computational location privacy two fundamental problems
play

Computational Location Privacy: Two Fundamental Problems Reza - PowerPoint PPT Presentation

Computational Location Privacy: Two Fundamental Problems Reza Shokri ETH Zurich Department of Computer Science They Profile You! They Track You! Loc ocation on-base sed S d Services es NSA L NSA Locati tion T Tracking Programs


  1. Computational Location Privacy: Two Fundamental Problems Reza Shokri ETH Zurich Department of Computer Science

  2. They Profile You! They Track You! Loc ocation on-base sed S d Services es NSA L NSA Locati tion T Tracking Programs • Co-Traveler • HappyFoot Soc ocial N Network orks washingtonpost.com NSA collects 5 billion location records a day on cellphones

  3. Different Approaches to Privacy Legal Behavioral Computational

  4. Computational Privacy Protecting Quantifying Privacy Privacy

  5. Location Traces and Location-based Services Actual Traces

  6. User-Centric Protection Mechanisms • Anonymization • Location Obfuscation • Decrease Granularity (Location Cloaking) • Decrease Accuracy (Location Perturbation) • Fake Location Observed Traces • …

  7. How to Consistently Quantify Location Privacy? Observation Personal Information Obfuscation (location) S System (Location-based Service) O User Background Knowledge Estimate of Inference User’s Location (Mobility Model) ^ Attack K S ^ ^ ∑ Pr ( S | O , K ) . d( S , S ) Privacy (as expected inference error): ^ S • R. Shokri, et al., “Quantifying Location Privacy,” IEEE S&P - Oakland, 2011. • R. Shokri, et al., “Quantifying Location Privacy: The Case of Sporadic Location Exposure,” PETS, 2011.

  8. Inference Attacks • Identification: Which trace does belong to Alice? • Localization : Where was Alice at 8:00? • Tracking : Where did Alice go yesterday? • Meeting Disclosure : How many times did Alice and Bob meet? • R. Shokri, PhD Dissertation, EPFL 2013

  9. How to Optimally Protect Location Privacy using Obfuscation? Personal Information Obfuscation Observation System (location) Service User Utility Requirements There is a tradeoff between privacy and utilit ility

  10. Solution: Decision Theory ? • Minimize privacy loss • Satisfy utility constraints Inference Inference Inference Algorithm Algorithm Algorithm … Obfuscation Obfuscation Privacy decision making must be interact ctive

  11. Attacker Has the Upper Hand Defender Must Anticipate the Inference Attack Game Theory … … Defender Obfuscation #1 Obfuscation #2 Obfuscation #k … … Anticipated Optimal Attack Optimal Attack Optimal Attack Attacker #1 #2 #k Privacy MAX … … • Solve conflicting optimizations: Defense and Attack • R. Shokri, et al., “Protecting Location Privacy: Optimal Strategy against Localization Attacks,” in ACM CCS 2012.

  12. Conclusions • Defense against surveillance  Practical protection mechanisms with theoretical foundations  Intelligent obfuscation methods, considering user behavior • Computational privacy  Quantify privacy using statistical inference: measure adversary error  Protect privacy in a strategic decision making process: find the optimal balance between privacy , utility , and computing budgets

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend