Privacy Preserving In LBS

Slides:



Advertisements
Similar presentations
Efficient Evaluation of k-Range Nearest Neighbor Queries in Road Networks Jie BaoChi-Yin ChowMohamed F. Mokbel Department of Computer Science and Engineering.
Advertisements

Quality Aware Privacy Protection for Location-based Services Zhen Xiao, Xiaofeng Meng Renmin University of China Jianliang Xu Hong Kong Baptist University.
Cleaning Uncertain Data with Quality Guarantees Reynold Cheng, Jinchuan Chen, Xike Xie 2008 VLDB Presented by SHAO Yufeng.
Visual Data Mining: Concepts, Frameworks and Algorithm Development Student: Fasheng Qiu Instructor: Dr. Yingshu Li.
Self-Organized Anonymous Authentication in Mobile Ad Hoc Networks Julien Freudiger, Maxim Raya and Jean-Pierre Hubaux SECURECOMM, 2009.
PrivacyGrid Visualization Balaji Palanisamy Saurabh Taneja.
Mohamed F. Mokbel University of Minnesota
1 Sensor Relocation in Mobile Sensor Networks Guiling Wang, Guohong Cao, Tom La Porta, and Wensheng Zhang Department of Computer Science & Engineering.
1 A Distortion-based Metric for Location Privacy Workshop on Privacy in the Electronic Society (WPES), Chicago, IL, USA - November 9, 2009 Reza Shokri.
Location Privacy in Casper: A Tale of two Systems
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
Privacy Preserving Publication of Moving Object Data Joey Lei CS295 Francesco Bonchi Yahoo! Research Avinguda Diagonal 177, Barcelona, Spain 6/10/20151CS295.
On Reducing Communication Cost for Distributed Query Monitoring Systems. Fuyu Liu, Kien A. Hua, Fei Xie MDM 2008 Alex Papadimitriou.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
© nCode 2000 Title of Presentation goes here - go to Master Slide to edit - Slide 1 Reliable Communication for Highly Mobile Agents ECE 7995: Term Paper.
Temporal Pattern Matching of Moving Objects for Location-Based Service GDM Ronald Treur14 October 2003.
Anatomy: Simple and Effective Privacy Preservation Israel Chernyak DB Seminar (winter 2009)
Tracking Moving Objects in Anonymized Trajectories Nikolay Vyahhi 1, Spiridon Bakiras 2, Panos Kalnis 3, and Gabriel Ghinita 3 1 St. Petersburg State University.
Online Data Gathering for Maximizing Network Lifetime in Sensor Networks IEEE transactions on Mobile Computing Weifa Liang, YuZhen Liu.
A Customizable k-Anonymity Model for Protecting Location Privacy Written by: B. Gedik, L.Liu Presented by: Tal Shoseyov.
PRIVACY CRITERIA. Roadmap Privacy in Data mining Mobile privacy (k-e) – anonymity (c-k) – safety Privacy skyline.
C LOAKING AND M ODELING T ECHNIQUES FOR LOCATION P RIVACY PROTECTION Ying Cai Department of Computer Science Iowa State University Ames, IA
LÊ QU Ố C HUY ID: QLU OUTLINE  What is data mining ?  Major issues in data mining 2.
Location Privacy Location privacy in mobile systems: A personalized Anonymization Model Burga Gedik, Ling Liu.
A Survey on Context-Aware Computing Center for E-Business Technology Seoul National University Seoul, Korea 이상근, 이동주, 강승석, Babar Tareen Intelligent Database.
Privacy and trust in social network
F EELING - BASED L OCATION P RIVACY P ROTECTION FOR L OCATION - BASED S ERVICES CS587x Lecture Department of Computer Science Iowa State University Ames,
Overview of Privacy Preserving Techniques.  This is a high-level summary of the state-of-the-art privacy preserving techniques and research areas  Focus.
Gabriel Ghinita1 Panos Kalnis1 Ali Khoshgozaran2 Cyrus Shahabi2
Efficient Gathering of Correlated Data in Sensor Networks
Privacy Preserving Data Mining on Moving Object Trajectories Győző Gidófalvi Geomatic ApS Center for Geoinformatik Xuegang Harry Huang Torben Bach Pedersen.
Case Base Maintenance(CBM) Fabiana Prabhakar CSE 435 November 6, 2006.
Mobile Topic Maps for e-Learning John McDonald & Darina Dicheva Intelligent Information Systems Group Computer Science Department Winston-Salem State University,
Introduction to: 1.  Goal[DEN83]:  Provide frequency, average, other statistics of persons  Challenge:  Preserving privacy[DEN83]  Interaction between.
Department of Computer Science City University of Hong Kong Department of Computer Science City University of Hong Kong 1 Probabilistic Continuous Update.
Systems and Internet Infrastructure Security (SIIS) LaboratoryPage Systems and Internet Infrastructure Security Network and Security Research Center Department.
Disclosure risk when responding to queries with deterministic guarantees Krish Muralidhar University of Kentucky Rathindra Sarathy Oklahoma State University.
Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data.
Preserving Privacy in Participatory Sensing Systems Authors: Kuan Lun Huang, Salil S. Kanhere (School of CS & Engg., The University of New South Wales,
Privacy Preservation of Aggregates in Hidden Databases: Why and How? Arjun Dasgupta, Nan Zhang, Gautam Das, Surajit Chaudhuri Presented by PENG Yu.
Locating Mobile Agents in Distributed Computing Environment.
Survey on Privacy-Related Technologies Presented by Richard Lin Zhou.
ACOMP 2011 A Novel Framework for LBS Privacy Preservation in Dynamic Context Environment.
Extending Traditional Algorithms for Cyber-Physical Systems Sumeet Gujrati and Gurdip Singh Kansas State University.
Related Works LOFConclusion Introduction Contents ICISS
Ahmed Osama Research Assistant. Presentation Outline Winc- Nile University- Privacy Preserving Over Network Coding 2  Introduction  Network coding 
Group 8: Denial Hess, Yun Zhang Project presentation.
A Hybrid Technique for Private Location-Based Queries with Database Protection Gabriel Ghinita 1 Panos Kalnis 2 Murat Kantarcioglu 3 Elisa Bertino 1 1.
Trajectory Data Mining Dr. Yu Zheng Lead Researcher, Microsoft Research Chair Professor at Shanghai Jiao Tong University Editor-in-Chief of ACM Trans.
Spatial Indexing Techniques Introduction to Spatial Computing CSE 5ISC Some slides adapted from Spatial Databases: A Tour by Shashi Shekhar Prentice Hall.
EVALUATING LBS PRIVACY IN DYNAMIC CONTEXT 1. Outline 2  Overview Attack Model  Classification Defend Model  Evaluation Module  Conclusion.
Location Privacy Protection for Location-based Services CS587x Lecture Department of Computer Science Iowa State University.
Efficient Resource Allocation for Wireless Multicast De-Nian Yang, Member, IEEE Ming-Syan Chen, Fellow, IEEE IEEE Transactions on Mobile Computing, April.
Efficient OLAP Operations in Spatial Data Warehouses Dimitris Papadias, Panos Kalnis, Jun Zhang and Yufei Tao Department of Computer Science Hong Kong.
Mobile Sensor Deployment for a Dynamic Cluster-based Target Tracking Sensor Network Niaoning Shan and Jindong Tan Department of Electrical and Computter.
Saran Jenjaturong, Chalermek Intanagonwiwat Department of Computer Engineering Chulalongkorn University Bangkok, Thailand IEEE CROWNCOM 2008 acceptance.
Unraveling an old cloak: k-anonymity for location privacy
Privacy-Preserving Publication of User Locations in the Proximity of Sensitive Sites Bharath Krishnamachari Gabriel Ghinita Panos Kalnis National University.
Construction of Optimal Data Aggregation Trees for Wireless Sensor Networks Deying Li, Jiannong Cao, Ming Liu, and Yuan Zheng Computer Communications and.
 A Two-level Protocol to Answer Private Location-based Queries Roopa Vishwanathan Yan Huang [RoopaVishwanathan, Computer Science and.
Gabriel Ghinita1 Panos Kalnis1 Ali Khoshgozaran2 Cyrus Shahabi2
Feeling-based location privacy protection for LBS
Peer-to-peer networking
Location Cloaking for Location Safety Protection of Ad Hoc Networks
Location Privacy.
Efficient Evaluation of k-NN Queries Using Spatial Mashups
Speaker : Lee Heon-Jong
Continuous Density Queries for Moving Objects
Survey on Coverage Problems in Wireless Sensor Networks
Presentation transcript:

Privacy Preserving In LBS Evaluating Privacy of LBS Algorithms In Dynamic Context

Outline Introduction Design Model & Workflow System Design Specification : General Approach Build Privacy Case Based Database Conclusion & Future Work

Introduction(1) What is Context ? [1] Any information that can be used to characterize the situation of entities (whether a person, place or object) are considered relevant to the interaction between (include themselves) User Application

Introduction(2) Problem of Privacy Preserving in Dynamic Context ? Different services require different algorithms. Even in the only one service? How to evaluate privacy algorithms in dynamic context ?

Outline Introduction Design Model & Workflow System Design Model System Workflow System Design Specification : General Approach Build Privacy Case Based Database Conclusion & Future Work

Design Model System(1)

Evaluation Module[2][3]

Workflow System

Outline Introduction Design Model & Workflow System Design Specification : General Approach Build Privacy Case Based Database Conclusion & Future Work

Design Specification : General Approach Introduction to Privacy Attack Models Location Distribution Attack Maximum Movement Boundary Attack Query Tracking Attack Message attributes summary

Introduction to Privacy Attack Models Privacy attacks are categorized by Privacy Attack Model (adversary model). Attack models are differ by : Collected target information. Attacker ability in capturing message during service provisioning. Attacker background knowledge.

Privacy Attack Models Introduction (cont.) Conditions/When it takes place Appropriate techniques & Algorithm Location Distribution Attack -User locations are known. -Some users have oulier locations. -The employed spatial cloaking tends to generate minimum areas. -adding k-region property. Algorithm : CliqueCloak … Maximum Movement Boundary (MMB) attack -continuous captured queries. -same pseudonym for 2 consecutive updates. -maximum speed is known. -adding safe update property. -techniques : patching, delaying … Query Tracking Attack -adding memorization property.

Privacy Attack Models Content Introduction Location Distribution Attack Maximum Movement Boundary Attack Query Tracking Attack Message attributes summary

Privacy Attack Models Location Distribution Attack Location Distribution Attack takes place when: User locations are known Some user have outlier locations. The employed spatial cloaking algorithm tends to generate minimum areas. F E D C B A Given a cloaked spatial region covering a sparse area (user A) and a partial dense area (user B, C, and D), an adversary can easily figure out that the query issuer is an outlier.

Solution to Location Distribution Attack k-Sharing property K-sharing Region Property: A cloaked spatial region not only contains at least k users, but it also is shared by at least k of these users. The same cloaked spatial region is produced from k users. An adversary cannot link the region to an outlier. F E D C B A Result in an overall more privacy-aware environment. Example of technique that are free from this attack include CliqueCloak.

Solution to Location Distribution Attack CliqueCloak algorithm Each user requests: A level of k anomity. A constraint area. Build an undirected constraint graph. Two nodes are linked, if their constraint areas contain each other. E (k=3) B (k=4) F (k=5) D (k=4) For a new user m, add m to the graph. Find the set of nodes that are linked to m in the graph and has level of anonymity less than m.k. m (k=3) H (k=4) A (k=3) C (k=2) The cloaked region is the MBR (cloaking box) that includes the user and the neighboring nodes. All users within an MBR use that MBR as their cloaked region.

Solution to Location Distribution Attack CliqueCloak pseudo-code while TRUE do pick a message m from S. N ← all messages in range B(m) for each n in N do: if P(m) is in B(n) then: add the edge (m,n) into G M ← local_k_search(m.k, m, G) if M ≠ Ø then Bcl(M) ← The minimal area that contains M for each n in M do remove n from S remove n from G nT ← < n.uid, n.rno, Bcl(M), n.C > output transformed message nT remove expired messages from S Building constraint graph G Finding a subset M of S s.t. m is in M, m.k = |M|, for each n in M n.k ≤ |M|, and M forms a clique in G. Building transformed messages from all messages in M

Solution to Location Distribution Attack CliqueCloak pseudo-code(cont local_k_search(k, m, G) U ← { n | (m,n) is an edge in G and n.k ≤ k } if |U| < k-1 then return Ø l ← 0 while l ≠ |U| do l ← |U| for each u in U do if |{G neighbors of u in U}| < k-2 then U ← U \ {u} find any subset M in U s.t. |M| = k-1 and M U {m} forms a clique return M U {m} Find a group U of neighbors to m in G s.t. their anonymity value doesn’t exceed k. Remove members of U with less than k-2 neighbors, that cannot provide us with a (k-1)-clique Look for a k-clique inside U.

Solution to Location Distribution Attack CliqueCloak message specification A plan message (from client to server) m consists of: m.uid = Unique identifier of the sender m.rno = Message’s reference number P(m) = Message’s spatial point (e.g. the client’s current location). B(m) = Message’s spatial constraint area m.t = Message’s temporal constraint (expiration time) m.C = Message’s content m.k = Message’s anonymity level

Solution to Location Distribution Attack CliqueCloak message specification(cont.) A transformed message (from server to database) mT consists of: m.uid , m.rno Bcl(m) = Message’s spatial cloaking box m.C

Solution to Location Distribution Attack Evaluation of CliqueCloak Pros: Free from location distribution attack (query sampling attack). Cons: suffers from high computational cost as it can support only k-anomity up to k=10. cost of searching a clique in a graph is costly. some requests that cannot be anonymized will be dropped when their lifetimes expire.

Privacy Attack Models Content Introduction Location Distribution Attack Maximum Movement Boundary Attack Query Tracking Attack Message attributes summary

Privacy Attack Models Maximum Movement Boundary Attack I know you are here! Maximum movement boundary attack takes place when: Continuous location updates or continuous queries are considered The same pseudonym is used for two consecutive updates The maximum possible speed is known The maximum speed is used to get a maximum movement boundary (MBB) The user is located at the intersection of MBB with the new cloaked region Ri+1 Ri

Solution to Maximum Movement Boundary Attack Safe Update Property[4] Two consecutive cloaked regions Ri and Ri+1 from the same users are free from the maximum movement boundary attack if one of these three conditions hold: The overlapping area satisfies user requirements Ri totally covers Ri+1 The MBB of Ri totally covers Ri+1 Ri Ri+1 Ri Ri+1 Ri Ri+1 The MMB of Ri totally covers Ri+1

Solution to Maximum Movement Boundary Attack Patching and Delaying[4][9] Patching: Combine the current cloaked spatial region with the previous one Delaying: Postpone the update until the MMB covers the current cloaked spatial region Ri+1 Ri+1 Ri Ri

Solution to Maximum Movement Boundary Attack Using ICliqueCloak Algorithm[10] Main idea Incrementally maintain maximal cliques for location cloaking in an un-directed graph that takes into consideration the effect of continuous location updates. Use a graph model to formulate the problem Each mobile user is represented by a node in the graph An edge exists between two nodes/users only if they are within the MMB of each other and can be potentially cloaked together

Solution to Maximum Movement Boundary Attack Using ICliqueCloak Algorithm[10] Graph Modeling Let G(V, E) be an undirected graph where V is the set of nodes/users who submitted location-based query requests, and E is the set of edges. There exists an edge evwbetween two nodes/users v and w, if and only if v≠w v is covered by MMB w,ti−1,ti w is covered by MMB v,ti−1,ti Area(MBR(v, w)) < A max

Solution to Maximum Movement Boundary Attack Using ICliqueCloak Algorithm[10] maximal clique as a clique that is not contained in any other clique. start with a graph without any edges All nodes themselves constitute a set of 1-node cliques. Then add the edges to the graph one by one and incrementally update the set of maximal cliques. the cliques where the user of the new request is involved might be candidate cloaking sets, classified to three classes: positive candidates negative candidates not candidates

Solution to Maximum Movement Boundary Attack Using ICliqueCloak Algorithm[10] Performance

Maximum Movement Boundary Attack Atributes Location Time Maximum velocity Privacy level k User-tolerant maximum area Amax

Privacy Attack Models Content Introduction Location Distribution Attack Maximum Movement Boundary Attack Query Tracking Attack Message attributes summary

Query attacks K-anonymity: Query attacks: Query sampling attacks Interval Cloak, CliqueCloak, Uncertainty Cloaking,… Query attacks: Query sampling attacks Query homogeneity attacks Query tracking attacks Hầu hết những nghiên cứu đã có đều tập trung vào thiết kế một giải thuật “cloaking” hiệu quả để đạt được location k-anonymity. Ý tưởng của location k-anonymity nhằm dấu đi user thực sự trong số những user khác hay kẻ tấn công không biết ai trong số k người là người đã gửi yêu cầu dịch vụ. Để làm được điều này người ta sử dụng các “cloaking regions” (Interval Cloak, CliqueCloak, Uncertainty Cloaking,…). Tuy nhiên privacy vẫn bị ảnh hưởng bởi các tấn công sau.

Query homogeneity attacks[12] Đây là ví dụ trong cơ sở dữ liệu. Tương tự trong LBS

Query tracking attacks[4] F This attack takes place when: Continuous location updates or continuous queries are considered The same pseudonym is used for several consecutive updates User locations are known Once a query is issued, all users in the query region are candidates to be the query issuer If the query is reported again, the intersection of the candidates between the query instances reduces the user privacy G H D E A C I B J K At time ti {A,B,C,D,E} At time ti+1{A,B,F,G,H} At time ti+2 {A,F,G,H,I}

Solutions Memorizing m-Invariance Historical k-Anonymity …

Memorizing[4] Remember a set of users S that is contained in the cloaked spatial region when the query is initially registered with the database server Adjust the subsequent cloaked spatial regions to contain at least k of these users. F G H D E A C I B J K If a user s is not contained in a subsequent cloaked spatial region, this user is immediately removed from S. This may result in a very large cloaked spatial region. At some point, the server may decide to disconnect the query and restart it with a new identity.

Query m-Invariance[11][13] Query l-diversity: ensures that a user cannot be linked to less than ℓ distinct service attribute values. Trade-off: pravacy <-> QoS

Query m-Invariance(cont) Satisfying location k-anonymity Satisfying query ℓ-diversity query 3-diverse and location 3-anonymous ví dụ về các vùng làm mờ được sinh ra thỏa mãn query 3-diverse và location 3-anonymous. Tuy nhiên vẫn bị Query tracking attack.

Query m-Invariance(cont) Query m-Invariance: the number of possible query association attacks will increase if a user can be associated with more number of service attribute values.

Attributes A plain message sent from user: Id: Unique identifier of the sender. Ref: Message’s reference number. P: Message’s spatial point (e.g. user current location). C: Message’s content. k: Message’s anonymity level. ℓ: Message’s diversity level. m: Message’s invariance level.

Privacy Attack Models Content Introduction Location Distribution Attack Maximum Movement Boundary Attack Query Tracking Attack Message attributes summary

Attack Model privacy Message attributes summary A plain message sent from user must consist of 11 attributes: Id: Unique identifier of the sender. Ref: Message’s reference number. P: Message’s spatial point (e.g. user current location). B: Message’s spatial constraint area. t: Message’s temporal constraint (expiration time). v: velocity / maximum speed. QoS: quality of service. C: Message’s content. k: Message’s anonymity level. ℓ: Message’s diversity level. m: Message’s invariance level.

Outline Introduction Design Model & Workflow System Design Specification : General Approach Build Privacy Case Based Database Conclusion & Future Work

Build Privacy Case Based Database From attack model and attributes we found, a case will include: Input attributes Graph Algorithm using to protect privacy Specification Define a interval for each attribute Define some properties which input must satisfy them Note To reduce the computation, we just calculate on subgraph which is related to the query issuer. Database will delete queries which is expired

Outline Introduction Design Model & Workflow System Design Specification : General Approach Build Privacy Case Based Database Conclusion & Future Work

Conclusion Evaluating privacy algorithms in dynamic context need a flexible technique Calculation case-based Ontology reasoner Attack Models are core component of calculation case-based

Future Work Continue on case-base specification Research other attack models Study on User, CP, SP. Select appropriate structure for case-base data. Tree structure: parent node present a more general case. Specify Ontology Reasoner.

Reference [1]. Anind K. Dey and Gregory D. Abowd. Towards a Better Understanding of Context and Context-Awareness. In Graphics, Visualization and Usability Center and College of Computing, Georgia Tech, Atlanta, GA USA, 30332-0280, 2000. [2]. Yonnim Lee, Ohbyung Kwon: An index-based privacy preserving service trigger in context-aware computing environments. In Expert Systems with Applications 37, p.5192–5200, 2010. [3]. Claudio Bettini, Linda Pareschi, Daniele Riboni: Efficient profile aggregation and policy evaluation in a middleware for adaptive mobile applications. In: Pervasive and mobile computing. ISSN 1574-1192, p. 697-718, 2008 Oct. [4] Mohamed F. Mokbel. Privacy in Location-based Services: State-of-the-art and Research Directions. 2007 International Conference on Mobile Data Management. [5] B. Gedik and L.Liu. A customizable k-Anonymity Model for Protecting Location Privacy. Proc. IEEE Int'l Conf. Distributed Computing Systems (ICDCS '05), pp. 620-629, 2005. [6] B. Gedik and L.Liu. Location Privacy in Mobile Systems: A Personalized Anonymization Model. In ICDCS, 2005.

Reference [7] Z. Xiao, X. Meng and J. Xu. Quality Aware Privacy Protection for Location-based Services. Proc. the 12th Int. Conf. on Database Systems for Advanced Applications (DASFAA '07), Bangkok, Thailand, April 2007. [8] Chi-Yin Chow and Mohamed F. Mokbel. Enable Private Continuous Queries For Revealed User Locations. Proc. Int'l Symp. Spatial and Temporal Databases (SSTD), 2007. [9] . Reynold Cheng, Yu Zhang, Elisa Bertino, and Sunil Prabhakar. Preserving User Location Privacy in Mobile Data Management Infrastructures. In Proceedings of Privacy Enhancing Technology Workshop, PET, 2006. [10]. X.Pan, J.Xu, and X.Meng. Protecting Location Privacy against Location-Dependent Attack in Mobile Services. Conference on Information and Knowledge Management. Proceeding of the 17th ACM conference on Information and knowledge management 2008,  Napa Valley, California, USA    October 26 - 30, 2008. [11] Rinku Dewri, Indrakshi Ray, Indrajit Ray and Darrell Whitley. Query m-Invariance: Preventing Query Disclosures in Continuous Location-Based Services., 11th International Conference on Mobile Data Management, MDM 2010, Kansas City, Missouri, USA, May 23-26, 2010

Reference [12] Fuyu Liu, Kien A. Hua, Ying Cai. Query l-diversity in Location-Based Services, in Proceedings of the 10th International Conference on Mobile Data Management: Systems, Services and Middleware, 2009, pp. 436–442. [13] Panos Kalnis, Gabriel Ghinita, Kyriakos Mouratidis, and Dimitris Papadias. Preventing Location-Based Identity Inference in Anonymous Spatial Queries, IEEE Transactions on Knowledge and Data Engineering, vol. 19, no. 12, pp. 1719-1733, Aug. 2007