1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity =...
-
Upload
aron-chandler -
Category
Documents
-
view
223 -
download
0
Transcript of 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity =...
![Page 1: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.](https://reader035.fdocuments.in/reader035/viewer/2022062519/56649ccf5503460f9499be10/html5/thumbnails/1.jpg)
1
Location Privacy
![Page 2: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.](https://reader035.fdocuments.in/reader035/viewer/2022062519/56649ccf5503460f9499be10/html5/thumbnails/2.jpg)
2
Context
Better localization technology
+
Pervasive wireless connectivity
=
Location-based applications
![Page 3: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.](https://reader035.fdocuments.in/reader035/viewer/2022062519/56649ccf5503460f9499be10/html5/thumbnails/3.jpg)
3
Location-Based Apps
For Example: GeoLife shows grocery list near WalMart Micro-Blog allows location scoped querying Location-based ad: Coffee coupon at Starbucks …
Location expresses context of user Facilitating content delivery
Location is the IP addressLocation is the IP addressIts as if for content
![Page 4: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.](https://reader035.fdocuments.in/reader035/viewer/2022062519/56649ccf5503460f9499be10/html5/thumbnails/4.jpg)
4
While location drives this new class of applications,
it also violates user’s privacy
Sharper the location, richer the app, deeper the violation
Double-Edged Sword
![Page 5: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.](https://reader035.fdocuments.in/reader035/viewer/2022062519/56649ccf5503460f9499be10/html5/thumbnails/5.jpg)
5
The Location Based Service Workflow
Client Server LBS Database
(Location Based Service)
Request:Retrieve all available services in
client’s location
Forward to local service:Retrieve all available services in
location
Reply:Reply:
![Page 6: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.](https://reader035.fdocuments.in/reader035/viewer/2022062519/56649ccf5503460f9499be10/html5/thumbnails/6.jpg)
6
The Location Anonymity Problem
Client Server LBS Database
(Location Based Service)
Request: Retrieve all bus lines from location to address
= =
Privacy Violated
![Page 7: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.](https://reader035.fdocuments.in/reader035/viewer/2022062519/56649ccf5503460f9499be10/html5/thumbnails/7.jpg)
7
Moreover, range of apps are PUSH based.
Require continuous location information
Phone detected at Starbucks, PUSH a coffee coupon
Phone located on highway, query traffic congestion
Double-Edged Sword
![Page 8: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.](https://reader035.fdocuments.in/reader035/viewer/2022062519/56649ccf5503460f9499be10/html5/thumbnails/8.jpg)
8
Location Privacy
Problem:
Research:
Continuous location exposure
a serious threat to privacy
Continuous location exposure
a serious threat to privacy
Preserve privacy without
sacrificing the quality of
continuous loc. based apps
Preserve privacy without
sacrificing the quality of
continuous loc. based apps
![Page 9: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.](https://reader035.fdocuments.in/reader035/viewer/2022062519/56649ccf5503460f9499be10/html5/thumbnails/9.jpg)
9
Just Call Yourself ``Freddy”
Pseudonymns [Gruteser04] Effective only when infrequent location exposure Else, spatio-temporal patterns enough to deanonymize
… think breadcrumbs
Romit’s OfficeRomit’s Office
John Leslie Jack Susan
Alex
![Page 10: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.](https://reader035.fdocuments.in/reader035/viewer/2022062519/56649ccf5503460f9499be10/html5/thumbnails/10.jpg)
10
A Customizable k-Anonymity Model for Protecting Location Privacy
Paper by:
B. Gedik, L.Liu
(Georgia Tech)
Slides adopted from: Tal Shoseyov
![Page 11: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.](https://reader035.fdocuments.in/reader035/viewer/2022062519/56649ccf5503460f9499be10/html5/thumbnails/11.jpg)
11
Location Anonymity
“A message from a client to a database is called location anonymous if the client’s identity cannot be distinguished from other users based on the client’s location information.”
Database
![Page 12: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.](https://reader035.fdocuments.in/reader035/viewer/2022062519/56649ccf5503460f9499be10/html5/thumbnails/12.jpg)
12
k-Anonymity
“A message from a client to a database is called location k-anonymous if the client cannot be identified by the database based on the client’s location from other k-1 clients.”
![Page 13: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.](https://reader035.fdocuments.in/reader035/viewer/2022062519/56649ccf5503460f9499be10/html5/thumbnails/13.jpg)
13
Implementation of Location Anonymity
Client sends plain request to the server
Server sends “anonymized”
message
Database executes request according to the
received anonymous dataDatabase replies to server
with compiled data
Server forwards data to client
Server transforms the message by
“anonymizing” the location data in the message
![Page 14: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.](https://reader035.fdocuments.in/reader035/viewer/2022062519/56649ccf5503460f9499be10/html5/thumbnails/14.jpg)
14
Implementation of Location k-Anonymity
Spatial Cloaking – Setting a range of space to be a single box, where all clients located within the range are said to be in the “same location”.
x
y
Temporal Cloaking – Setting a time interval, where all the clients in a specific location sending a message in that time interval are said to have sent the message in the “same time”.
t
![Page 15: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.](https://reader035.fdocuments.in/reader035/viewer/2022062519/56649ccf5503460f9499be10/html5/thumbnails/15.jpg)
15
Implementation of Location k-Anonymity
x
yt
Spatial-Temporal Cloaking – Setting a range of space and a time interval, where all the messages sent by client inside the range in that time interval. This spatial and temporal area is called a “cloaking box”.
![Page 16: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.](https://reader035.fdocuments.in/reader035/viewer/2022062519/56649ccf5503460f9499be10/html5/thumbnails/16.jpg)
16
Previous solutions
M. Gruteser, D Grunwald (2003) – For a fixed k value, the server finds the smallest area around the client’s location that potentially contains k-1 different other clients, and monitoring that area over time until such k-1 clients are found.
Drawback:
Fixed anonymity value for all clients (service dependent)
![Page 17: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.](https://reader035.fdocuments.in/reader035/viewer/2022062519/56649ccf5503460f9499be10/html5/thumbnails/17.jpg)
17
Add Noise
K-anonymity [Gedic05] Convert location to a space-time bounding box Ensure K users in the box Location Apps reply to boxed region
Issues Poor quality of location Degrades in sparse regions Not real-time
YouBounding Box
K=4
![Page 18: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.](https://reader035.fdocuments.in/reader035/viewer/2022062519/56649ccf5503460f9499be10/html5/thumbnails/18.jpg)
18
Confuse Via Mixing
Path intersections is an opportunity for privacy If users intersect in space-time, cannot say who is who later
![Page 19: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.](https://reader035.fdocuments.in/reader035/viewer/2022062519/56649ccf5503460f9499be10/html5/thumbnails/19.jpg)
19
Confuse Via Mixing
Path intersections is an opportunity for privacy If users intersect in space-time, cannot say who is who later
Unfortunately, users may not intersect
in both space and time
Unfortunately, users may not intersect
in both space and time
Hospital
Airport
?
?
![Page 20: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.](https://reader035.fdocuments.in/reader035/viewer/2022062519/56649ccf5503460f9499be10/html5/thumbnails/20.jpg)
20
Hiding Until Mixed
Partially hide locations until users mixed [Gruteser07] Expose after a delay
Hospital
Airport
![Page 21: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.](https://reader035.fdocuments.in/reader035/viewer/2022062519/56649ccf5503460f9499be10/html5/thumbnails/21.jpg)
21
Hiding Until Mixed
Partially hide locations until users mixed [Gruteser07] Expose after a delay
But delays unacceptable to real-time appsBut delays unacceptable to real-time apps
Hospital
Airport
![Page 22: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.](https://reader035.fdocuments.in/reader035/viewer/2022062519/56649ccf5503460f9499be10/html5/thumbnails/22.jpg)
22
Existing solutions seem to suggest:
Privacy and Quality of Localization (QoL) is a zero sum game
Need to sacrifice one to gain the other
![Page 23: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.](https://reader035.fdocuments.in/reader035/viewer/2022062519/56649ccf5503460f9499be10/html5/thumbnails/23.jpg)
23
Hiding Stars with Fireworks:Location Privacy through Camouflage
![Page 24: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.](https://reader035.fdocuments.in/reader035/viewer/2022062519/56649ccf5503460f9499be10/html5/thumbnails/24.jpg)
24
Goal
Break away from this tradeoff
Target: Spatial accuracy
Real-time updates
Privacy guarantees
Even in sparse populations
New Proposal: CacheCloakNew Proposal: CacheCloak
![Page 25: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.](https://reader035.fdocuments.in/reader035/viewer/2022062519/56649ccf5503460f9499be10/html5/thumbnails/25.jpg)
25
The Intuition
Predict until paths intersect
Hospital
Airport
![Page 26: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.](https://reader035.fdocuments.in/reader035/viewer/2022062519/56649ccf5503460f9499be10/html5/thumbnails/26.jpg)
26
The Intuition
Predict until paths intersect
Hospital
Airport
Predict
Predict
![Page 27: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.](https://reader035.fdocuments.in/reader035/viewer/2022062519/56649ccf5503460f9499be10/html5/thumbnails/27.jpg)
27
The Intuition
Predict until paths intersect Expose predicted intersection to application
Hospital
Airport
Cache the information on each predicted locationCache the information on each predicted location
Predict
Predict
![Page 28: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.](https://reader035.fdocuments.in/reader035/viewer/2022062519/56649ccf5503460f9499be10/html5/thumbnails/28.jpg)
28
CacheCloak
System Design and Evaluation
![Page 29: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.](https://reader035.fdocuments.in/reader035/viewer/2022062519/56649ccf5503460f9499be10/html5/thumbnails/29.jpg)
29
Assume trusted privacy provider Reveal location to CacheCloak CacheCloak exposes anonymized location to Loc. App
Architecture
CacheCloakCacheCloak
Loc. App1Loc. App1 Loc. App2Loc. App2 Loc. App3Loc. App3 Loc. App4Loc. App4
![Page 30: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.](https://reader035.fdocuments.in/reader035/viewer/2022062519/56649ccf5503460f9499be10/html5/thumbnails/30.jpg)
30
In Steady State …
Location Based ApplicationLocation Based Application
CacheCloak
![Page 31: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.](https://reader035.fdocuments.in/reader035/viewer/2022062519/56649ccf5503460f9499be10/html5/thumbnails/31.jpg)
31
Prediction
Location Based ApplicationLocation Based Application
Backward
prediction
Forward
prediction
CacheCloak
![Page 32: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.](https://reader035.fdocuments.in/reader035/viewer/2022062519/56649ccf5503460f9499be10/html5/thumbnails/32.jpg)
32
Prediction
Location Based ApplicationLocation Based Application
CacheCloak
![Page 33: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.](https://reader035.fdocuments.in/reader035/viewer/2022062519/56649ccf5503460f9499be10/html5/thumbnails/33.jpg)
33
Predicted Intersection
Location Based ApplicationLocation Based Application
Predicted Path
CacheCloak
![Page 34: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.](https://reader035.fdocuments.in/reader035/viewer/2022062519/56649ccf5503460f9499be10/html5/thumbnails/34.jpg)
34
Query
Location Based ApplicationLocation Based Application
Predicted Path
CacheCloak
![Page 35: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.](https://reader035.fdocuments.in/reader035/viewer/2022062519/56649ccf5503460f9499be10/html5/thumbnails/35.jpg)
35
Query
Location Based ApplicationLocation Based Application
?
? ?
?
CacheCloak
![Page 36: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.](https://reader035.fdocuments.in/reader035/viewer/2022062519/56649ccf5503460f9499be10/html5/thumbnails/36.jpg)
36
LBA Responds
Location Based ApplicationLocation Based Application
Array of responses
CacheCloak
![Page 37: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.](https://reader035.fdocuments.in/reader035/viewer/2022062519/56649ccf5503460f9499be10/html5/thumbnails/37.jpg)
37
Cached
Location Based ApplicationLocation Based Application
Cached Responses
Location based
Information
CacheCloak
![Page 38: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.](https://reader035.fdocuments.in/reader035/viewer/2022062519/56649ccf5503460f9499be10/html5/thumbnails/38.jpg)
38
Cached Response
Location Based ApplicationLocation Based Application
Cached Responses
Location based
Information
CacheCloak
![Page 39: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.](https://reader035.fdocuments.in/reader035/viewer/2022062519/56649ccf5503460f9499be10/html5/thumbnails/39.jpg)
39
Cached Response
Location Based ApplicationLocation Based Application
Cached Responses
Location based
Information
CacheCloak
![Page 40: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.](https://reader035.fdocuments.in/reader035/viewer/2022062519/56649ccf5503460f9499be10/html5/thumbnails/40.jpg)
40
Cached Response
Location Based ApplicationLocation Based Application
Cached Responses
CacheCloak
![Page 41: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.](https://reader035.fdocuments.in/reader035/viewer/2022062519/56649ccf5503460f9499be10/html5/thumbnails/41.jpg)
41
Cached Response
Location Based ApplicationLocation Based Application
Predicted
Path
CacheCloak
![Page 42: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.](https://reader035.fdocuments.in/reader035/viewer/2022062519/56649ccf5503460f9499be10/html5/thumbnails/42.jpg)
42
Benefits
Real-time Response ready when user
arrives at predicted location
High QoL Responses can be specific to location Overhead on the wired backbone (caching helps)
Entropy guarantees Entropy increases at traffic intersections
Sparse population Can be handled with dummy users, false branching
Predicted Path
![Page 43: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.](https://reader035.fdocuments.in/reader035/viewer/2022062519/56649ccf5503460f9499be10/html5/thumbnails/43.jpg)
43
Quantifying Privacy
City converted into grid of small sqaures (pixels) Users are located at a pixel at a given time
Each pixel associated with 8x8 matrix Element (x, y) = probability that user enters x and exits y
Probabilities diffuse At intersections Over time
Privacy = entropy
x
y
€
Euser = − pipixels∑ log pi
pixel
![Page 44: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.](https://reader035.fdocuments.in/reader035/viewer/2022062519/56649ccf5503460f9499be10/html5/thumbnails/44.jpg)
44
Diffusion
Probability of user’s presence diffuses Diffusion gradient computed based on history i.e., what fraction of users take right turn at this
intersectionTime t1
Time t2
Time t3
Road
Intersection
![Page 45: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.](https://reader035.fdocuments.in/reader035/viewer/2022062519/56649ccf5503460f9499be10/html5/thumbnails/45.jpg)
45
Evaluation
Trace based simulation VanetMobiSim + US Census Bureau trace data Durham map with traffic lights, speed limits, etc.
Vehicles follow Google map paths Performs collision avoidance
6km x 6km
10m x 10m pixel
1000 cars
6km x 6km
10m x 10m pixel
1000 cars
![Page 46: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.](https://reader035.fdocuments.in/reader035/viewer/2022062519/56649ccf5503460f9499be10/html5/thumbnails/46.jpg)
46
Results
High average entropy Quite insensitive to user density (good for sparse regions) Minimum entropy reasonably high
Number of Users (N)Time (Minutes)
Min.
Max.
Bit
s o
f M
ean
En
tro
py
![Page 47: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.](https://reader035.fdocuments.in/reader035/viewer/2022062519/56649ccf5503460f9499be10/html5/thumbnails/47.jpg)
47
Results
Peak Counting # of places where attacker’s confidence is > Threshold
Time (Seconds)Time (Seconds)
Me
an
# o
f P
ea
ks
![Page 48: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.](https://reader035.fdocuments.in/reader035/viewer/2022062519/56649ccf5503460f9499be10/html5/thumbnails/48.jpg)
48
Results
Peak Counting # of places where attacker’s confidence is > Threshold
Number of Users (N)
Me
an
# o
f P
ea
ks
![Page 49: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.](https://reader035.fdocuments.in/reader035/viewer/2022062519/56649ccf5503460f9499be10/html5/thumbnails/49.jpg)
49
Limitations, Discussions …
CacheCloak overhead Application replies to lot of queries However, overhead on wired infrastructure Caching reduces this overhead significantly
CacheCloak assumes same, indistinguishable query Different queries can deanonymize Possible through query combination … future work
Per-user privacy guarantee not yet supported Adaptive branching & dummy users
CacheCloak - a central trusted entity Distributed version proposed in the paper
![Page 50: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.](https://reader035.fdocuments.in/reader035/viewer/2022062519/56649ccf5503460f9499be10/html5/thumbnails/50.jpg)
50
Closing Thoughts
Two nodes may intersect in space but not in time
Mixing not possible, without sacrificing timeliness
Mobility prediction creates space-time intersections
Enables virtual mixing in future
![Page 51: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.](https://reader035.fdocuments.in/reader035/viewer/2022062519/56649ccf5503460f9499be10/html5/thumbnails/51.jpg)
51
Closing Thoughts
CacheCloak Implements the prediction and caching function
High entropy possibleeven under sparse population
Spatio-temporal accuracy remains uncompromised
![Page 52: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.](https://reader035.fdocuments.in/reader035/viewer/2022062519/56649ccf5503460f9499be10/html5/thumbnails/52.jpg)
52
![Page 53: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.](https://reader035.fdocuments.in/reader035/viewer/2022062519/56649ccf5503460f9499be10/html5/thumbnails/53.jpg)
53
![Page 54: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.](https://reader035.fdocuments.in/reader035/viewer/2022062519/56649ccf5503460f9499be10/html5/thumbnails/54.jpg)
54
Thank You
For more related work, visit:
http://synrg.ee.duke.edu