location privacy protection for smartphone users
play

Location Privacy Protection For Smartphone Users Thanks to Kassem - PowerPoint PPT Presentation

Location Privacy Protection For Smartphone Users Thanks to Kassem Fawaz and Kang G Shin Presented By Sam Ostoich and Erin Geoghan Introduction Problem Threats Related Works Design Philosophy Design Implementation


  1. Location Privacy Protection For Smartphone Users Thanks to Kassem Fawaz and Kang G Shin Presented By Sam Ostoich and Erin Geoghan

  2. Introduction ● Problem ● Threats ● Related Works ● Design Philosophy ● Design ● Implementation ● Success? ● Future Plans

  3. Location-Tracking Apps ● Help you get where you want to go o Navigation apps ● Used to stay connected with friends o Social media apps ● Used for convenience o Find nearest gas station, restaurant, etc.

  4. Examples

  5. The Problem Users care about who accesses their location

  6. Threats ● Tracking Threat o Adversary can receive continuous location updates ● Identification Threat o Adversary can isolate the user’s frequency ● Profiling Threat o Adversary can profile the person based off where user has been

  7. Related Works ● MockDroid - disables access to certain resources such as location § Problem: never receives location updates ● Micinski - coarsened the location § Problem: never considered threat model

  8. Related Works ● PlaceMask - allows user to supply fake locations § Problem: fake locations are given when real locations are needed ● Koi - cloud-based service for location protection § Problem: have to use a different API based on different location criterion

  9. Related Works ● Deficient in terms of effectiveness, efficiency, and practicality o MockDroid - effectiveness o Koi’s method - practicality ● Solves tracking threat but not profiling or identification

  10. Design Philosophy ● User expects location to be accessed ● Location with a granularity sufficient to produce location- based functionality is provided ● Anonymous apps can’t identify user based on frequently visited places ● Single app alone poses no significant profiling threats

  11. Design Philosophy ● App can’t track user all the time ● Existing mobile ecosystem is used ● Protection comes at a minimal cost in usability and app functionality

  12. Design

  13. Design

  14. Design Little effect on the functionality of most apps

  15. Design

  16. Design

  17. Design

  18. Implementation with Android ● LMS and GMS ● Location object with context ● Changing context

  19. User Interface ● Bootstrapping o Setting most visited places o Setting the anonymization rule for each app ● Per-place/session controls o Setting the anonymization rule for each location o Setting changes available at all times to the user

  20. Assessment ● Blocks location access in the background ● Most apps can’t track for more than 8 minutes per day ● Stationary vs Mobile effect ● Weather apps ● Messaging/chatting apps

  21. Energy Assessment

  22. Overall Success? ● Practical - easy to employ, compatible with apps ● Effective - Addresses the three threats ● Efficient - privacy with tolerable loss in app functionality

  23. Future plans ● User friendliness ● Incorporating it as a custom ROM

  24. Questions?

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend