+ All Categories
Home > Documents > 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity =...

1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity =...

Date post: 20-Jan-2016
Category:
Upload: aron-chandler
View: 216 times
Download: 0 times
Share this document with a friend
54
1 Location Privacy
Transcript
Page 1: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.

1

Location Privacy

Page 2: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.

2

Context

Better localization technology

+

Pervasive wireless connectivity

=

Location-based applications

Page 3: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.

3

Location-Based Apps

For Example: GeoLife shows grocery list near WalMart Micro-Blog allows location scoped querying Location-based ad: Coffee coupon at Starbucks …

Location expresses context of user Facilitating content delivery

Location is the IP addressLocation is the IP addressIts as if for content

Page 4: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.

4

While location drives this new class of applications,

it also violates user’s privacy

Sharper the location, richer the app, deeper the violation

Double-Edged Sword

Page 5: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.

5

The Location Based Service Workflow

Client Server LBS Database

(Location Based Service)

Request:Retrieve all available services in

client’s location

Forward to local service:Retrieve all available services in

location

Reply:Reply:

Page 6: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.

6

The Location Anonymity Problem

Client Server LBS Database

(Location Based Service)

Request: Retrieve all bus lines from location to address

= =

Privacy Violated

Page 7: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.

7

Moreover, range of apps are PUSH based.

Require continuous location information

Phone detected at Starbucks, PUSH a coffee coupon

Phone located on highway, query traffic congestion

Double-Edged Sword

Page 8: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.

8

Location Privacy

Problem:

Research:

Continuous location exposure

a serious threat to privacy

Continuous location exposure

a serious threat to privacy

Preserve privacy without

sacrificing the quality of

continuous loc. based apps

Preserve privacy without

sacrificing the quality of

continuous loc. based apps

Page 9: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.

9

Just Call Yourself ``Freddy”

Pseudonymns [Gruteser04] Effective only when infrequent location exposure Else, spatio-temporal patterns enough to deanonymize

… think breadcrumbs

Romit’s OfficeRomit’s Office

John Leslie Jack Susan

Alex

Page 10: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.

10

A Customizable k-Anonymity Model for Protecting Location Privacy

Paper by:

B. Gedik, L.Liu

(Georgia Tech)

Slides adopted from: Tal Shoseyov

Page 11: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.

11

Location Anonymity

“A message from a client to a database is called location anonymous if the client’s identity cannot be distinguished from other users based on the client’s location information.”

Database

Page 12: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.

12

k-Anonymity

“A message from a client to a database is called location k-anonymous if the client cannot be identified by the database based on the client’s location from other k-1 clients.”

Page 13: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.

13

Implementation of Location Anonymity

Client sends plain request to the server

Server sends “anonymized”

message

Database executes request according to the

received anonymous dataDatabase replies to server

with compiled data

Server forwards data to client

Server transforms the message by

“anonymizing” the location data in the message

Page 14: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.

14

Implementation of Location k-Anonymity

Spatial Cloaking – Setting a range of space to be a single box, where all clients located within the range are said to be in the “same location”.

x

y

Temporal Cloaking – Setting a time interval, where all the clients in a specific location sending a message in that time interval are said to have sent the message in the “same time”.

t

Page 15: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.

15

Implementation of Location k-Anonymity

x

yt

Spatial-Temporal Cloaking – Setting a range of space and a time interval, where all the messages sent by client inside the range in that time interval. This spatial and temporal area is called a “cloaking box”.

Page 16: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.

16

Previous solutions

M. Gruteser, D Grunwald (2003) – For a fixed k value, the server finds the smallest area around the client’s location that potentially contains k-1 different other clients, and monitoring that area over time until such k-1 clients are found.

Drawback:

Fixed anonymity value for all clients (service dependent)

Page 17: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.

17

Add Noise

K-anonymity [Gedic05] Convert location to a space-time bounding box Ensure K users in the box Location Apps reply to boxed region

Issues Poor quality of location Degrades in sparse regions Not real-time

YouBounding Box

K=4

Page 18: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.

18

Confuse Via Mixing

Path intersections is an opportunity for privacy If users intersect in space-time, cannot say who is who later

Page 19: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.

19

Confuse Via Mixing

Path intersections is an opportunity for privacy If users intersect in space-time, cannot say who is who later

Unfortunately, users may not intersect

in both space and time

Unfortunately, users may not intersect

in both space and time

Hospital

Airport

?

?

Page 20: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.

20

Hiding Until Mixed

Partially hide locations until users mixed [Gruteser07] Expose after a delay

Hospital

Airport

Page 21: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.

21

Hiding Until Mixed

Partially hide locations until users mixed [Gruteser07] Expose after a delay

But delays unacceptable to real-time appsBut delays unacceptable to real-time apps

Hospital

Airport

Page 22: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.

22

Existing solutions seem to suggest:

Privacy and Quality of Localization (QoL) is a zero sum game

Need to sacrifice one to gain the other

Page 23: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.

23

Hiding Stars with Fireworks:Location Privacy through Camouflage

Page 24: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.

24

Goal

Break away from this tradeoff

Target: Spatial accuracy

Real-time updates

Privacy guarantees

Even in sparse populations

New Proposal: CacheCloakNew Proposal: CacheCloak

Page 25: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.

25

The Intuition

Predict until paths intersect

Hospital

Airport

Page 26: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.

26

The Intuition

Predict until paths intersect

Hospital

Airport

Predict

Predict

Page 27: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.

27

The Intuition

Predict until paths intersect Expose predicted intersection to application

Hospital

Airport

Cache the information on each predicted locationCache the information on each predicted location

Predict

Predict

Page 28: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.

28

CacheCloak

System Design and Evaluation

Page 29: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.

29

Assume trusted privacy provider Reveal location to CacheCloak CacheCloak exposes anonymized location to Loc. App

Architecture

CacheCloakCacheCloak

Loc. App1Loc. App1 Loc. App2Loc. App2 Loc. App3Loc. App3 Loc. App4Loc. App4

Page 30: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.

30

In Steady State …

Location Based ApplicationLocation Based Application

CacheCloak

Page 31: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.

31

Prediction

Location Based ApplicationLocation Based Application

Backward

prediction

Forward

prediction

CacheCloak

Page 32: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.

32

Prediction

Location Based ApplicationLocation Based Application

CacheCloak

Page 33: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.

33

Predicted Intersection

Location Based ApplicationLocation Based Application

Predicted Path

CacheCloak

Page 34: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.

34

Query

Location Based ApplicationLocation Based Application

Predicted Path

CacheCloak

Page 35: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.

35

Query

Location Based ApplicationLocation Based Application

?

? ?

?

CacheCloak

Page 36: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.

36

LBA Responds

Location Based ApplicationLocation Based Application

Array of responses

CacheCloak

Page 37: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.

37

Cached

Location Based ApplicationLocation Based Application

Cached Responses

Location based

Information

CacheCloak

Page 38: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.

38

Cached Response

Location Based ApplicationLocation Based Application

Cached Responses

Location based

Information

CacheCloak

Page 39: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.

39

Cached Response

Location Based ApplicationLocation Based Application

Cached Responses

Location based

Information

CacheCloak

Page 40: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.

40

Cached Response

Location Based ApplicationLocation Based Application

Cached Responses

CacheCloak

Page 41: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.

41

Cached Response

Location Based ApplicationLocation Based Application

Predicted

Path

CacheCloak

Page 42: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.

42

Benefits

Real-time Response ready when user

arrives at predicted location

High QoL Responses can be specific to location Overhead on the wired backbone (caching helps)

Entropy guarantees Entropy increases at traffic intersections

Sparse population Can be handled with dummy users, false branching

Predicted Path

Page 43: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.

43

Quantifying Privacy

City converted into grid of small sqaures (pixels) Users are located at a pixel at a given time

Each pixel associated with 8x8 matrix Element (x, y) = probability that user enters x and exits y

Probabilities diffuse At intersections Over time

Privacy = entropy

x

y

Euser = − pipixels∑ log pi

pixel

Page 44: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.

44

Diffusion

Probability of user’s presence diffuses Diffusion gradient computed based on history i.e., what fraction of users take right turn at this

intersectionTime t1

Time t2

Time t3

Road

Intersection

Page 45: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.

45

Evaluation

Trace based simulation VanetMobiSim + US Census Bureau trace data Durham map with traffic lights, speed limits, etc.

Vehicles follow Google map paths Performs collision avoidance

6km x 6km

10m x 10m pixel

1000 cars

6km x 6km

10m x 10m pixel

1000 cars

Page 46: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.

46

Results

High average entropy Quite insensitive to user density (good for sparse regions) Minimum entropy reasonably high

Number of Users (N)Time (Minutes)

Min.

Max.

Bit

s o

f M

ean

En

tro

py

Page 47: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.

47

Results

Peak Counting # of places where attacker’s confidence is > Threshold

Time (Seconds)Time (Seconds)

Me

an

# o

f P

ea

ks

Page 48: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.

48

Results

Peak Counting # of places where attacker’s confidence is > Threshold

Number of Users (N)

Me

an

# o

f P

ea

ks

Page 49: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.

49

Limitations, Discussions …

CacheCloak overhead Application replies to lot of queries However, overhead on wired infrastructure Caching reduces this overhead significantly

CacheCloak assumes same, indistinguishable query Different queries can deanonymize Possible through query combination … future work

Per-user privacy guarantee not yet supported Adaptive branching & dummy users

CacheCloak - a central trusted entity Distributed version proposed in the paper

Page 50: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.

50

Closing Thoughts

Two nodes may intersect in space but not in time

Mixing not possible, without sacrificing timeliness

Mobility prediction creates space-time intersections

Enables virtual mixing in future

Page 51: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.

51

Closing Thoughts

CacheCloak Implements the prediction and caching function

High entropy possibleeven under sparse population

Spatio-temporal accuracy remains uncompromised

Page 52: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.

52

Page 53: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.

53

Page 54: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.

54

Thank You

For more related work, visit:

http://synrg.ee.duke.edu


Recommended