Existing LBS Privacy Existing LBS Privacy Solutions 1 7 8 Casper - - PDF document

existing lbs privacy existing lbs privacy solutions
SMART_READER_LITE
LIVE PREVIEW

Existing LBS Privacy Existing LBS Privacy Solutions 1 7 8 Casper - - PDF document

2 Location-Based Services (LBS) Private Queries in Location-Based Services: Find closest hospital to LBS users my present location Mobile devices with GPS Anonymizers are Not Necessary capabilities Gabriel Ghinita Gabriel


slide-1
SLIDE 1

1 Private Queries in Location-Based Services: Anonymizers are Not Necessary

Gabriel Ghinita1 Panos Kalnis1 Gabriel Ghinita Panos Kalnis Ali Khoshgozaran2 Cyrus Shahabi2 Kian Lee Tan1

1 National University of Singapore 2 University of Southern California

2

Location-Based Services (LBS)

LBS users

Mobile devices with GPS

capabilities

“Find closest hospital to my present location” Queries

NN Queries Location server is

NOT trusted

3

Problem Statement

Queries may disclose sensitive information

Query through anonymous web surfing service

But user location may disclose identity

Triangulation of device signal Triangulation of device signal Publicly available databases Physical surveillance

How to preserve query source anonymity?

Even when exact user locations are known

4

PIR Overview

Computationally hard to find i from q(i) Bob can easily find Xi from r (trap-door)

5

Existing LBS Privacy Existing LBS Privacy Solutions

6

Spatial K-Anonymity

Query issuer “hides” among other K-1 users

Probability of identifying query source ≤ 1/K Idea: anonymizing spatial regions (ASR)

slide-2
SLIDE 2

2

7

Casper[Mok06]

Quad-tree based

Fails to preserve anonymity for outliers Unnecessarily large ASR size

u 2 A1

  • Let K=3

u 1 u 3 u 4

1

A2

  • u4’s identity is disclosed
  • If u4 queries, ASR is A2
  • If any of u1, u2, u3 queries,

ASR is A1

[Mok06] – Mokbel et al, The New Casper: Query Processing for Location Services without Compromising Privacy, VLDB 2006

NOT SECURE !!!

8

Reciprocity

u 2 u 3 u 1 u 2 u 3 u 1 u 4 u 6 u 5 u 5 u 4 u 6

[KGMP07] – Kalnis P., Ghinita G., Mouratidis K., Papadias D., "Preventing Location-Based Identity Inference in Anonymous Spatial Queries", IEEE TKDE 2007.

9

Hilbert Cloak (HC)

Based on Hilbert space-filling curve

index users by Hilbert value of location partition Hilbert sequence into “K-buckets” Start End

10

Continuous Queries[CM07]

Problems

ASRs grows large Query dropped if some user in U disconnects

u 1 u 3

[CM07] C.-Y. Chow and M. Mokbel “Enabling Private Continuous Queries For Revealed User Locations”. In

  • Proc. of SSTD 2007

u 2

11

Space Encryption[KS07]

Drawbacks

answers are approximate makes use of tamper-resistant devices

P2

P P P P Hilbert Mapping may be vulnerable if some POI are known

[KS07] A. Khoshgozaran, C. Shahabi. Blind Evaluation of Nearest Neighbor Queries Using Space Transformation to Preserve Location Privacy , In Proc. Of SSTD 2007

P1 P2 P3 P4

P1 P2 P4 12 14 19 P3 24

Q

15 NN(15)=P2

12

Motivation

Limitations of existing solutions

Assumption of trusted entities

anonymizer and trusted, non-colluding users

C id bl h d f di b fit

Considerable overhead for sporadic benefits

maintenance of user locations

No privacy guarantees

especially for continuous queries

slide-3
SLIDE 3

3

13

Our Approach

14

LBS Privacy with PIR

PIR

Two-party cryptographic protocol

No trusted anonymizer required No trusted users required

No pooling of a large user population required

No need for location updates

Location data completely obscured

15

PIR Theoretical Foundations

  • Let N =q1*q2, q1 and q2 large primes
  • Quadratic Residuosity Assumption (QRA)
  • QR/QNR decision computationally hard
  • Essential properties:

QR * QR = QR QR * QNR = QNR

16

PIR Protocol for Binary Data

X4 X8 X16 X12 X3 X7 X15 X11 X X X X a y1 y2 y3 y4 z4 z3 z X2 X6 X14 X10 X1 X5 X13 X9 b Get X10 a=2, b=3 QNR z2 z1 z2=QNR => X10=1 z2=QR => X10=0

= + − ⋅

⋅ =

4 1 ) 1 ( 4 j j i j i

y X z

17

Approximate Nearest Neighbor

p4 p6 p1

Data organized as a square matrix

Each column corresponds to index leaf An entire leaf is retrieved – the closest to the user

p4 p6 p5 p8 p1 p2 p7 p9 p3 u

18

Z4 Z3

Exact Nearest Neighbor

p4 p3 p1

4 3 D C B A A3: p1, p2, p3 A4: p1, --, --

3

Z2 Z1

QNR

Only z2 needed

p2

2 1 p1, ,

u

Y1 Y2 Y3 Y4

slide-4
SLIDE 4

4

19

Avoiding Redundant Computations

Data mining

Identify frequent partial products

20

Parallelize Computation

Values of z can be computed in parallel

Master-slave paradigm Offline phase: master scatters PIR matrix Online phase:

Master broadcasts y Each worker computes z values for its strip Master collects z results

21

Experimental Settings

Sequoia dataset + synthetic sets

10,000 to 100,000 POI

Modulus up to 1280 bits

Computation/Communication Overhead (Approximate)

22

Computation/Communication Overhead (Exact)

23 24

Parallel Execution

slide-5
SLIDE 5

5

25

Data Mining Optimization

26

Disclosed POI

27

Conclusions

PIR-based LBS privacy

No need to trust third-party Secure against any location-based attack

Future work

Further reduce PIR overhead Support more complex queries Include more POI information in the reply

Discussion

Given the parallelization, compression,

multiplication reduction, rectangular shape M, how much is communication/computation saved?

28

How do you compare the previous two

approaches?

What do *you* think is the major

challenge in achieving privacy-aware LBS? Privacy Privacy Efficiency Efficiency

29

Reciprocity

  • Consider querying user uq and ASR Aq
  • Let ASq = {set of users enclosed by Aq}
  • Aq has the reciprocity property iff

i

|AS| ≥ K

i.

|AS| ≥ K

ii.

∀ ui,uj ∈ AS, ui ∈ ASj ∧ uj ∈ ASi

u 2 u 3 u 1 u 4 u 6 u 5 u 2 u 3 u 5 u 1 u 4 u 6

[KGMP07] – Kalnis P., Ghinita G., Mouratidis K., Papadias D., "Preventing Location-Based Identity Inference in Anonymous Spatial Queries", IEEE TKDE 2007.

30

Continuous Queries[CM07]

Extends reciprocity to moving clients

Let A0 be ASR at time t0, let U be the users in A0 At time ti, ASR is MBR of U (at new locations)

Problems

ASR grows large Query dropped if some user in U disconnects

[CM07] C.-Y. Chow and M. Mokbel “Enabling Private Continuous Queries For Revealed User Locations”. In

  • Proc. of SSTD 2007
slide-6
SLIDE 6

6

31

Space Encryption[KS07]

Does not employ SKA

each POI is mapped to 1-D value (Hilbert)

fractal parameters are kept secret

answers are approximate makes use of tamper-resistant devices may be vulnerable if some POI are known

[KS07] A. Khoshgozaran, C. Shahabi. Blind Evaluation of Nearest Neighbor Queries Using Space Transformation to Preserve Location Privacy , In Proc. Of SSTD 2007

32

Rectangular PIR Matrix

33

Server Computation Overhead

34

Approximation Error

35

Bibliography

  • [KGMP07] – Kalnis P., Ghinita G., Mouratidis K., Papadias D.,

"Preventing Location-Based Identity Inference in Anonymous Spatial Queries", IEEE Transactions on Knowledge and Data Engineering (IEEE TKDE), 19(12), 1719-1733, 2007.

  • [GZPK07] – Ghinita G., Zhao K., Papadias D., Kalnis P., Reciprocal

Framework for Spatial K-Anonymity, Technical Report

  • [GKS07a] – Ghinita G., Kalnis P., Skiadopoulos S., "PRIVE:

Anonymous Location-based Queries in Distributed Mobile Systems", Proc. of World Wide Web Conf. (WWW), Banff, Canada, 371-380, 2007.

  • [GKS07b] – Ghinita G., Kalnis P., Skiadopoulos S., "MOBIHIDE: A

Mobile Peer-to-Peer System for Anonymous Location-Based Queries", Proc. of the Int. Symposium in Spatial and Temporal Databases (SSTD), Boston, MA, 221-238, 2007. http://anonym.comp.nus.edu.sg