Related Works LOFConclusion Introduction Contents ICISS 20142.

23
_______________ THONG M. DOAN HAN N. DINH NAM T. NGUYEN PHUOC T. TRAN LOF Location Obfuscation Framework for Training- Free Localization

Transcript of Related Works LOFConclusion Introduction Contents ICISS 20142.

Page 1: Related Works LOFConclusion Introduction Contents ICISS 20142.

_______________THONG M. DOANHAN N. DINHNAM T. NGUYENPHUOC T. TRAN

LOFLocation Obfuscation Framework for Training-Free Localization

Page 2: Related Works LOFConclusion Introduction Contents ICISS 20142.

ICISS 2014 2

Related Works

LOF

Conclusion

Introduction

Contents

Page 3: Related Works LOFConclusion Introduction Contents ICISS 20142.

ICISS 2014 3

INTRODUCTION

Page 4: Related Works LOFConclusion Introduction Contents ICISS 20142.

ICISS 2014 4

LOF is a security framework protecting privacy for SIL and other training-free localization algorithms. SIL: Search-based Indoor Localization Training-free: no need pre-built map for

localization save resources (human labor, time, money)

Why SIL needs protection?

Introduction

Page 5: Related Works LOFConclusion Introduction Contents ICISS 20142.

ICISS 2014 5

RELATED WORKS

Page 6: Related Works LOFConclusion Introduction Contents ICISS 20142.

ICISS 2014 6

SILTraining-Free Localization

SSID listKG MECH BranchReliance TrendsNMDC Head Office

URL listwww.kgmech.com/www.tiendeo.in/Shops/hyderabad/reliance-trendswww.nmdc.co.in/

Potential address list

• Khanij Bhavan, Masab Tank, Hyderabad – 500028

• 10-3-310/1, Masab Tank, Mehdipatnam, Hyderabad – 500028

• 1-10-39 to 44, Begumpet, Hyderabad, AP-50001610-4/A/12/1 Masab Tank, Hyderabad – 500018

• …

Search Engine

query

SSIDScanning

Geo-InfoRetrieving

Address Processing component

10-3-310/1 Masab Tank, Hyderabad, 500028

Masab Tank Road

Page 7: Related Works LOFConclusion Introduction Contents ICISS 20142.

ICISS 2014 7

SILFramework

Address Processing

• Evaluate & Rank Addresses

Geo-Info Retrieving

• Search Engine

• Crawl Webs & Retrieve Geo-Info.

SSID Scanning

• Scan APs

• Pre-process APs

SSIDSCANNING

GEO-INFORETRIEVING

ADDRESSPROCESSING

Page 8: Related Works LOFConclusion Introduction Contents ICISS 20142.

ICISS 2014 8

Accuracy: ~80% (1 km error-range)Time response: 1 min (acceptable for

indoor movement)Bandwidth cost: ~2MB per locationGeo-Retrieving component consumes

much bandwidth & time Solution: crowd-sourcing (cloud) to share geo-

info between users Result: negligible cost (2.5KB & 1 second per

location)

SILOverview Result

Page 9: Related Works LOFConclusion Introduction Contents ICISS 20142.

ICISS 2014 9

Ask third-party for geo-info: Location privacy threat Leakage of user location information while asking for

geo-information through the cloud (third-parties, …)

Geo-Info

Third-Party

Geo-Info

SIL

User Location

device

User

SSID set

SILProblem ???

Page 10: Related Works LOFConclusion Introduction Contents ICISS 20142.

ICISS 2014 10

LOFLOCATION OBFUSCATION FRAMEWORK

Page 11: Related Works LOFConclusion Introduction Contents ICISS 20142.

ICISS 2014 11

K-Anonymity: Anonymize information Add distortion information in the query sent to

the third-partyPIH – Partial Information Hiding:

Reduce amount of actual information exposed to third-party

LOFApproach

Preserve the location anonymityKeeping the bandwidth cost at acceptable level

Page 12: Related Works LOFConclusion Introduction Contents ICISS 20142.

ICISS 2014 12

Idea: Add K-1 users’ info

to disguise actual user’s info

Trusted anonymizer

LOFK-Anonymity

Apply: No anonymizer Add disguised SSIDs to the query sent to

third-party

Page 13: Related Works LOFConclusion Introduction Contents ICISS 20142.

ICISS 2014 13

LOFApproach

originalset

requestset

disguisedset

PIH

K-Anonymity

Third-Party

obfuscatedset

Geo-Info

requestset

self-processsetself-process

set

Page 14: Related Works LOFConclusion Introduction Contents ICISS 20142.

ICISS 2014 14

LOFParameters

originalset

requestset

α

disguisedset

β

α 100%: bandwidth is negligible

since the whole original set is queried

α increase anonymity decreaseβ

200%: means disguised SSIDs are two times more than original set

β increase anonymity increase

Page 15: Related Works LOFConclusion Introduction Contents ICISS 20142.

ICISS 2014 15

LOFDistribution of Disguised SSIDs

RD – Random Distribution:The SSIDs are scattered randomly and have no geo-relation with each other.

ID – Inter-proximate Distribution:The SSIDs are geo-correlated and in close proximity with each other.

Page 16: Related Works LOFConclusion Introduction Contents ICISS 20142.

ICISS 2014 16

LOFEffect of α and β on Anonymity and Overhead

α=50% β=100%: bandwidth reduced in halfα=100% β=100%: negligible bandwidthAnonymity in both cases is at least 90%

10 20 30 40 50 10060

70

80

90

100

β = 200%

β = 100%

β = 50%

β = 25%

β = 0%

α (%)

No

rmal

ized

An

on

ymit

y (%

)

Fixed β, error range = 500mwith ID SSIDs

10 20 30 40 50 10060

70

80

90

100

β = 200%

β = 100%

β = 50%

β = 25%

β = 0%

α (%)

No

rmal

ized

An

on

ymit

y (%

)

Fixed β, error range = 500mwith RD SSIDs

Page 17: Related Works LOFConclusion Introduction Contents ICISS 20142.

ICISS 2014 17

LOFEffect of ID and RD distributions on Anonymity

ID is better in obfuscating data than RD due to geo-correlation attribute of CGSIL

Anonymity level with fixed α, error range = 500m

0 25 50 100 20060

70

80

90

100

ID, α=50%ID, α=100%RD, α=50%

β (%)

No

rma

lize

dA

no

ny

mit

y (

%)

Page 18: Related Works LOFConclusion Introduction Contents ICISS 20142.

ICISS 2014 18

LOFCorrelation of α and β

Low values of β: the anonymity is dependent upon α’s valueHigh values of β: the anonymity is dependent upon β’s value

Hit-Rate of Third-Party Predictionwith β=0%

Hit-Rate of Third-Party Predictionwith β=200%

Page 19: Related Works LOFConclusion Introduction Contents ICISS 20142.

ICISS 2014 19

CONCLUSION

Page 20: Related Works LOFConclusion Introduction Contents ICISS 20142.

ICISS 2014 20

LOF efficiently keeps the bandwidth overhead of SIL at minimal level while offering 90% anonymity.

Parameters (α, β) are configurable:

CONCLUSION

α β Bandwidth Anonymity

50% 100% ½ reduced 90%

100% 100% Negligible 85%

Page 21: Related Works LOFConclusion Introduction Contents ICISS 20142.

ICISS 2014 21

References1. Truc D. Le, Thong M. Doan, Han N. Dinh, Nam T. Nguyen, “ISIL: Instant Search-based Indoor

Localization”, in Conference “CCNC 2013- Mobile Device & Platform & Applications”, The 10th Annual IEEE CCNC, Las Vegas, NV, USA, 2013.

2. Thong M. Doan, Han N. Dinh, Nam T. Nguyen, “CGSIL: Collaborative Geo-clustering Search-based Indoor Localization”. Accepted in the 16th IEEE International Conference on High Performance Computing and Communications (HPCC), Paris, France, 2014

3. Han N. Dinh, Thong M. Doan, Nam T. Nguyen, “CGSIL: A Viable Training-Free Wi-Fi Localization”, in the Eighth International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies (UBICOMM), Rome, Italy, 2014.

4. L. Sweeney: k-Anonymity: A Model for Protecting Privacy. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems (2002) 557-570

5. Panos Kalnis, Gabriel Ghinita, Kyriakos Mouratidis, and Dimitris Papadias: Preventing Location-Based Identity Inference in Anonymous Spatial Queries, Vol 19, No. 12. IEEE Transactions on Knowledge and Data Engineering (12-2007) 1719-1733

6. Buğra Gedik, Ling Liu: A Customizable k-Anonymity Model for Protecting Location Privacy. ICDCS (2004) 620–629

7. Ge Zhong, Urs Hengartner: A Distributed k-Anonymity Protocol for Location Privacy. IEEE Int. Conference on Pervasive Computing and Communications (PerCom) (2009) 1-10

8. Buğra Gedik, Ling Liu: Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms, Vol. 7, No. 1. IEEE Transactions on Mobile Computing (2008)

9. Aris Gkoulalas–Divanis, Panos Kalnis, Vassilios S. Verykios: Providing K–Anonymity in Location Based Services, Vol. 12, Issue 1. SIGKDD Explorations

Page 22: Related Works LOFConclusion Introduction Contents ICISS 20142.

ICISS 2014 22

Q&A

Page 23: Related Works LOFConclusion Introduction Contents ICISS 20142.