Privacy-Preserving Publication of User Locations in the Proximity of Sensitive Sites Bharath Krishnamachari Gabriel Ghinita Panos Kalnis National University.

Slides:



Advertisements
Similar presentations
Efficient Evaluation of k-Range Nearest Neighbor Queries in Road Networks Jie BaoChi-Yin ChowMohamed F. Mokbel Department of Computer Science and Engineering.
Advertisements

Quality Aware Privacy Protection for Location-based Services Zhen Xiao, Xiaofeng Meng Renmin University of China Jianliang Xu Hong Kong Baptist University.
Anonymizing Healthcare Data: A Case Study on the Blood Transfusion Service Benjamin C.M. Fung Concordia University Montreal, QC, Canada
Online Data Fusion School of Computing National University of Singapore AT&T Shannon Research Labs Xuan Liu, Xin Luna Dong, Beng Chin Ooi, Divesh Srivastava.
PrivacyGrid Visualization Balaji Palanisamy Saurabh Taneja.
Mohamed F. Mokbel University of Minnesota
Anatomy: Simple and Effective Privacy Preservation Xiaokui Xiao, Yufei Tao Chinese University of Hong Kong.
Fast Data Anonymization with Low Information Loss 1 National University of Singapore 2 Hong Kong University
Privacy Preserving Publication of Moving Object Data Joey Lei CS295 Francesco Bonchi Yahoo! Research Avinguda Diagonal 177, Barcelona, Spain 6/10/20151CS295.
Optimization of Spatial Joins on Mobile Devices N. Mamoulis 1, P. Kalnis 2, S. Bakiras 3, X. Li 2 1 Department of Computer Science and Information Systems,
On Discovering Moving Clusters in Spatio-temporal Data Panos Kalnis National University of Singapore Nikos Mamoulis University of Hong Kong Spiridon Bakiras.
1 On the Anonymization of Sparse High-Dimensional Data 1 National University of Singapore 2 Chinese University of Hong.
PRIVÉ : Anonymous Location-Based Queries in Distributed Mobile Systems 1 National University of Singapore 2 University.
Tracking Moving Objects in Anonymized Trajectories Nikolay Vyahhi 1, Spiridon Bakiras 2, Panos Kalnis 3, and Gabriel Ghinita 3 1 St. Petersburg State University.
Ad-hoc Distributed Spatial Joins on Mobile Devices Panos Kalnis, Xiaochen Li National University of Singapore Nikos Mamoulis The University of Hong Kong.
Mariam Salloum (YP.com) Xin Luna Dong (Google) Divesh Srivastava (AT&T Research) Vassilis J. Tsotras (UC Riverside) 1 Online Ordering of Overlapping Data.
MobiHide: A Mobile Peer-to-Peer System for Anonymous Location-Based Queries Gabriel Ghinita, Panos Kalnis, Spiros Skiadopoulos National University of Singapore.
The Union-Split Algorithm and Cluster-Based Anonymization of Social Networks Brian Thompson Danfeng Yao Rutgers University Dept. of Computer Science Piscataway,
A Customizable k-Anonymity Model for Protecting Location Privacy Written by: B. Gedik, L.Liu Presented by: Tal Shoseyov.
Preserving Privacy in Clickstreams Isabelle Stanton.
Privacy-preserving Anonymization of Set Value Data Manolis Terrovitis, Nikos Mamoulis University of Hong Kong Panos Kalnis National University of Singapore.
Privacy-preserving Anonymization of Set Value Data Manolis Terrovitis Institute for the Management of Information Systems (IMIS), RC Athena Nikos Mamoulis.
Collaborative Filtering Matrix Factorization Approach
Database Laboratory Regular Seminar TaeHoon Kim.
F EELING - BASED L OCATION P RIVACY P ROTECTION FOR L OCATION - BASED S ERVICES CS587x Lecture Department of Computer Science Iowa State University Ames,
Overview of Privacy Preserving Techniques.  This is a high-level summary of the state-of-the-art privacy preserving techniques and research areas  Focus.
Ragib Hasan Johns Hopkins University en Spring 2010 Lecture 6 03/22/2010 Security and Privacy in Cloud Computing.
Gabriel Ghinita1 Panos Kalnis1 Ali Khoshgozaran2 Cyrus Shahabi2
1 Naïve Bayes Models for Probability Estimation Daniel Lowd University of Washington (Joint work with Pedro Domingos)
Privacy Preserving Data Mining on Moving Object Trajectories Győző Gidófalvi Geomatic ApS Center for Geoinformatik Xuegang Harry Huang Torben Bach Pedersen.
VLDB '2006 Haibo Hu (Hong Kong Baptist University, Hong Kong) Dik Lun Lee (Hong Kong University of Science and Technology, Hong Kong) Victor.
K.Yuan, J.Yang and D.Pan ECE Dept. Univ. of Texas at Austin
Thwarting Passive Privacy Attacks in Collaborative Filtering Rui Chen Min Xie Laks V.S. Lakshmanan HKBU, Hong Kong UBC, Canada UBC, Canada Introduction.
Towards Robust Indexing for Ranked Queries Dong Xin, Chen Chen, Jiawei Han Department of Computer Science University of Illinois at Urbana-Champaign VLDB.
Online Data Fusion School of Computing National University of Singapore AT&T Shannon Research Labs Xuan Liu, Xin Luna Dong, Beng Chin Ooi, Divesh Srivastava.
Systems and Internet Infrastructure Security (SIIS) LaboratoryPage Systems and Internet Infrastructure Security Network and Security Research Center Department.
K-Anonymity & Algorithms
ACOMP 2011 A Novel Framework for LBS Privacy Preservation in Dynamic Context Environment.
Clustering Moving Objects in Spatial Networks Jidong Chen, Caifeng Lai, Xiaofeng Meng, Renmin University of China Jianliang Xu, and Haibo Hu Hong Kong.
1 SpaceTwist: A Flexible Approach for Hiding Query User Location Speaker: Man Lung Yiu Aalborg University Joint work with Christian S. Jensen, Xuegang.
Related Works LOFConclusion Introduction Contents ICISS
Zibin Zheng DR 2 : Dynamic Request Routing for Tolerating Latency Variability in Cloud Applications CLOUD 2013 Jieming Zhu, Zibin.
Privacy-Preserving Linear Programming Olvi Mangasarian UW Madison & UCSD La Jolla UCSD – Center for Computational Mathematics Seminar January 11, 2011.
This document is for academic purposes only. © 2012 Department of Computer Science, Hong Kong Baptist University. All rights reserved. 1 Authenticating.
Randomization in Privacy Preserving Data Mining Agrawal, R., and Srikant, R. Privacy-Preserving Data Mining, ACM SIGMOD’00 the following slides include.
Privacy Preserving In LBS
Preserving Privacy in GPS Traces via Uncertainty- Aware Path Cloaking Baik Hoh, Marco Gruteser, Hui Xiong, Ansaf Alrabady Presented by Joseph T. Meyerowitz.
1 On Optimal Worst-Case Matching Cheng Long (Hong Kong University of Science and Technology) Raymond Chi-Wing Wong (Hong Kong University of Science and.
Answering Top-k Queries Using Views Gautam Das (Univ. of Texas), Dimitrios Gunopulos (Univ. of California Riverside), Nick Koudas (Univ. of Toronto), Dimitris.
Network Coordinates : Internet Distance Estimation Jieming ZHU
A Hybrid Technique for Private Location-Based Queries with Database Protection Gabriel Ghinita 1 Panos Kalnis 2 Murat Kantarcioglu 3 Elisa Bertino 1 1.
The Impact of Duality on Data Representation Problems Panagiotis Karras HKU, June 14 th, 2007.
EVALUATING LBS PRIVACY IN DYNAMIC CONTEXT 1. Outline 2  Overview Attack Model  Classification Defend Model  Evaluation Module  Conclusion.
Probabilistic km-anonymity (Efficient Anonymization of Large Set-valued Datasets) Gergely Acs (INRIA) Jagdish Achara (INRIA)
Progressive Computation of The Min-Dist Optimal-Location Query Donghui Zhang, Yang Du, Tian Xia, Yufei Tao* Northeastern University * Chinese University.
Secure Data Outsourcing
Yang, et al. Differentially Private Data Publication and Analysis. Tutorial at SIGMOD’12 Part 4: Data Dependent Query Processing Methods Yin “David” Yang.
Optimizing the Location Obfuscation in Location-Based Mobile Systems Iris Safaka Professor: Jean-Pierre Hubaux Tutor: Berker Agir Semester Project Security.
Jeremy Iverson & Zhang Yun 1.  Chapter 6 Key Concepts ◦ Structures and access methods ◦ R-Tree  R*-Tree  Mobile Object Indexing  Questions 2.
Center for E-Business Technology Seoul National University Seoul, Korea Private Queries in Location Based Services: Anonymizers are not Necessary Gabriel.
Computer Science and Engineering Jianye Yang 1, Ying Zhang 2, Wenjie Zhang 1, Xuemin Lin 1 Influence based Cost Optimization on User Preference 1 The University.
 A Two-level Protocol to Answer Private Location-based Queries Roopa Vishwanathan Yan Huang [RoopaVishwanathan, Computer Science and.
Gabriel Ghinita1 Panos Kalnis1 Ali Khoshgozaran2 Cyrus Shahabi2
Combinatorial clustering algorithms. Example: K-means clustering
Fast Data Anonymization with Low Information Loss
Data Driven Resource Allocation for Distributed Learning
Xiaokui Xiao and Yufei Tao Chinese University of Hong Kong
Collaborative Filtering Matrix Factorization Approach
Fast Nearest Neighbor Search on Road Networks
Presentation transcript:

Privacy-Preserving Publication of User Locations in the Proximity of Sensitive Sites Bharath Krishnamachari Gabriel Ghinita Panos Kalnis National University of Singapore

2 Privacy Threat u2u2 u3u3 u1u1 u4u4 u5u5 u1u1 EXPOSED Location Publishing Traffic congestion control Infrastructure planning Snapshot at 2pm h Hospital Data (external) Hu et al., “Privacy Aware Location Publishing for Moving Clients”

3 Attack  Attack: Associate a site s with fewer than K users  Attack is successful in the previous slide:

4 Solution Outline (K-anonymity) u2u2 u3u3 u1u1 u4u4 u5u5 s1s1 s2s2 ASR 3,4 ASR 1,5  Attack, K=2 NOT successful

5 Problem Statement  User set U, sensitive sites set S  Mapping M:S -> 2 U  Minimize Generalization Cost (GGC)

6 Related work: Query Privacy in LBS  Relies on Spatial K-anonymity as well Gedik & Liu, ICDCS ’05 Mokbel et al., VLDB ’06 Kalnis et al., TKDE ’07 …  But anonymizes a single query Equivalent to |S|=1  In our problem |S|>>1 More difficult to solve

7 Related work: “Local” algorithm u s1s1 s4s4 s3s3 s2s2 D E1 D E2 D N1 D S1 D W1 [HXD+07] Hu H., Xu J., Du J., Ng J.K.Y., “Privacy Aware Location Publishing for Moving Clients”, TR, Hong Kong Baptist Univ.,  Benefit: NumOfSites/Area

8 Drawback of Local’s Publication Format 2-by-2 publishing Local

9 Our Approach MK: Monochromatic K-anonymity  Phase 1: Transform user locations to 1D Anonymization w.r.t. user set U ONLY Linear algorithm *, 1-D optimal User groups independent of sites S  Phase 2: Assign each anonymous group to nearest site Resolve potential conflicts  E.g., choose assignment with minimum enlargement Repeat until all sites are covered [GKKM07] Ghinita G., Karras P., Kalnis P., Mamoulis N. “Fast Data Anonymization with Low Information Loss”. In Proc. of VLDB 2007

10 MK Example 2D -> 1D G3G3 G2G2 G1G1 G2G2 Output (s 1,G 1 ), (s 3,G 3 ) Output (s 2,G 2 )

11 Our Approach BK: Bichromatic K-anonymity  Properties of optimal mapping in 1-D 1. Each ASR/group has exactly K users 2. ASRs have consecutive users in 1-D order 3. Groups do not overlap in 1-D order Bichromatic clustering of U and S Each cluster has 1 site and K users DP algorithm, linear in K and |U|

12 BK Example Allowable start values for s j min{Cost[i-1][j], Cost[i-K][j-1]+GC(u i,…,u i +K-1,s j )}

13 Experimental Evaluation  Naïve competitor: K-Nearest-Neighbors  NA Dataset ( locations) U and S randomly sampled from NA  Performance metrics: Anonymization overhead (CPU time) Generalization Cost

14 Comparison with “Local” N=10,000 Users

15 Variable number of sites N=569,120 Users

16 Variable K N=569,120 Users

17 Points to Remember  Publication of user locations in the proximity of sensitive sites More difficult than Query-privacy in LBS  “Local” algorithm Very Slow Bad quality, if a secure publishing format is used  Naïve KNN Also slow  Our algorithms: MK, BK Fast & Accurate

18 Bibliography on LBS Privacy