location privacy
play

Location Privacy CompSci 590.03 Instructor: Ashwin Machanavajjhala - PowerPoint PPT Presentation

news.consumerreports.org Location Privacy CompSci 590.03 Instructor: Ashwin Machanavajjhala Some slides are from a tutorial by Mohamed Mokbel (ICDM 2008) Lecture 19: 590.03 Fall 12 1 Outline Location based services Location Privacy


  1. news.consumerreports.org Location Privacy CompSci 590.03 Instructor: Ashwin Machanavajjhala Some slides are from a tutorial by Mohamed Mokbel (ICDM 2008) Lecture 19: 590.03 Fall 12 1

  2. Outline • Location based services • Location Privacy Challenges • Achieving Location Privacy – Concepts – Solutions • Open Questions Lecture 19: 590.03 Fall 12 2

  3. Location Based services Mayor of Starbucks Today, Local Hero Tomorrow: The Power and Privacy Pitfalls of Location Sharing Julie Adler, June 2011 “ Imagine being a victim of cardiac arrest with about ten minutes to live, and first responders more than ten minutes away. A CPR- trained passerby gets a mobile ping from the fire department that someone nearby needs help; the good Samaritan then rushes to your side, administers CPR, and keeps you alive long enough to ” get professional help. Lecture 19: 590.03 Fall 12 3

  4. Location Based Services • Location based Traffic Reports Analysis of – How many cars on 15-501? location data – What is the shortest travel time? • Location based Search – “ showtimes near me” User initiated – Is there an ophthalmologist within 3 miles of my current location? – What is the nearest gas station? • Location based advertising/recommendation System Initiated – Starbucks (.5 miles away) is giving away free lattes. Lecture 19: 590.03 Fall 12 4

  5. Location Based Services Lecture 19: 590.03 Fall 12 5

  6. Location Based Services Yahoo! Maps GPS Devices Google Maps GIS / Spatial … Databases Mobile Internet Devices Location Based Services Lecture 19: 590.03 Fall 12 6

  7. Outline • Location based services • Location Privacy Challenges • Achieving Location Privacy – Concepts – Solutions • Open Questions Lecture 19: 590.03 Fall 12 7

  8. Privacy Threats http://www.thereporteronline.com/article/20121102/NEWS01/121109 915/man-accused-of-stalking-hatfield-woman Lecture 19: 590.03 Fall 12 8

  9. Privacy Threats Lecture 19: 590.03 Fall 12 9

  10. Privacy Threats http://wifi.weblogsinc.com/2004/09/24/companies-increasingly-use- gps-enabled-cell-phones-to-track/ Lecture 19: 590.03 Fall 12 10

  11. GPS Act ( http://www.wyden.senate.gov/download/wyden- chaffetz-gps-amendment-text ) Lecture 19: 590.03 Fall 12 12

  12. Privacy-utility tradeoff  Example: What is my nearest gas station? 100% Utility 0% Privacy 0% 100% Lecture 19: 590.03 Fall 12 13

  13. Why is Location Privacy different? Database Privacy Location Privacy • Each individual’s record • Individual’s current and must be kept secret. future locations (and other inferences) must be secret. • Queries (location) • Queries are not private themselves are private! • Must tolerate updates to • Data is usually static locations. • Privacy is common across all • Privacy is personalized for individuals different individuals Lecture 19: 590.03 Fall 12 14

  14. Outline • Location based services • Location Privacy Challenges • Achieving Location Privacy – Concepts – Solutions • Open Questions Lecture 19: 590.03 Fall 12 15

  15. Location Perturbation • The user location is represented with a wrong value • The privacy is achieved from the fact that the reported location is false • The accuracy and the amount of privacy mainly depends on how far the reported location form the exact location Lecture 19: 590.03 Fall 12 16

  16. Spatial Cloaking • The user exact location is represented as a region that includes the exact user location • An adversary does know that the user is located in the cloaked region, but has no clue where the user is exactly located • The area of the cloaked region achieves a trade-off between the user privacy and the service Lecture 19: 590.03 Fall 12 17

  17. Spatio-temporal cloaking • In addition to spatial cloaking Y the user information can be delayed a while to cloak the temporal dimension • Temporal cloaking could tolerate asking about stationary objects (e.g., gas stations) X • Challenging to support querying moving objects, e.g., where is T my nearest friend Lecture 19: 590.03 Fall 12 18

  18. Data Dependent Cloaking Naïve cloaking MBR cloaking • If you know other individuals, you can have a single coarse region to represent all of them. Lecture 19: 590.03 Fall 12 19

  19. Space Dependent Cloaking Adaptive grid cloaking Fixed grid cloaking Lecture 19: 590.03 Fall 12 20

  20. K-anonymity • The cloaked region contains at least k users • The user is indistinguishable among other k users • The cloaked area largely depends on the surrounding environment. • A value of k =100 may result in a very small area if a user is located in the stadium or may result in a very large area if the user in the desert. Lecture 19: 590.03 Fall 12 21

  21. Queries in Location services • Private Queries over Public Data – What is my nearest gas station – The user location is private while the objects of interest are public • Public Queries over Private Data – How many cars in the downtown area – The query location is public while the objects of interest is private • Private Queries over Private Data – Where is my nearest friend – Both the query location and objects of interest are private Lecture 19: 590.03 Fall 12 22

  22. Modes of Privacy • User Location Privacy – Users want to hide their location information and their query information • User Query Privacy – Users do not mind or obligated to reveal their locations, however, users want to hide their queries • Trajectory Privacy – Users do not mind to reveal few locations, however, they want to avoid linking these locations together to form a trajectory Lecture 19: 590.03 Fall 12 23

  23. Outline • Location based services • Location Privacy Challenges • Achieving Location Privacy – Concepts – Solutions • Open Questions Lecture 19: 590.03 Fall 12 24

  24. Solution Architectures for Location Privacy • Client-Server architecture – Users communicated directly with the sever to do the anonymization process. Possibly employing an offline phase with a trusted entity • Third trusted party architecture – A centralized trusted entity is responsible for gathering information and providing the required privacy for each user • Peer-to-Peer cooperative architecture – Users collaborate with each other without the interleaving of a centralized entity to provide customized privacy for each single user Lecture 19: 590.03 Fall 12 25

  25. Client-Server Location Based Service Query + Perturbed Location Answer Lecture 19: 590.03 Fall 12 26

  26. Client-Server • Clients try to cheat the server using either fake locations or fake space • Simple to implement, easy to integrate with existing technologies • Lower quality of service • Examples: Landmark objects, false dummies Lecture 19: 590.03 Fall 12 27

  27. Client-Server Solution 1: Landmarks • Instead of reporting the exact location, report the location of a closest landmark • The query answer will be based on the landmark • Voronoi diagrams can be used to efficiently identify the closest landmark Lecture 19: 590.03 Fall 12 28

  28. Client-Server Solutions 2: False Dummies • A user sends m locations, only one of them is true while m-1 are false dummies • The server replies with a service for each received location • The user is the only one who knows the true location, and hence the true answer Server • Generating false dummies is hard: should follow a certain pattern similar to a user pattern but with A separate answer for each received location different locations Lecture 19: 590.03 Fall 12 29

  29. Trusted Third Party Location Based Service Query + Cloaked Spatial location Location Anonymizer Lecture 19: 590.03 Fall 12 30

  30. Trusted Third Party • A trusted third party receives the exact locations from clients, blurs the locations, and sends the blurred locations to the server • Provide powerful privacy guarantees with high-quality services • Need to trusted a third party … Lecture 19: 590.03 Fall 12 31

  31. Mix Zones • A strategy for anonymization for continuous location tracking • Server only sees locations and user’s pseudonyms • Mix zone is like a “no track zone” + “change of pseudonyms” User5768 User1234 Mix Zone User5678 User1235 Lecture 19: 590.03 Fall 12 32

  32. Quad-tree Spatial Cloaking • Achieve k-anonymity, i.e., a user is indistinguishable from other k-1 users • Recursively divide the space into quadrants until a quadrant has less than k users. • The previous quadrant, which still meet the k-anonymity constraint, is returned Achieve 5-anonmity for Lecture 19: 590.03 Fall 12 33

  33. Nearest Neighbor k-Anonymization • STEP 1: Determine a set S containing u and k - 1 u’s nearest neighbors. S S’ • STEP 2: Randomly select v from S. • STEP 3: Determine a set S’ containing v and v’s k - 1 nearest neighbors. • STEP 4: A cloaked spatial region is an MBR of all users in S’ and u. • Need to pick a random node first. Otherwise, adversary can reconstruct location (by picking centroid of spatial region) Lecture 19: 590.03 Fall 12 34

  34. Pyramid Anonymization • Divide region into grids at different resolutions • Each grid cell maintains the number of users in that cell • To anonymize a user request, we traverse the pyramid structure from the bottom level to the top level until a cell satisfying the user privacy profile is found. Lecture 19: 590.03 Fall 12 35

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend