Random Fields Yong-Joong Kim Dept. of Computer Science Yonsei.
Enriching the Ontology for Biomedical Investigations (OBI) to Improve Its Suitability for Web Service Annotations Chaitanya Guttula, Alok Dhamanaskar,
Steven A. Jones Associate Professor Biomedical Engineering Louisiana Tech University Created for our NSF-funded Research Experiences for Teachers Program.
Benchmark Study on Civic Engagement and Social Networks of Youth in Hong Kong
Crowdsourcing Predictors of Behavioral Outcomes. Abstract Generating models from large data sets—and deter¬mining which subsets of data to mine—is becoming.
EXTRACT: MINING SOCIAL FEATURES FROM WLAN TRACES: A GENDER-BASED CASE STUDY By Udayan Kumar Ahmed Helmy University of Florida Presented by Ahmed Alghamdi.
Measuring the Value of Your Volunteer Efforts Nikki Russell Volunteer Initiatives Manager United Way of King County.
Authors: Xu Cheng, Haitao Li, Jiangchuan Liu School of Computing Science, Simon Fraser University, British Columbia, Canada. Speaker : 童耀民 MA1G0222.
UNIVERSITY of NOTRE DAME COLLEGE of ENGINEERING Preserving Location Privacy on the Release of Large-scale Mobility Data Xueheng Hu, Aaron D. Striegel Department.
1 Context-Aware Search Personalization with Concept Preference CIKM’11 Advisor : Jia Ling, Koh Speaker : SHENG HONG, CHUNG.
A Generic Virtual Content Insertion System Based on Visual Attention Analysis H. Liu 1, 2, S. Jiang 1, Q. Huang 1, 2, C. Xu 2, 3 1 Institute of Computing.
1. Prediction: to tell something before it happens 2. Hypothesis: a possible answer to a question based on gathered information.
Zhiyong Wang In cooperation with Sisi Zlatanova
The Change from Big GIS to Small GIS Andrew U. Frank Institute of Geoinformation Technical University Vienna - Austria
Chapter 1: Research in the Behavioral Sciences History of Behavioral Research Aristotle and Buddha questioned human nature and why people behave in certain.
Implicit An Agent-Based Recommendation System for Web Search Presented by Shaun McQuaker Presentation based on paper Implicit:
Find regular encounter pattern from mobile users. Regular encounter indicates an encounter trend that is repetitive and consistent. Using this metric can.
Understanding Cross-site Linking in Online Social Networks Yang Chen 1, Chenfan Zhuang 2, Qiang Cao 1, Pan Hui 3 1 Duke University 2 Tsinghua University.
Tweet Analysis for Real-Time Event Detection and Earthquake Reporting System Development.
Context-Aware Interactive Content Adaptation Iqbal Mohomed, Jim Cai, Sina Chavoshi, Eyal de Lara Department of Computer Science University of Toronto MobiSys2006.
Xiao Liu CS3 -- Centre for Complex Software Systems and Services Swinburne University of Technology, Australia Key Research Issues in.
Hiding in the Mobile Crowd: Location Privacy through Collaboration.
Experimental Results ■ Observations:  Overall detection accuracy increases as the length of observation window increases.  An observation window of 100.
Exploit of Online Social Networks with Community-Based Graph Semi-Supervised Learning Mingzhen Mo and Irwin King Department of Computer Science and Engineering.
CrowdSearch: Exploiting Crowds for Accurate Real-Time Image Search on Mobile Phones Original work by Tingxin Yan, Vikas Kumar, Deepak Ganesan Presented.
DriveSense’14 NSF Workshop on Large-Scale Traffic and Driving Activity Data DriveSense’14, Oct 30-31, Norfolk, VA.
Intelligent Database Systems Lab 國立雲林科技大學 National Yunlin University of Science and Technology Mining Logs Files for Data-Driven System Management Advisor.
Ari Wahlstedt, Samuli Peldola and Marketta Niemeli 系級: 碩研資管一甲 報告者: M 李文盈 1.
Chapter 6 STUDY DESIGN.
Traffic Prediction in a Bike-Sharing System
©2011 1www.id-book.com Data Gathering Chapter 7. ©2011 Data Gathering What is data gathering? –The act of gathering data through a study The data can.
Knowledge sharing and creation in a teachers’ professional virtual community Presenter: Che-Yu Lin Advisor: Min-Puu Chen Date: August 5, Lin, F.,
Ch 10 Methodology.
You’re Leaving Footprints TROPE: Teachers’ Resources for Online Privacy Education 1.
Time-Space Trust in Networks Shunan Ma, Jingsha He and Yuqiang Zhang 1 College of Computer Science and Technology 2 School of Software Engineering.
Author Utility-Based Scheduling for Bulk Data Transfers between Distributed Computing Facilities Xin Wang, Wei Tang, Raj Kettimuthu,
Multi-Task Assignment for CrowdSensing in Mobile Social Network Mingjun Xiao ∗, Jie Wu†, Liusheng Huang ∗, Yunsheng Wang‡, and Cong Liu§
Multiple Location Profiling for Users and Relationships from Social Network and Content Rui Li, Shengjie Wang, Kevin Chen-Chuan Chang University of Illinois.
Chapter 1 MARKETING IS ALL AROUND US. The Scope of Marketing Marketing is activity, set of institutions, and processes for creating, communicating, delivering,
Nevada Department of Education Office of Educational Opportunity Nevada Comprehensive Curriculum Audit Tool for Schools NCCAT-S August
Chapter 17 Qualitative Research: General Principles PowerPoint developed by: E. Roberto Orellana & Jennifer Manuel.
Privacy Vulnerability of Published Anonymous Mobility Traces Chris Y. T. Ma, David K. Y. Yau, Nung Kwan Yip (Purdue University) Nageswara S. V. Rao (Oak.
QED : An Efficient Framework for Temporal Region Query Processing Yi-Hong Chu 朱怡虹 Network Database Laboratory Dept. of Electrical Engineering National.
Presenter: Waqas Nawaz
Classification of Research
Privacy Leakage in Personalized Mobile In-App Ads
Understanding and Exploiting Amazon EC2 Spot Instances
Consumer Markets and Consumer Buyer Behavior
Week 1 Vocab Definitions
Presentation transcript:

A Study of Smartphone User Privacy from the Advertiser's Perspective Yan Wang 1, Yingying Chen 1, Fan Ye 2, Jie Yang 3, Hongbo Liu 4 1 Department of Electrical and Computer Engineering, Stevens Institute of Technology 3 Department of Computer Science, Florida State University 2 Peking University, Beijing, China 4 Department of CIT, Indiana University- Purdue University Indianapolis Motivation ■ “Free” apps are not entirely free: users pay the price of their privacy. ■ The consequences of privacy leakages, especially when an advertiser gathers such private data from many apps multiple apps across users, are not well studied. ■ Deriving social and community information by using private data from multiple apps across users is possible, and needs more attention. Contributions ■ Modeling the relationship inference process in a three-layer framework by using the concept of connection, which is exemplified by two users sharing similar patterns in their leaked data. ■ Conducting experiments with 10 participants and their families for over one-month time period to study the privacy leakages on using smartphones in their daily lives. ■ Proposing an Activeness Based Profile as users’ temporal privacy leakage profiles based on the experimental study. ■ Verifying the generality of our findings from the real experiments based on trace-driven study using human mobility traces. Simulation Results ■ Applying the activeness based profiles to the Foursquare trace. ■ Observations:  An advertiser can achieve over 80% inference accuracy for both fact-based and intelligence-based relationship.  The inference accuracy decreases for less active users, and longer observation windows help improve the accuracy. Activeness Based Profile ■ Generating Profiles: derive the probability of each type of leakages happening in particular time windows for every participant. ■ Categorize profiles with three representative user categories based on the hours that the particular user has leakages (i.e., active user, regular user, and inactive user). Conclusions ■ This work serves as the first step towards a comprehensive understanding of the advertiser’s perspective. ■ We seek to discover what an advertiser can infer about users’ social relationships by combining different private data from many apps. ■ We propose a privacy leakage inference framework that describes a general method for inferring users’ social relationships, which can achieve high accuracy. Concept of Connections ■ The connection bridges the gap between the privacy leakage information and the users’ relationship inference. ■ Definition: a connection between two users exists if the same type of privacy leakage from the two users share certain spatial, temporal or content similarities.  Contact list: share common contacts or in each other's contacts.  Wi-Fi Access Point list: share common access points.  GPS/network-based location: leaked GPS or network-based locations are close. Study the Consequences of Privacy Leakages ■ Two types of social relationship:  Fact-based Relationship: carry similar, regular and repetitive spatial- temporal connection patterns as dictated by the relationship (e.g., colleagues, classmates, roommates, and families).  Intelligence-based Relationship: does not necessarily carry regular patterns (e.g., friends). ■ Utilizing the temporal and spatial patterns of the connections to classify the type of relationship, for example:  The connections of colleagues occur in work hours of weekdays.  The connections of families in early morning and late night.  The connections of friends after working time and in weekends. Real Experimental Study ■ Involves 10 volunteer students and their family members over one month period including five types relationships (i.e., colleague, collaborator, classmate, friend, and family). ■ Developed a tool to capture the privacy leakage information in real-time leveraging TaintDroid. ■ Participants use their experimental smartphones at least three times a day with no restriction of how and when to use apps.