Quantifying Privacy Loss
- f Human Mobility Graph Topology
Dionysis Manousakas∗, Cecilia Mascolo∗,†, Alastair R. Beresford∗, Dennis Chan∗, Nikhil Sharma‡
∗University of Cambridge †The Alan Turing Institute ‡UCL
Quantifying Privacy Loss of Human Mobility Graph Topology The 18th - - PowerPoint PPT Presentation
Quantifying Privacy Loss of Human Mobility Graph Topology The 18th Privacy Enhancing Technologies Symposium July 2427, 2018 Dionysis Manousakas , Cecilia Mascolo , , Alastair R. Beresford , Dennis Chan , Nikhil Sharma
∗University of Cambridge †The Alan Turing Institute ‡UCL
PETS’18 Background 2
PETS’18 Background 2
PETS’18 Background 2
PETS’18 Background 2
PETS’18 Background 3
PETS’18 Background 4
PETS’18 Background 5
PETS’18 Motivation 6
PETS’18 Motivation 6
PETS’18 Motivation 6
PETS’18 Motivation 6
PETS’18 Motivation 6
PETS’18 Motivation 7
PETS’18 Motivation 7
PETS’18 Overview 8
PETS’18 Overview 8
PETS’18 Overview 8
PETS’18 Overview 8
PETS’18 Overview 9
PETS’18 Overview 10
PETS’18 Overview 11
PETS’18 Overview 12
[Sweeney, 2002] PETS’18 Method 13
PETS’18 Method 14
PETS’18 Method 15
PETS’18 Method 16
PETS’18 Method 17
PETS’18 Method 18
PETS’18 Method 19
PETS’18 Method 20
PETS’18 Method 21
true|Gtrain, K
true
PETS’18 Method 22
φ(G) ||φ(G)||, φ(G′) ||φ(G′)||
PETS’18 Method 23
φ(G) ||φ(G)||, φ(G′) ||φ(G′)||
PETS’18 Method 23
φ(G) ||φ(G)||, φ(G′) ||φ(G′)||
PETS’18 Method 23
1 rank(·)
PETS’18 Method 24
PETS’18 Method 25
PETS’18 Conclusions 26
PETS’18 Conclusions 27
PETS’18 Conclusions 28
de Montjoye, Y.-A., Hidalgo, C. A., Verleysen, M., and Blondel, V. D. (2013). Unique in the Crowd: The privacy bounds of human mobility. Scientifjc reports, 3(1):1376. De Mulder, Y., Danezis, G., Batina, L., and Preneel, B. (2008). Identifjcation via location-profjling in GSM networks. In Proceedings of the 2008 ACM Workshop on Privacy in the Electronic Society, WPES 2008, Alexandria, VA, USA, October 27, 2008, pages 23–32. Gambs, S., Killijian, M.-O., and Núñez Del Prado Cortez, M. (2014). De-anonymization attack on geolocated data.
Lin, M., Cao, H., Zheng, V. W., Chang, K. C., and Krishnaswamy, S. (2015). Mobile user verifjcation/identifjcation using statistical mobility profjle. In 2015 International Conference on Big Data and Smart Computing, BIGCOMP 2015, Jeju, South Korea, February 9-11, 2015, pages 15–18. Naini, F. M., Unnikrishnan, J., Thiran, P., and Vetterli, M. (2016). Where You Are Is Who You Are: User Identifjcation by Matching Statistics. IEEE Transactions on Information Forensics and Security, 11(2):358–372. Narayanan, A. and Shmatikov, V. (2008). Robust de-anonymization of large sparse datasets. In Proceedings of the 2008 IEEE Symposium on Security and Privacy, SP ’08, pages 111–125, Washington, DC, USA. IEEE Computer Society. PETS’18 References 29
Pyrgelis, A., Troncoso, C., and De Cristofaro, E. (2017). What does the crowd say about you? evaluating aggregation-based location privacy. Proceedings on Privacy Enhancing Technologies, 2017(4):156–176. Scholtes, I. (2017). When is a network a network?: Multi-order graphical model selection in pathways and temporal networks. In Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD ’17, pages 1037–1046, New York, NY, USA. ACM. Sharad, K. and Danezis, G. (2014). An automated social graph de-anonymization technique. In Proceedings of the 13th Workshop on Privacy in the Electronic Society, WPES ’14, pages 47–58, New York, NY,
Sweeney, L. (2002). k-anonymity: A model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 10(05):557–570. Vishwanathan, S., Schraudolph, N., Kondor, R., and Borgwardt, K. (2010). Graph Kenrels. Journal of Machine Learning Research, 11:1201–1242. Xu, F., Tu, Z., Li, Y., Zhang, P., Fu, X., and Jin, D. (2017). Trajectory recovery from ash: User privacy is not preserved in aggregated mobility data. In Proceedings of the 26th International Conference on World Wide Web, pages 1241–1250. International World Wide Web Conferences Steering Committee. PETS’18 References 30
Yanardag, P. and Vishwanathan, S. (2015). Deep graph kernels. In Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD ’15, pages 1365–1374, New York, NY, USA. ACM. Zang, H. and Bolot, J. (2011). Anonymization of location data does not work: A large-scale measurement study. In Proceedings of the 17th Annual International Conference on Mobile Computing and Networking, MobiCom ’11, pages 145–156, New York, NY, USA. ACM. PETS’18 References 31
PETS’18 References 32