Preserving Privacy GPS Traces via Uncertainty-Aware Path Cloaking Baik Hoh, Marco Gruteser, Hui Xiong, Ansaf Alrabady Presenter:Yao Lu ECE 256, Spring.

Slides:



Advertisements
Similar presentations
Cipher Techniques to Protect Anonymized Mobility Traces from Privacy Attacks Chris Y. T. Ma, David K. Y. Yau, Nung Kwan Yip and Nageswara S. V. Rao.
Advertisements

On the Optimal Placement of Mix Zones Julien Freudiger, Reza Shokri and Jean-Pierre Hubaux PETS, 2009.
Quality Aware Privacy Protection for Location-based Services Zhen Xiao, Xiaofeng Meng Renmin University of China Jianliang Xu Hong Kong Baptist University.
Virtual Trip Lines for Distributed Privacy-Preserving Traffic Monitoring Baik Hoh, Marco Gruteser WINLAB / ECE Dept., Rutgers University Ryan Herring,
Trust-based Anonymous Communication: Models and Routing Algorithms Aaron Johnson Paul Syverson Roger Dingledine Nick Mathewson U.S. Naval Research Laboratory.
Yu Stephanie Sun 1, Lei Xie 1, Qi Alfred Chen 2, Sanglu Lu 1, Daoxu Chen 1 1 State Key Laboratory for Novel Software Technology, Nanjing University, China.
Worm Origin Identification Using Random Moonwalks Yinglian Xie, V. Sekar, D. A. Maltz, M. K. Reiter, Hui Zhang 2005 IEEE Symposium on Security and Privacy.
An Approach to Evaluate Data Trustworthiness Based on Data Provenance Department of Computer Science Purdue University.
Tracking Fine-grain Vehicular Speed Variations by Warping Mobile Phone Signal Strengths Presented by Tam Vu Gayathri Chandrasekaran*, Tam Vu*, Alexander.
Small-world Overlay P2P Network
1 A Distortion-based Metric for Location Privacy Workshop on Privacy in the Electronic Society (WPES), Chicago, IL, USA - November 9, 2009 Reza Shokri.
ZIGZAG A Peer-to-Peer Architecture for Media Streaming By Duc A. Tran, Kien A. Hua and Tai T. Do Appear on “Journal On Selected Areas in Communications,
Pengujian Hipotesis Nilai Tengah Pertemuan 19 Matakuliah: I0134/Metode Statistika Tahun: 2007.
Anatomy: Simple and Effective Privacy Preservation Israel Chernyak DB Seminar (winter 2009)
Tracking Moving Objects in Anonymized Trajectories Nikolay Vyahhi 1, Spiridon Bakiras 2, Panos Kalnis 3, and Gabriel Ghinita 3 1 St. Petersburg State University.
The Union-Split Algorithm and Cluster-Based Anonymization of Social Networks Brian Thompson Danfeng Yao Rutgers University Dept. of Computer Science Piscataway,
PRIVACY CRITERIA. Roadmap Privacy in Data mining Mobile privacy (k-e) – anonymity (c-k) – safety Privacy skyline.
CS401 presentation1 Effective Replica Allocation in Ad Hoc Networks for Improving Data Accessibility Takahiro Hara Presented by Mingsheng Peng (Proc. IEEE.
Rutgers: Gayathri Chandrasekaran, Tam Vu, Marco Gruteser, Rich Martin,
1 Preserving Privacy in GPS Traces via Uncertainty-Aware Path Cloaking by: Baik Hoh, Marco Gruteser, Hui Xiong, Ansaf Alrabady ACM CCS '07 Presentation:
Baik Hoh Marco Gruteser Hui Xiong Ansaf Alrabady All images are credited to “ACM” Hoh et al (2007), pp
Package Transportation Scheduling Albert Lee Robert Z. Lee.
Toward a Statistical Framework for Source Anonymity in Sensor Networks.
Protein Structure Alignment by Incremental Combinatorial Extension (CE) of the Optimal Path Ilya N. Shindyalov, Philip E. Bourne.
Lifetime and Coverage Guarantees Through Distributed Coordinate- Free Sensor Activation ACM MOBICOM 2009.
Preserving Link Privacy in Social Network Based Systems Prateek Mittal University of California, Berkeley Charalampos Papamanthou.
APPLYING EPSILON-DIFFERENTIAL PRIVATE QUERY LOG RELEASING SCHEME TO DOCUMENT RETRIEVAL Sicong Zhang, Hui Yang, Lisa Singh Georgetown University August.
Localization With Mobile Anchor Points in Wireless Sensor Networks
WMNL Sensors Deployment Enhancement by a Mobile Robot in Wireless Sensor Networks Ridha Soua, Leila Saidane, Pascale Minet 2010 IEEE Ninth International.
Tonghong Li, Yuanzhen Li, and Jianxin Liao Department of Computer Science Technical University of Madrid, Spain Beijing University of Posts & Telecommunications.
Energy-Aware Scheduling with Quality of Surveillance Guarantee in Wireless Sensor Networks Jaehoon Jeong, Sarah Sharafkandi and David H.C. Du Dept. of.
Thwarting Passive Privacy Attacks in Collaborative Filtering Rui Chen Min Xie Laks V.S. Lakshmanan HKBU, Hong Kong UBC, Canada UBC, Canada Introduction.
Mobile Traffic Sensor Network versus Motion-MIX: Tracing and Protecting Mobile Wireless Nodes JieJun Kong Dapeng Wu Xiaoyan Hong and Mario Gerla.
Refined privacy models
Aditya Akella The Performance Benefits of Multihoming Aditya Akella CMU With Bruce Maggs, Srini Seshan, Anees Shaikh and Ramesh Sitaraman.
1/30 Energy-Efficient Forwarding Strategies for Geographic Routing in Lossy Wireless Sensor Networks Wireless and Sensor Network Seminar Dec 01, 2004.
ENERGY-EFFICIENT FORWARDING STRATEGIES FOR GEOGRAPHIC ROUTING in LOSSY WIRELESS SENSOR NETWORKS Presented by Prasad D. Karnik.
1 Hiding Stars with Fireworks: Location Privacy through Camouflage Joseph Meyerowitz Romit Roy Choudhury ECE and PhysicsDept. of ECE and CS.
Elastic Pathing: Your Speed Is Enough to Track You Presented by Ali.
Preserving Location Privacy in Wireless LANs Jiang, Wang and Hu MobiSys 2007 Presenter: Bibudh Lahiri.
Randomization in Privacy Preserving Data Mining Agrawal, R., and Srikant, R. Privacy-Preserving Data Mining, ACM SIGMOD’00 the following slides include.
A Sociability-Based Routing Scheme for Delay-Tolerant Networks May Chan-Myung Kim
1 A Framework for Measuring and Predicting the Impact of Routing Changes Ying Zhang Z. Morley Mao Jia Wang.
Preserving Privacy in GPS Traces via Uncertainty- Aware Path Cloaking Baik Hoh, Marco Gruteser, Hui Xiong, Ansaf Alrabady Presented by Joseph T. Meyerowitz.
CpSc 881: Machine Learning Evaluating Hypotheses.
1 - CS7701 – Fall 2004 Review of: Detecting Network Intrusions via Sampling: A Game Theoretic Approach Paper by: – Murali Kodialam (Bell Labs) – T.V. Lakshman.
Virtual Trip Lines for Distributed Privacy- Preserving Traffic Monitoring Baik Hoh et al. MobiSys08 Slides based on Dr. Hoh’s MobiSys presentation.
1 Utilizing Shared Vehicle Trajectories for Data Forwarding in Vehicular Networks IEEE INFOCOM MINI-CONFERENCE Fulong Xu, Shuo Gu, Jaehoon Jeong, Yu Gu,
MaskIt: Privately Releasing User Context Streams for Personalized Mobile Applications SIGMOD '12 Proceedings of the 2012 ACM SIGMOD International Conference.
1 An Arc-Path Model for OSPF Weight Setting Problem Dr.Jeffery Kennington Anusha Madhavan.
Location Privacy Protection for Location-based Services CS587x Lecture Department of Computer Science Iowa State University.
Week Aug-24 – Aug-29 Introduction to Spatial Computing CSE 5ISC Some slides adapted from the book Computing with Spatial Trajectories, Yu Zheng and Xiaofang.
Probabilistic km-anonymity (Efficient Anonymization of Large Set-valued Datasets) Gergely Acs (INRIA) Jagdish Achara (INRIA)
U of Minnesota DIWANS'061 Energy-Aware Scheduling with Quality of Surveillance Guarantee in Wireless Sensor Networks Jaehoon Jeong, Sarah Sharafkandi and.
Privacy Preserving in Social Network Based System PRENTER: YI LIANG.
School of Systems, Engineering, University of Reading rkala.99k.org April, 2013 Motion Planning for Multiple Autonomous Vehicles Rahul Kala Congestion.
1 Anonymity. 2 Overview  What is anonymity?  Why should anyone care about anonymity?  Relationship with security and in particular identification 
Privacy Vulnerability of Published Anonymous Mobility Traces Chris Y. T. Ma, David K. Y. Yau, Nung Kwan Yip (Purdue University) Nageswara S. V. Rao (Oak.
Talal H. Noor, Quan Z. Sheng, Lina Yao,
Feeling-based location privacy protection for LBS
Worm Origin Identification Using Random Moonwalks
Location Cloaking for Location Safety Protection of Ad Hoc Networks
Rongxing Lu, Xiaodong Lin, Xiaohui Liang, Xuemin (Sherman) Shen
Motion Planning for Multiple Autonomous Vehicles
When Security Games Go Green
Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity and Identity Management – A Consolidated Proposal for Terminology Authors: Andreas.
SIMPLE ONLINE AND REALTIME TRACKING WITH A DEEP ASSOCIATION METRIC
Presented by : SaiVenkatanikhil Nimmagadda
Continuous Density Queries for Moving Objects
Trust-based Privacy Preservation for Peer-to-peer Data Sharing
Presentation transcript:

Preserving Privacy GPS Traces via Uncertainty-Aware Path Cloaking Baik Hoh, Marco Gruteser, Hui Xiong, Ansaf Alrabady Presenter:Yao Lu ECE 256, Spring 11 Duke University

2 Overview Introduction Problem Statement Previous work Proposed method Evaluation Discussion

Motivation

Adversary Model Use successive location samples from a vehicle to reconstruct its path mix of various samples belonging to several vehicles. Predict the target position using the last known speed and heading information and then decide which next sample to link to the same vehicle. If multiple candidate samples exist, choose the one with the highest a posteriori probability based on a probability model of distance and time deviations from the prediction. If several of these samples appear similar to each other, no decision with high certainty is possible and tracking stops.

Problem Statement Objective 1.Privacy Protection: Guarantee strong anonymity in high and low density areas 2.Data quality: Provide sufficient information for traffic monitoring Assumptions 1.Trustworthy server to execute centralized algorithm 2.Adversary has no priori information of the tracking subject

When two paths cross

Existing privacy algorithms K-anonymity: to generalize a data record until it is indistinguishable from the records of at least k-1 other individuals

Existing privacy algorithms Subsampling

Privacy Metrics Mean Time To Confusion (MTTC) Tracking Uncertainty

Uncertainty calculation 1

Uncertainty calculation 2

Path Privacy-Preserving Mechanism Only reveal locations samples when (1)time since the last point of confusion is less than the maximum time to confusion (2)at the current time tracking uncertainty is above the uncertainty threshold

Reacquisition Tracking Model Time Window w=10Minutes. After the confusion Timeout expires: Each released sample need to maintain confusion from the last released positions within the window Before the confusion Timeout expires: Each released sample need to maintain confusion to any released samples within the windows

Evaluation: Data Set week-long GPS traces of 233 probe vehicles on a 70km-by-70km area 1 minute sampling period Overlay it into day-long traces of 2000 vehicles Metrics: Tracking time and (relative) weighted road coverage Baseline algorithm: random sampling with probability p

Evaluation: Protection Against Target Tracking- Bounded Tracking Time without Reacquisition Uncertainty-aware privacy algorithm limits time to confusion to 5 min while random sampling algorithm’s TTC is a lot longer Uncertainty-aware privacy algorithm can release up to 92.5% of the original location samples while random sampling has to remove more samples

Evaluation: Protection Against Target Tracking- Dependence on Reacquisition and Density TTC of uncertainty-aware privacy algorithm is shorter than subsampling algorithm

Evaluation: Protection Against Target Tracking In very low density scenarios, uncertainty-aware privacy algorithm preserves maximum TTC guarantee of 5 min by removing more samples while subsampling allows a longer maximum TTC

Evaluation: Quality of Service Analysis Achieves a relative weighted road coverage similar to that of original location traces

Conclusion & Future Work Conclusion: 1.Proposed time-to-confusion metric to characterize location privacy 2.Uncertainty-aware Path Cloaking outperforms existing algorithm in privacy protection in low density areas with good data quality Future Work 1.Adversary with a priori knowledge 2.Without a trustworthy location server 3.Track vehicles by speed information 4.Group of vehicles with the same starting point, destination and move together

Questions & Thoughts