geo indistinguishability a principled approach to
play

Geo-indistinguishability: A Principled Approach to Location Privacy - PowerPoint PPT Presentation

Geo-indistinguishability: A Principled Approach to Location Privacy Kostas Chatzikokolakis CNRS, INRIA, LIX Ecole Polytechnique joint work with Miguel Andr es, Nicol as Bordenabe, Catuscia Palamidessi, Marco Stronati PRINCESS QIF Day,


  1. Geo-indistinguishability: A Principled Approach to Location Privacy Kostas Chatzikokolakis CNRS, INRIA, LIX Ecole Polytechnique joint work with Miguel Andr´ es, Nicol´ as Bordenabe, Catuscia Palamidessi, Marco Stronati PRINCESS QIF Day, Dec 16, 2014

  2. Location-Based Systems A location-based system is a system that uses geographical information in order to provide a service. ‣ Retrieval of Points of Interest (POIs). ‣ Mapping Applications. ‣ Deals and discounts applications. ‣ Location-Aware Social Networks. 2

  3. Location-Based Systems ‣ Location information is sensitive. (it can be linked to home, work, religion, political views, etc). ‣ Ideally: we want to hide our true location . ‣ Reality: we need to disclose some information . 3

  4. Example ‣ Find restaurants within 300 meters. ‣ Hide location, not identity . ‣ Provide approximate location . 4

  5. Obfuscation area of interest 7

  6. Obfuscation area of interest reported position 7

  7. Obfuscation area of retrieval area of interest 7

  8. Obfuscation area of retrieval area of interest 7

  9. Obfuscation area of interest 7

  10. The Goals ‣ We want an obfuscation mechanism . ‣ Formal privacy definition, independent from prior information . ‣ Easy to compute , independently of the number of locations. ‣ No need of a trusted third-party. 9

  11. Towards a Definition ‣ Secrets are locations . ‣ Attacker’s goal: distinguish location x from x’. ‣ The closer two locations are, the more indistinguishable they should be. 14

  12. Towards a Definition ‣ Secrets are locations . ‣ Attacker’s goal: distinguish location x from x’. ‣ The closer two locations are, indistinguishable the more indistinguishable they should be. 14

  13. Towards a Definition ‣ Secrets are locations . ‣ Attacker’s goal: distinguish distinguishable location x from x’. ‣ The closer two locations are, the more indistinguishable they should be. 14

  14. Towards a Definition ‣ Secrets are locations . ‣ Attacker’s goal: distinguish location x from x’. ‣ The closer two locations are, the more indistinguishable they should be. mildly distinguishable 14

  15. Towards a Definition ‣ Secrets are locations . ‣ Attacker’s goal: distinguish location x from x’. ‣ The closer two locations are, the more indistinguishable they should be. 15

  16. Towards a Definition ‣ Secrets are locations . ‣ Attacker’s goal: distinguish location x from x’. ‣ The closer two locations are, the more indistinguishable they should be. 15

  17. Towards a Definition ‣ Secrets are locations . ‣ Attacker’s goal: distinguish location x from x’. ‣ The closer two locations are, the more indistinguishable they should be. 15

  18. Towards a Definition ‣ Secrets are locations . ‣ Attacker’s goal: distinguish location x from x’. ‣ The closer two locations are, the more indistinguishable they should be. 15

  19. Geo-Indistinguishability ‣ We can consider the set of possible locations as the set of secrets, and the Euclidian distance as the metric. A location obfuscation mechanism M provides ϵ -geo-indistinguishability if: D P (M(x), M(x’)) ≤ ϵ d(x,x’) ∀ x, x’ Where d(x,x’) is the Euclidean distance between x and x’. [ Pierce et al., ICFP 2010 ] [ Chatzikokolakis et al, PETS 2013 ] 16

  20. Line of work [PETS’13] privacy under general metrics [CCS’13] application to location privacy, planar Laplace [CCS’14] mechanisms of optimal utility [PETS’14] protecting location traces [ongoing] privacy metrics adapted to the semantics of the map

  21. The Planar Laplace Mechanism A way to achieve geo-indistinguishability is to add noise from a 2- dimensional Laplace distribution. Computationally e ffi cient. Scales very well. Independent from the set of locations and the user. Utility may not be optimal.

  22. Utility of a mechanism We measure the (inverse of) utility as the “Quality Loss”: π : user’s prior d Q : quality metric Utility measure: QL( K ) = Expected distance of K (wrt π and d Q ) Utility depends on the user!

  23. Goal Guarantee geo-indistinguishability. Pre- fi xed privacy level ϵ . • Independent from the user and adversary’s prior. • Optimize utility. For a given set of locations. • Depends on the user’s prior π . •

  24. The d X -optimal mechanism K is O PT QL wrt ϵ , π , d X and d Q iff: From all mechanisms that provide geo-indistinguishability with level at least ϵ , K is the one with the best utility.

  25. The d X -optimal mechanism We get K by solving a linear optimization problem: | X | 3 constraints! Choose: K To minimize: QL( K ) Subject to: ϵ d X ( x,x’ ) ∀ x,x’,z ( d X -privacy) k xz ≤ e k x’z Because we need to consider the privacy constraints for all x , x’ .

  26. Spanners δ = 10 δ = 3 δ = 1.5 δ = 1.25 Images from “Geometric Spanner Networks”, by G. Narasimhan and M. Smid

  27. Protecting location traces ◮ Secrets are now tuples x = ( x 1 , . . . , x n ) ◮ Distance between tuples: d ∞ ( x , x ′ ) = max d ( x i , x ′ i ) i ◮ Use ǫ d ∞ -privacy

  28. Independent Mechanism apply noise to each point n ǫ N d ∞ -private ◮ works on any trace (including random teleporting) ◮ budget is linear on n

  29. Predictive Mechanism prediction function ◮ based on public info ◮ obtain point ˜ z i is ˜ z i close to x i ? ◮ yes: report ˜ z i ◮ no: add new noise to x i

  30. Predictive Mechanism prediction function ◮ based on public info ◮ obtain point ˜ z i is ˜ z i close to x i ? ◮ yes: report ˜ z i ◮ no: add new noise to x i

  31. Predictive Mechanism prediction function ◮ based on public info ◮ obtain point ˜ z i is ˜ z i close to x i ? ◮ yes: report ˜ z i ◮ no: add new noise to x i

  32. Predictive Mechanism prediction function ◮ based on public info ◮ obtain point ˜ z i is ˜ z i close to x i ? ◮ yes: report ˜ z i ◮ no: add new noise to x i

  33. Testing the prediction Deterministic test breaks privacy

  34. Testing the prediction Deterministic test breaks privacy

  35. Testing the prediction Deterministic test breaks privacy D-Private test use a noisy border for the test

  36. Testing the prediction Deterministic test breaks privacy D-Private test use a noisy border for the test Budget used at each step ǫ θ (successful prediction) or ǫ θ + ǫ N (new noise)

  37. (In)Distinguishability Metric What is it that you want to be similar to? ( and how much? )

  38. Euclidean Metric ◮ space provides privacy ◮ scaled by ǫ

  39. Euclidean Metric ◮ space provides privacy ◮ scaled by ǫ but... ◮ space is not equally valuable everywhere ◮ POI/population/... also provide privacy ◮ we can achieve better privacy/utility by adapting the noise to the map

  40. Building a custom metric ◮ divide the space in cells (eg grid 100m x 100m) ◮ privacy weight of each cell ◮ from POI/population/... (eg by querying OSM) ◮ from the cell’s area ◮ build a metric d satisfying the requirement f : weight ( B d r ( x )) ≥ f ( r ) x , r

  41. Building a custom metric ◮ divide the space in cells (eg grid 100m x 100m) ◮ privacy weight of each cell ◮ from POI/population/... (eg by querying OSM) ◮ from the cell’s area ◮ build a metric d satisfying the requirement f : weight ( B d r ( x )) ≥ f ( r ) x , r Exponential Mechanism constructed from any metric d

  42. Privacy weights

  43. Obtained Mechanism

  44. Location Guard for Chrome and Firefox https://github.com/chatziko/location-guard 4700+ daily users

  45. Future work Privacy guarantees under (un)correlation conditions between the points in the trace. Questions?

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend