location privacy
play

Location Privacy CompSci 590.03 Instructor: Ashwin Machanavajjhala - PowerPoint PPT Presentation

news.consumerreports.org Location Privacy CompSci 590.03 Instructor: Ashwin Machanavajjhala Some slides are from a tutorial by Mohamed Mokbel (ICDM 2008) Lecture 19: 590.03 Fall 12 1 Outline Location based services Location Privacy


  1. news.consumerreports.org Location Privacy CompSci 590.03 Instructor: Ashwin Machanavajjhala Some slides are from a tutorial by Mohamed Mokbel (ICDM 2008) Lecture 19: 590.03 Fall 12 1

  2. Outline • Location based services • Location Privacy Challenges • Achieving Location Privacy – Concepts – Solutions • Open Questions Lecture 19: 590.03 Fall 12 2

  3. Location Based services Mayor of Starbucks Today, Local Hero Tomorrow: The Power and Privacy Pitfalls of Location Sharing Julie Adler, June 2011 “ Imagine being a victim of cardiac arrest with about ten minutes to live, and first responders more than ten minutes away. A CPR- trained passerby gets a mobile ping from the fire department that someone nearby needs help; the good Samaritan then rushes to your side, administers CPR, and keeps you alive long enough to ” get professional help. Lecture 19: 590.03 Fall 12 3

  4. Location Based Services • Location based Traffic Reports Analysis of – How many cars on 15-501? location data – What is the shortest travel time? • Location based Search – “ showtimes near me” User initiated – Is there an ophthalmologist within 3 miles of my current location? – What is the nearest gas station? • Location based advertising/recommendation System Initiated – Starbucks (.5 miles away) is giving away free lattes. Lecture 19: 590.03 Fall 12 4

  5. Location Based Services Lecture 19: 590.03 Fall 12 5

  6. Location Based Services Yahoo! Maps GPS Devices Google Maps GIS / Spatial … Databases Mobile Internet Devices Location Based Services Lecture 19: 590.03 Fall 12 6

  7. Outline • Location based services • Location Privacy Challenges • Achieving Location Privacy – Concepts – Solutions • Open Questions Lecture 19: 590.03 Fall 12 7

  8. Privacy Threats http://www.thereporteronline.com/article/20121102/NEWS01/121109 915/man-accused-of-stalking-hatfield-woman Lecture 19: 590.03 Fall 12 8

  9. Privacy Threats Lecture 19: 590.03 Fall 12 9

  10. Privacy Threats http://wifi.weblogsinc.com/2004/09/24/companies-increasingly-use- gps-enabled-cell-phones-to-track/ Lecture 19: 590.03 Fall 12 10

  11. GPS Act ( http://www.wyden.senate.gov/download/wyden- chaffetz-gps-amendment-text ) Lecture 19: 590.03 Fall 12 12

  12. Privacy-utility tradeoff  Example: What is my nearest gas station? 100% Utility 0% Privacy 0% 100% Lecture 19: 590.03 Fall 12 13

  13. Why is Location Privacy different? Database Privacy Location Privacy • Each individual’s record • Individual’s current and must be kept secret. future locations (and other inferences) must be secret. • Queries (location) • Queries are not private themselves are private! • Must tolerate updates to • Data is usually static locations. • Privacy is common across all • Privacy is personalized for individuals different individuals Lecture 19: 590.03 Fall 12 14

  14. Outline • Location based services • Location Privacy Challenges • Achieving Location Privacy – Concepts – Solutions • Open Questions Lecture 19: 590.03 Fall 12 15

  15. Location Perturbation • The user location is represented with a wrong value • The privacy is achieved from the fact that the reported location is false • The accuracy and the amount of privacy mainly depends on how far the reported location form the exact location Lecture 19: 590.03 Fall 12 16

  16. Spatial Cloaking • The user exact location is represented as a region that includes the exact user location • An adversary does know that the user is located in the cloaked region, but has no clue where the user is exactly located • The area of the cloaked region achieves a trade-off between the user privacy and the service Lecture 19: 590.03 Fall 12 17

  17. Spatio-temporal cloaking • In addition to spatial cloaking Y the user information can be delayed a while to cloak the temporal dimension • Temporal cloaking could tolerate asking about stationary objects (e.g., gas stations) X • Challenging to support querying moving objects, e.g., where is T my nearest friend Lecture 19: 590.03 Fall 12 18

  18. Data Dependent Cloaking Naïve cloaking MBR cloaking • If you know other individuals, you can have a single coarse region to represent all of them. Lecture 19: 590.03 Fall 12 19

  19. Space Dependent Cloaking Adaptive grid cloaking Fixed grid cloaking Lecture 19: 590.03 Fall 12 20

  20. K-anonymity • The cloaked region contains at least k users • The user is indistinguishable among other k users • The cloaked area largely depends on the surrounding environment. • A value of k =100 may result in a very small area if a user is located in the stadium or may result in a very large area if the user in the desert. Lecture 19: 590.03 Fall 12 21

  21. Queries in Location services • Private Queries over Public Data – What is my nearest gas station – The user location is private while the objects of interest are public • Public Queries over Private Data – How many cars in the downtown area – The query location is public while the objects of interest is private • Private Queries over Private Data – Where is my nearest friend – Both the query location and objects of interest are private Lecture 19: 590.03 Fall 12 22

  22. Modes of Privacy • User Location Privacy – Users want to hide their location information and their query information • User Query Privacy – Users do not mind or obligated to reveal their locations, however, users want to hide their queries • Trajectory Privacy – Users do not mind to reveal few locations, however, they want to avoid linking these locations together to form a trajectory Lecture 19: 590.03 Fall 12 23

  23. Outline • Location based services • Location Privacy Challenges • Achieving Location Privacy – Concepts – Solutions • Open Questions Lecture 19: 590.03 Fall 12 24

  24. Solution Architectures for Location Privacy • Client-Server architecture – Users communicated directly with the sever to do the anonymization process. Possibly employing an offline phase with a trusted entity • Third trusted party architecture – A centralized trusted entity is responsible for gathering information and providing the required privacy for each user • Peer-to-Peer cooperative architecture – Users collaborate with each other without the interleaving of a centralized entity to provide customized privacy for each single user Lecture 19: 590.03 Fall 12 25

  25. Client-Server Location Based Service Query + Perturbed Location Answer Lecture 19: 590.03 Fall 12 26

  26. Client-Server • Clients try to cheat the server using either fake locations or fake space • Simple to implement, easy to integrate with existing technologies • Lower quality of service • Examples: Landmark objects, false dummies Lecture 19: 590.03 Fall 12 27

  27. Client-Server Solution 1: Landmarks • Instead of reporting the exact location, report the location of a closest landmark • The query answer will be based on the landmark • Voronoi diagrams can be used to efficiently identify the closest landmark Lecture 19: 590.03 Fall 12 28

  28. Client-Server Solutions 2: False Dummies • A user sends m locations, only one of them is true while m-1 are false dummies • The server replies with a service for each received location • The user is the only one who knows the true location, and hence the true answer Server • Generating false dummies is hard: should follow a certain pattern similar to a user pattern but with A separate answer for each received location different locations Lecture 19: 590.03 Fall 12 29

  29. Trusted Third Party Location Based Service Query + Cloaked Spatial location Location Anonymizer Lecture 19: 590.03 Fall 12 30

  30. Trusted Third Party • A trusted third party receives the exact locations from clients, blurs the locations, and sends the blurred locations to the server • Provide powerful privacy guarantees with high-quality services • Need to trusted a third party … Lecture 19: 590.03 Fall 12 31

  31. Mix Zones • A strategy for anonymization for continuous location tracking • Server only sees locations and user’s pseudonyms • Mix zone is like a “no track zone” + “change of pseudonyms” User5768 User1234 Mix Zone User5678 User1235 Lecture 19: 590.03 Fall 12 32

  32. Quad-tree Spatial Cloaking • Achieve k-anonymity, i.e., a user is indistinguishable from other k-1 users • Recursively divide the space into quadrants until a quadrant has less than k users. • The previous quadrant, which still meet the k-anonymity constraint, is returned Achieve 5-anonmity for Lecture 19: 590.03 Fall 12 33

  33. Nearest Neighbor k-Anonymization • STEP 1: Determine a set S containing u and k - 1 u’s nearest neighbors. S S’ • STEP 2: Randomly select v from S. • STEP 3: Determine a set S’ containing v and v’s k - 1 nearest neighbors. • STEP 4: A cloaked spatial region is an MBR of all users in S’ and u. • Need to pick a random node first. Otherwise, adversary can reconstruct location (by picking centroid of spatial region) Lecture 19: 590.03 Fall 12 34

  34. Pyramid Anonymization • Divide region into grids at different resolutions • Each grid cell maintains the number of users in that cell • To anonymize a user request, we traverse the pyramid structure from the bottom level to the top level until a cell satisfying the user privacy profile is found. Lecture 19: 590.03 Fall 12 35

Recommend


More recommend