location privacy protection with a semi honest anonymizer
play

Location Privacy Protection with a Semi-honest Anonymizer in - PowerPoint PPT Presentation

Location Privacy Protection with a Semi-honest Anonymizer in Information Centric Networking Kentaro Kita, Yoshiki Kurihara, Yuki Koizumi and Toru Hasegawa Graduate School of Information and Technology, Osaka University, Japan Sep. 23, 2018 1


  1. Location Privacy Protection with a Semi-honest Anonymizer in Information Centric Networking Kentaro Kita, Yoshiki Kurihara, Yuki Koizumi and Toru Hasegawa Graduate School of Information and Technology, Osaka University, Japan Sep. 23, 2018 1

  2. Location-Based Services • System model of LBSs • Consumers choose locations of their interests (target locations) from a set of locations where producers offers its services (service area) and send names of the locations to the producers • Producers return data based on the locations Massachusetts I need the temperature at Boston Boston /Temperature/ Massachusetts / Boston Temperature at Boston Consumer Producer /Temperature Sep. 23, 2018 2

  3. Privacy in LBSs • Goal : Location Privacy • Hiding consumers’ target locations from adversaries (including producers) in LBSs • Privacy Problem in LBSs • Consumers’ target locations can easily be linked to their sensitive information - home locations, life styles Is it a consumer who lives in Boston ? I need the temperature at Boston /Temperature/ Massachusetts / Boston Adversary Temperature at Boston Consumer Producer /Temperature Sep. 23, 2018 3

  4. Existing Approaches • Honest anonymizer to achieve location anonymity • Hiding each consumer’s target location into other 𝑙 − 1 dummy locations to achieve 𝑙 -anonymity of locations • Anonymous location set : a set of 𝑙 locations which includes a consumer’s target location • An anonymizer generates anonymous location sets from consumers’ requests about their target locations Springfield Boston Boston Adversary Oxford Boston Springfield Boston Oxford Consumer Producer Anonymizer Sep. 23, 2018 4

  5. Problems #1 in Existing Approaches 1. The anonymizer can identify consumers’ target locations • Hence, the anonymizer must be honest (trusted third party) I can know that target location is Boston Boston Springfield Boston Oxford Consumer Producer Anonymizer Sep. 23, 2018 5

  6. Problems #2 in Existing Approaches 1. The anonymizer can identify consumers’ target locations • Hence, the anonymizer must be honest (trusted third party) 2. Adversaries can infer target locations from anonymous location sets by leveraging popularities of locations Probably Boston is target location because it is the most popular city among the three I can know that target location is Boston Boston Springfield Boston Oxford Consumer Producer Anonymizer Sep. 23, 2018 6

  7. Problems #2 in Existing Approaches 1. The anonymizer can identify consumers’ target locations • Hence, the anonymizer must be honest (trusted third party) 2. Adversaries can narrow target location to a region with a certain degree of accuracy even if they cannot infer target location consumer is interested in eastern side of Massachusetts Somerville Cambridge Boston Boston Boston Cambridge Boston Somerville Consumer Producer Anonymizer Sep. 23, 2018 7

  8. Challenges 1. Semi-honest anonymizer • Designing a semi-honest anonymizer in NDN • An semi-honest entity follows prescribed protocols but attempts to gain more information than allowed from the protocols, and does not collude with others to launch attacks 2. Dummy locations selection • Rigorously defining location anonymity satisfying the following two requirements 1. Preventing adversaries from probabilistically inferring target locations 2. Minimizing geographical information of target locations leaked to adversaries 8

  9. Adversarial Model • Two semi-honest adversaries who attempt to infer target locations from received/eavesdropped packets • 𝐵 %,' : An adversary on some producers and networks • An adversary on producers as well as on routers should be considered • 𝐵 ( : An adversary on the anonymizer • Unlike existing studies, we assume that the anonymizer is also an adversary 𝐵 %,' consumer1 producer anonymizer 𝐵 ( consumer2 Sep. 23, 2018 9

  10. Location Privacy • Is it sufficient to achieve location anonymity to protect location privacy as in existing approaches? • Location Privacy = location anonymity + session anonymity • Session anonymity ensures indistinguishability of consumers • Adversaries cannot gain information about consumers - Who is the consumers - Whether two requests are from the same consumer or not Sep. 23, 2018 10

  11. Necessity to Achieve Session Anonymity • Auxiliary information about consumers breaks 𝑙 -anonymity • Adversaries can Infer target location based on the possibility that the consumer chooses each location as target location Oxford Boston can be target location because the consumer requests from a location near Boston Boston 𝐵 %,' Springfield • Adversaries can Infer target location based on the past anonymous location sets of the consumer first Boston can be target location of the third request because it can second be assumed that the consumer third make requests along a certain Boston road 𝐵 %,' 11

  12. Design Rationale of Architecture • Solution to achieve location anonymity • Each consumer makes request specifying an anonymous location set to the anonymizer instead of target location • The anonymizer generates a map of anonymous location sets for all the locations and distribute it to consumers • Solution to achieve session anonymity • We leverage lack of source/destination addresses on packets in NDN (against 𝐵 ( ) • Interest and Data packets do not convey any information about consumer. • The anonymizer also works as a mix-router (against 𝐵 %,' ) Sep. 23, 2018 12

  13. Anonymizer as a mix-router • Session anonymity against 𝐵 %,' • The Anonymizer acts as a Chum’s mix router to prevent 𝐵 %,' from link incoming and outgoing packets at the anonymizer • Encryption/decryption at the anonymizer • Batching 𝑂 incoming packets • Sometimes make dummy requests I cannot link incoming and outgoing packets 𝐵 %,' 𝐵 ( Not encrypted Encrypted anonymous location set locations which is included in the anonymous location set Sep. 23, 2018 13

  14. Requirements to Location Anonymity 1. Preventing adversaries from probabilistically inferring target locations • Location 𝑙 -anonymity • Adversaries cannot infer a consumer’s target location 𝑚 + from her/his anonymous location set ℒ 𝑄 𝑚 + = 𝑚 / ℒ] = 𝑄 𝑚 + = 𝑚 2 ℒ] ( ∀𝑚 / , 𝑚 2 ∈ ℒ ) 2. Minimizing geographical information of target locations leaked to adversaries • Location 𝑢 -closeness • Each anonymous location set ℒ is scattered uniformly throughout the service area 𝑇 𝐸 ℒ, 𝑇 ≤ 𝑢 ,where 𝐸[:,:] is the difference between two geographical distributions Sep. 23, 2018 14

  15. Requirement #1 to Location Anonymity • Location 𝑙 -anonymity • Adversaries cannot infer a consumer’s target location 𝑚 + from her/his anonymous location set ℒ 𝑄 𝑚 + = 𝑚 / ℒ] = 𝑄 𝑚 + = 𝑚 2 ℒ] ( ∀𝑚 / , 𝑚 2 ∈ ℒ ) • 𝑄 𝑚 ℒ] = 𝑄 ℒ 𝑚]𝑄 𝑚 /𝑄[ℒ] (Bayes’ theorem) The probability that ℒ is used the probability that 𝑚 is selected under the condition that target as a target location (popularity) location is 𝑚 • We should take these two factors into account to generate anonymous location sets Sep. 23, 2018 15

  16. � � Solution #1 to Location Anonymity • Making disjoint anonymous location set • If we divide the service area into disjoint anonymous location sets, the anonymous location set for each target location is deterministically determined • ∀𝑚 ∈ ℒ, 𝑄 ℒ 𝑚 = 1 and ∀𝑚 ∉ ℒ, 𝑄 ℒ 𝑚 = 0 → 𝑄 𝑚 ℒ] = 𝑄 ℒ 𝑚]𝑄 𝑚 /𝑄[ℒ] = 𝑄 𝑚 /𝑄[ℒ] • Maximizing entropy of popularities of locations • 𝐼 ℒ = − ∑ 𝑞 A,ℒ ∗ log F 𝑞 A,ℒ A∈ℒ • where 𝑞 A,ℒ = 𝑄 𝑚 / ∑ 𝑄[𝑚 / ] (normalized popularity) A H ∈ℒ • Selecting 𝑙 locations so that their popularities 𝑄 𝑚 are as close as possible • We evaluate later Sep. 23, 2018 16

  17. Requirement #2 to Location Anonymity • Location 𝑢 -closeness • Each anonymous location set ℒ is scattered uniformly throughout the service area 𝑇 𝐸 ℒ, 𝑇 ≤ 𝑢 where 𝐸[:,:] is the difference between two distributions • Motivation to achieve location t-closeness • If all the locations in an anonymous location set is close, adversaries can narrow target location to a region with a certain degree of accuracy even if they cannot infer target location 𝑇 • Solution • Combining sufficiently scattered locations to generate anonymous location sets Sep. 23, 2018 17

  18. Anonymous Location Sets Generation • Overview of our algorithm to generate anonymous location sets 1. Dividing the service area into 𝑙 segments • 𝑙 is degree of 𝑙 -anonymity • Each segment consists of neighboring locations 2. Selecting a location from each segment according to the popularities and combine those 𝑙 locations • Locations with similar popularities that are located far enough can be combined. • Anonymous location sets become disjoint Sep. 23, 2018 18

  19. Evaluation of Anonymous Location Sets • Measurements • Entropy of popularities of locations in each anonymous location set • Ratio of size of the range covered by each anonymous location set with respect to that of a service area • Conditions • An LBS which collect speed of vehicles in each location • Use SUMO simulator to obtain vehicle movements • The service area is approximately 60 𝑙𝑛 F and is divided into 1024 locations • anonymity degree 𝑙 = 15 19

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend