Virtual Trip Lines for Distributed Privacy- Preserving Traffic Monitoring Baik Hoh et al. MobiSys08 Slides based on Dr. Hoh’s MobiSys presentation.

Slides:



Advertisements
Similar presentations
Cipher Techniques to Protect Anonymized Mobility Traces from Privacy Attacks Chris Y. T. Ma, David K. Y. Yau, Nung Kwan Yip and Nageswara S. V. Rao.
Advertisements

Mitigate Unauthorized Tracking in RFID Discovery Service Qiang Yan 1, Robert H. Deng 1, Zheng Yan 2, Yingjiu Li 1, Tieyan Li 3 1 Singapore Management University,
On the Optimal Placement of Mix Zones Julien Freudiger, Reza Shokri and Jean-Pierre Hubaux PETS, 2009.
Preserving Location Privacy Uichin Lee KAIST KSE Slides based on by Ling Liuhttp://
Privacy of Location Trajectory
VTrack: Energy-Aware Traffic Delay Estimation Using Mobile Phones Lenin Ravindranath, Arvind Thiagarajan, Katrina LaCurts, Sivan Toledo, Jacob Eriksson,
Virtual Trip Lines for Distributed Privacy-Preserving Traffic Monitoring Baik Hoh, Marco Gruteser WINLAB / ECE Dept., Rutgers University Ryan Herring,
VTrack: Accurate, Energy-Aware Road Traffic Delay Estimation Using Mobile Phones Arvind Thiagarajan, Lenin Ravindranath, Katrina LaCurts, Sivan Toledo,
Presenter: Nguyen Ba Anh HCMC University of Technology Information System Security Course.
Ragib Hasan Johns Hopkins University en Spring 2011 Lecture 3 02/14/2010 Security and Privacy in Cloud Computing.
Improving Transportation Systems Dan Work Civil and Environmental Engineering, UC Berkeley Center for Information Technology Research in the Interest of.
PrivacyGrid Visualization Balaji Palanisamy Saurabh Taneja.
Mohamed F. Mokbel University of Minnesota
Hossein Ahmadi, Nam Pham, Raghu Ganti, Tarek Abdelzaher, Suman Nath, Jiawei Han Pallavi Arora.
Tracking Fine-grain Vehicular Speed Variations by Warping Mobile Phone Signal Strengths Presented by Tam Vu Gayathri Chandrasekaran*, Tam Vu*, Alexander.
Federated Authentication mechanism for mobile services Dasun Weerasinghe, Saritha Arunkumar, M Rajarajan, Veselin Rakocevic Mobile Networks Research Group.
1 A Distortion-based Metric for Location Privacy Workshop on Privacy in the Electronic Society (WPES), Chicago, IL, USA - November 9, 2009 Reza Shokri.
 Guarantee that EK is safe  Yes because it is stored in and used by hw only  No because it can be obtained if someone has physical access but this can.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
Privacy Preserving Publication of Moving Object Data Joey Lei CS295 Francesco Bonchi Yahoo! Research Avinguda Diagonal 177, Barcelona, Spain 6/10/20151CS295.
ITIS 3200 Intro to Security and Privacy Dr. Weichao Wang.
Secure communications Week 10 – Lecture 2. To summarise yesterday Security is a system issue Technology and security specialists are part of the system.
ITIS 6200/8200. time-stamping services Difficult to verify the creation date and accurate contents of a digital file Required properties of time-stamping.
TEMPLATE DESIGN © Privacy Issues of Vehicular Ad-hoc Networks (VANETs) Hang Dok and Ruben Echevarria Advisor: Dr. Huirong.
MobiHide: A Mobile Peer-to-Peer System for Anonymous Location-Based Queries Gabriel Ghinita, Panos Kalnis, Spiros Skiadopoulos National University of Singapore.
Privacy of Location Information in Vehicular Ad Hoc Networks Walaa El-Din M. Moustafa.
What is Influx InfoTech ?. About Influx InfoTech IT products & services company Delivering technology driven business solutions Hi-end infrastructure,
Calling all cars: cell phone networks and the future of traffic Presentation by Scott Corey Article written by Haomiao Huang.
Rutgers: Gayathri Chandrasekaran, Tam Vu, Marco Gruteser, Rich Martin,
This slide brought to you by What to Do With Thousands of GPS Tracks John Krumm, PhD Microsoft Research Redmond, WA.
1 Preserving Privacy in GPS Traces via Uncertainty-Aware Path Cloaking by: Baik Hoh, Marco Gruteser, Hui Xiong, Ansaf Alrabady ACM CCS '07 Presentation:
Baik Hoh Marco Gruteser Hui Xiong Ansaf Alrabady All images are credited to “ACM” Hoh et al (2007), pp
Sensys 2009 Speaker:Lawrence.  Introduction  Overview & Challenges  Algorithm  Travel Time Estimation  Evaluation  Conclusion.
R 18 G 65 B 145 R 0 G 201 B 255 R 104 G 113 B 122 R 216 G 217 B 218 R 168 G 187 B 192 Core and background colors: 1© Nokia Solutions and Networks 2014.
Privacy Preserving Query Processing in Cloud Computing Wen Jie
Mobile and Wireless Communication Security By Jason Gratto.
Optimizing Mixing in Pervasive Networks: A Graph-Theoretic Perspective
Overview of Privacy Preserving Techniques.  This is a high-level summary of the state-of-the-art privacy preserving techniques and research areas  Focus.
Privacy Preserving Data Mining on Moving Object Trajectories Győző Gidófalvi Geomatic ApS Center for Geoinformatik Xuegang Harry Huang Torben Bach Pedersen.
A Privacy-Preserving Interdomain Audit Framework Adam J. Lee Parisa Tabriz Nikita Borisov University of Illinois, Urbana-Champaign WPES 2006.
Toward Community Sensing Andreas Krause Carnegie Mellon University Joint work with Eric Horvitz, Aman Kansal, Feng Zhao Microsoft Research Information.
Identity-Based Secure Distributed Data Storage Schemes.
Systems and Internet Infrastructure Security (SIIS) LaboratoryPage Systems and Internet Infrastructure Security Network and Security Research Center Department.
Secure Authentication Scheme with Anonymity for Wireless Communications Speaker : Hong-Ji Wei Date :
Survey on Privacy-Related Technologies Presented by Richard Lin Zhou.
1 Hiding Stars with Fireworks: Location Privacy through Camouflage Joseph Meyerowitz Romit Roy Choudhury ECE and PhysicsDept. of ECE and CS.
Elastic Pathing: Your Speed Is Enough to Track You Presented by Ali.
Collusion-Resistant Anonymous Data Collection Method Mafruz Zaman Ashrafi See-Kiong Ng Institute for Infocomm Research Singapore.
Preserving Location Privacy in Wireless LANs Jiang, Wang and Hu MobiSys 2007 Presenter: Bibudh Lahiri.
Preserving Privacy in GPS Traces via Uncertainty- Aware Path Cloaking Baik Hoh, Marco Gruteser, Hui Xiong, Ansaf Alrabady Presented by Joseph T. Meyerowitz.
Authentication Issues and Solutions CSCI 5857: Encoding and Encryption.
GameSec 2010 November 22, Berlin Mathias Humbert, Mohammad Hossein Manshaei, Julien Freudiger and Jean-Pierre Hubaux EPFL - Laboratory for Computer communications.
Computer Science 1 TinySeRSync: Secure and Resilient Time Synchronization in Wireless Sensor Networks Speaker: Sangwon Hyun Acknowledgement: Slides were.
SPEAKER: HONG-JI WEI DATE: Secure Anonymous Authentication Scheme with Roaming for Mobile Networks.
Preserving Privacy GPS Traces via Uncertainty-Aware Path Cloaking Baik Hoh, Marco Gruteser, Hui Xiong, Ansaf Alrabady Presenter:Yao Lu ECE 256, Spring.
Location Privacy Protection for Location-based Services CS587x Lecture Department of Computer Science Iowa State University.
Week Aug-24 – Aug-29 Introduction to Spatial Computing CSE 5ISC Some slides adapted from the book Computing with Spatial Trajectories, Yu Zheng and Xiaofang.
Mapping Internet Sensor With Probe Response Attacks Authors: John Bethencourt, Jason Franklin, and Mary Vernon. University of Wisconsin, Madison. Usenix.
SPEAKER: HONG-JI WEI DATE: Efficient and Secure Anonymous Authentication Scheme with Roaming Used in Mobile Networks.
1 Travel Times from Mobile Sensors Ram Rajagopal, Raffi Sevlian and Pravin Varaiya University of California, Berkeley Singapore Road Traffic Control TexPoint.
ABJ60 – Spatial Data and Information Science – Operations and Congestion Operations and Congestion.
Big Data Security Issues in Cloud Management. BDWG Big Data Working Group Researchers 1: Data analytics for security 2: Privacy preserving 3: Big data-scale.
1 Anonymity. 2 Overview  What is anonymity?  Why should anyone care about anonymity?  Relationship with security and in particular identification 
Privacy Vulnerability of Published Anonymous Mobility Traces Chris Y. T. Ma, David K. Y. Yau, Nung Kwan Yip (Purdue University) Nageswara S. V. Rao (Oak.
Information Security, Theory and Practice.
VANET.
網路環境中通訊安全技術之研究 Secure Communication Schemes in Network Environments
Location Privacy.
A Unified Framework for Location Privacy
Trust-based Privacy Preservation for Peer-to-peer Data Sharing
Presentation transcript:

Virtual Trip Lines for Distributed Privacy- Preserving Traffic Monitoring Baik Hoh et al. MobiSys08 Slides based on Dr. Hoh’s MobiSys presentation

Collaborative Traffic Monitoring using Cellphone- based Probe Vehicles Probe Vehicles Satellite Traffic Estimation Data mining and logging Cellular Service Provider Vehicle ID | timestamp | Lon | Lat | Speed | Heading ,18-oct :11:12, , ,42.18, ,18-oct :11:12, , ,63.72, ,18-oct :11:12, , ,50.15,75 254,18-oct :12:12, , ,45.18, ,18-oct :12:12, , ,60.01, ,18-oct :12:12, , ,45.88,235 … 254,18-oct :21:12, , ,45.67,135 Location Proxy Access Control Anonymization Anonymous Trace log files

Inference/Insider Attacks Compromise Location Privacy Still insider attacks and remote break-ins possible Re-identification of traces through data analysis Home Identification [Hoh06] Tracking algorithms recover individual trace [Hoh05] (Median trip time only 15min) Anonymous Trace log files GPS often precise enough to identify home

Related Works: Uncertainty-Aware Path Cloaking Requires a Trustworthy Proxy Server [Hoh07] Time-to-confusion (TTC) criterion* measures time an adversary can track with high confidence Disclosure control algorithm that selectively reveals GPS samples to limit the maximum Time-to- confusion

What if location proxy got compromised? Idea: distributed “privacy” preserving scheme (a la secret splitting) using Virtual Trip Lines (VTLs) Probe Vehicles Satellite Traffic Estimation Data mining and logging Cellular Service Provider Location Proxy Vehicle ID | timestamp | Lon | Lat | Speed | Heading ,18-oct :11:12, , ,42.18, ,18-oct :11:12, , ,63.72,100

Virtual Trip Lines (VTLs) Enables Sampling in Space Better than sampling in time (periodic reports)? Chance of distributed architecture? VTL has the same effect as "road side” sensor based measurement –VTL can be strategically chosen (optimal placement in the paper)

Any single entity can be compromised (but no collusion) A driver’s cellphone is trustworthy Privacy Risks and Threat Model My Phone Satellite Traffic Estimation Data mining and logging Location Proxy Cellular Service Provider Others

Probablistic Guarantee Model (Mix Zone) Mobile generates data: VTL ID, speed, direction Mobile encrypts data using VTL server’s public key Privacy guarantee: –Location proxy: can’t decrypt location data –VTL server: can’t find user’s identity (but still inference attack is feasible, e.g., only single vehicle reporting data..) Traffic Estimation Location Proxy Cell Service Provider VTL Server E(VTL ID, speed, dir) Mobile’s ID, E(VTL ID, speed, dir)  Remove Mobile’s ID E(VTL ID, speed, dir)  VTL decrypts the data

Placement Privacy Constraints: Minimum Spacing Tracking uncertainty is dependent on the spacing between VTLs, the penetration rate, and speed variations of vehicles

Placement Privacy Constraints: Exclusion Areas Low speed samples are likely generated by vehicles that just entered after the ramp Suppress sampling on on-/off-ramps

Guaranteed Privacy Model with VTL-based k-anonymity (called Distributed VTL-Based Temporal Cloaking) k=7 VTLIDnew = h (nonce, VTLIDold), h is a secure hash function

Distributed VTL-Based Temporal Cloaking Motivated by secret splitting scheme Traffic estimation is immune to temporal error EntityRoleIdentityLocationTime HandsetSensingYesAccurate Location VerifierDistributing VTL ID updates YesCoarseAccurate ID proxyAnonymizing and Cloaking YesNot availableAccurate Traffic ServerComputing Traffic Congestion NoAccurateCloaked Virtual Trip Lines Temporal Cloaking