Computational Location Privacy: Two Fundamental Problems
Reza Shokri
ETH Zurich Department of Computer Science
Computational Location Privacy: Two Fundamental Problems Reza - - PowerPoint PPT Presentation
Computational Location Privacy: Two Fundamental Problems Reza Shokri ETH Zurich Department of Computer Science They Profile You! They Track You! Loc ocation on-base sed S d Services es NSA L NSA Locati tion T Tracking Programs
ETH Zurich Department of Computer Science
Loc
sed S d Services es Soc
Network
NSA collects 5 billion location records a day on cellphones
washingtonpost.com
NSA NSA L Locati tion T Tracking Programs
Actual Traces
Observed Traces
User
Personal Information (location) S Estimate of User’s Location
Inference Attack Obfuscation
S
Observation
Background Knowledge (Mobility Model)
^
(Location-based Service)
User
Personal Information (location) Obfuscation Observation Service
Utility Requirements
Inference Algorithm Obfuscation Inference Algorithm Obfuscation Inference Algorithm
Obfuscation #1 Obfuscation #2
Optimal Attack #1 Optimal Attack #2
Obfuscation #k Optimal Attack #k
Privacy
MAX
Game Theory
balance between privacy, utility, and computing budgets