Presentation is loading. Please wait.

Presentation is loading. Please wait.

Id 1 id k id 2 … λ = 60 sec even odd PRIVACY-PRESERVING TRAJECTORY COLLECTION Győző Gidófalvi Xuegang Huang and Torben Bach Pedersen Problem Setting Accurate.

Similar presentations


Presentation on theme: "Id 1 id k id 2 … λ = 60 sec even odd PRIVACY-PRESERVING TRAJECTORY COLLECTION Győző Gidófalvi Xuegang Huang and Torben Bach Pedersen Problem Setting Accurate."— Presentation transcript:

1 id 1 id k id 2 … λ = 60 sec even odd PRIVACY-PRESERVING TRAJECTORY COLLECTION Győző Gidófalvi Xuegang Huang and Torben Bach Pedersen Problem Setting Accurate trajectory patterns are necessary for Location-Based Services. A method that can collect exact trajectories in a privacy-preserving manner is needed. A method that uses free and energy-saving short-range P2P communication is desirable. However, during such communication a fixed hardware ID is exposed. Hence it is necessary that when a data item, which contains the private trajectory with possibly secret or embarrassing locations, is communicated, the link between public and private information is broken. Location Privacy Definitions k-anonymity requires that each data item can be associated with at least k moving objects and vice versa. α-diversity requires some spatial or spatio- temporal diversity in a set of locations / trajectories. Finally, k-α-anonymity combines the two. HIDPrivate trajectory y t x Secret or embarrassing visit / location Data Item Privacy-Preserving Trajectory Collection in Five Stages Empirical Evaluation and Results Realistic simulation shows that the method works under reasonable conditions and anonymity settings (communication range = 10 meters and k = 5 is shown). In particular, most clients can report most of the collected data in a privacy- preserving fashion. The collection is virtually lossless. In summary, the proposed system collects exact trajectories without loss, does not require trusted components, and provides strong privacy guarantees. Győző Gidófalvi: Uppsala University – Department of Information Technology – gyozo.gidofalvi@it.uu.se Xuegang Huang: Aalborg University – Department of Computer Science – xghuang@acm.org Torben Bach Pedersen: Aalborg University – Department of Computer Science – tbp@cs.aau.dk Client Registration (CR) In the CR stage, the client expresses its privacy requirements (k,α). In response, the server approves a group of k clients and sends them timing parameters (start time: T s, reporting period: τ). The CR stage ensures the k-anonymity of clients. Trajectory Sampling and Anonymization (TSA) In the TSA stage, the client continuously samples its real trajectory and generates k-1 realistic and pair-wise α-diverse synthetic trajectories and cuts the trajectories into pieces at every λ-period. Trajectory pieces of a trajectory are tagged with an ID and form partial data items (pdis). At every λ-period an even number of copies of sampled pdi and odd number of copies of the generated pdis are stored in the trajectory DB of the client. The TSA stage ensures the k-α- anonymity of the client trajectory DB. Server Trajectory Exchange (TE) In the TE stage, the client periodically performs a Neighborhood Discovery (ND) process to find other clients to exchange pdis with. The pdis to be exchanged are randomly selected, but contain at least two sampled or generated-pdis and older pdis are prioritized. The TE stage ensures the k-α-anonymity of the exchanged data. DEF. k-anonymity : data itemsmoving objects mn ≥ k=5 DEF. α-diversity : x y AREA(MBR) ≥ α locations (extendable to trajectories) DEF. k-α-anonymity : k-anonymity + α-diversity ? ? Data Reporting (DR) After the reporting period has elapsed or the client DB is full, the client enters the DR stage. In the DR stage the client determines a maximal anonymity set of pdis, in which the number of pdis for each ID is statistically equal, and sends this set to the server. The DR stage ensures the k-α-anonymity of the reported data. Data Summarization (DS) In the DS stage the server continuously records the reports, merges trajectory pieces and monitors the number of pdis received for each trajectory piece. For a given trajectory, if after T s +2τ the majority parity of the number of pdis for the trajectory pieces is even the trajectory is real and is stored in the Trajectory Repository (TR), otherwise the trajectory is synthetic and is discarded. The DS stage ensures the k-anonymity of the data in TR. Neighborhood Discovery: Get neighbors with at least k respective neighbors! previously exchanged id 1 id k id 2 … id k+4 id k+3 id 2 id 1 id k id k+2 id k+1 Select pdis for exchange exchange x x x y t x TsTs sampled generated √α√α Maximal Anonymity Set Report at time T s +τ or if DB is full id 1 id k id 2 … id k+4 id k+3 id k+m … T s +2λ y t x TsTs Ts+λTs+λ # of copies 2 1 2 Trajectory Repository Registration request (HID, k, α) Registration Queue … k Approval (T s, τ, τ max ) k = 5 α = 1000m Number of ExchangesAge of Oldest Data ItemAnonymity


Download ppt "Id 1 id k id 2 … λ = 60 sec even odd PRIVACY-PRESERVING TRAJECTORY COLLECTION Győző Gidófalvi Xuegang Huang and Torben Bach Pedersen Problem Setting Accurate."

Similar presentations


Ads by Google