presentation outline
play

Presentation Outline Introduction Related Work System Architecture - PDF document

Privacy Protected Query Processing Privacy Protected Query Processing Privacy Protected Query Processing on Spatial Networks on Spatial Networks on Spatial Networks Wei-Shinn Ku Roger Zimmermann Wen-Chih Peng Sushama Shroff Third


  1. Privacy Protected Query Processing Privacy Protected Query Processing Privacy Protected Query Processing on Spatial Networks on Spatial Networks on Spatial Networks Wei-Shinn Ku Roger Zimmermann Wen-Chih Peng Sushama Shroff Third International Workshop on Privacy Data Management April 16, 2007 Presentation Outline � Introduction � Related Work � System Architecture � Privacy Protected Query Algorithms � Simulation Results � Future Research Directions 1

  2. Introduction � Spatial Queries � Nearest neighbor queries � Window queries � Spatial join queries � Mobile Computing � PDAs � Cell and Smart phones � Laptops • The global sales volume of GPS devices, laptops, and PDAs were around 18 mil, 65 mil, and 7.5 mil respectively in 2006. IDC Research http://www.idc.com/home.jhtml Motivation � The proliferation of mobile devices � PDAs, cell phones, laptops, etc. � The popularity of positioning devices � GPS, GLONASS, GALILEO, etc. � Privacy threat from accessing Location-Based Services � e.g., “ Find my closest bank ” � How to protect mobile users’ identities? 2

  3. Contributions � We propose a novel algorithm for solving privacy protected nearest neighbor queries on spatial networks. � We extend our nearest neighbor query solution to answer range queries with protection of privacy. � We demonstrate the feasibility and efficiency of our approach through extensive simulations. Presentation Outline � Introduction � Related Work � System Architecture � Privacy Protected Query Algorithms � Simulation Results � Future Research Directions 3

  4. Spatial Queries - NN � Spatial network nearest neighbor algorithm – Incremental Network Expansion [Papadias et al. 2003] K -Anonymity � The mechanism to blur the identities of K users [Swe02]. � One trusted server (i.e., the location cloaker) is needed to cloak K users’ locations for protecting user privacy. 4

  5. Presentation Outline � Introduction � Related Work � System Architecture � Privacy Protected Query Algorithms � Simulation Result � Future Research Directions System Architecture 5

  6. System Architecture (Cont.) � Access Point � PDAs, cell phones, laptops, etc. � Location-based Service Providers � e.g., “ Find my nearest gas station ” - users have to reveal their identity. � Location Cloaker � A trusted server which implements K -Anonymity mechanisms and manages the location of users. � User privacy policies – K-anonymous and the minimum cloaked region size. � Need new query processing algorithms. Presentation Outline � Introduction � Related Work � System Architecture � Privacy Protected Query Algorithms � Simulation Results � Future Research Directions 6

  7. Privacy Protected Nearest Neighbor Query - Preprocessing Privacy Protected Nearest Neighbor Query (k = 1) 7

  8. Privacy Protected Range Query Presentation Outline � Introduction � Related Work � System Architecture � Privacy Protected Query Algorithms � Simulation Results � Future Research Directions 8

  9. Simulation Parameter Sets Simulation - Cloaked Region Size 9

  10. Simulation – Number of POI Simulation – Real World Parameters 10

  11. Presentation Outline � Introduction � Related Work � System Architecture � Privacy Protected Query Algorithms � Simulation Results � Future Research Directions Future Research Directions � Cache management techniques for the location cloaker. � Cloaking by road segments. � Solution set size reduction. 11

  12. Questions & suggestions 12

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend