+ All Categories
Home > Documents > Privacy Preserving Publication of Moving Object Data Joey Lei CS295 Francesco Bonchi Yahoo! Research...

Privacy Preserving Publication of Moving Object Data Joey Lei CS295 Francesco Bonchi Yahoo! Research...

Date post: 19-Dec-2015
Category:
Upload: philip-anderson
View: 216 times
Download: 3 times
Share this document with a friend
Popular Tags:
29
Privacy Preserving Publication of Moving Object Data Joey Lei CS295 Francesco Bonchi Yahoo! Research Avinguda Diagonal 177, Barcelona, Spain 06/27/22 1 CS295 - Privacy and Data Management
Transcript
Page 1: Privacy Preserving Publication of Moving Object Data Joey Lei CS295 Francesco Bonchi Yahoo! Research Avinguda Diagonal 177, Barcelona, Spain 6/10/20151CS295.

Privacy Preserving Publication of Moving Object Data

Joey LeiCS295

Francesco BonchiYahoo! Research

Avinguda Diagonal 177, Barcelona, Spain

04/18/23 1CS295 - Privacy and Data Management

Page 2: Privacy Preserving Publication of Moving Object Data Joey Lei CS295 Francesco Bonchi Yahoo! Research Avinguda Diagonal 177, Barcelona, Spain 6/10/20151CS295.

Outline

• Intro & Background• Clustering and Perturbation Techniques• Spatio-Temporal Cloaking (Generalization)

Techniques• Future Research

04/18/23 CS295 - Privacy and Data Management 2

Page 3: Privacy Preserving Publication of Moving Object Data Joey Lei CS295 Francesco Bonchi Yahoo! Research Avinguda Diagonal 177, Barcelona, Spain 6/10/20151CS295.

Location Privacy

• Growing prevalence of location aware devices– mobile phones and GPS devices

• Two Analysis Groups– Online

• Real-time monitoring of moving objects and motion patterns• development of location based services (LBS)

– Google Maps on the iPhone

– Offline • Collection of traces left by moving objects• Offline analysis to extract behavioral knowledge

– public transportation

04/18/23 3CS295 - Privacy and Data Management

Page 4: Privacy Preserving Publication of Moving Object Data Joey Lei CS295 Francesco Bonchi Yahoo! Research Avinguda Diagonal 177, Barcelona, Spain 6/10/20151CS295.

Privacy Concerns

• Location Data allows for intrusive inferences– Reveals habits– Social customs– Religious and sexual preferences– Unauthorized advertisement– User profiling

04/18/23 4CS295 - Privacy and Data Management

Page 5: Privacy Preserving Publication of Moving Object Data Joey Lei CS295 Francesco Bonchi Yahoo! Research Avinguda Diagonal 177, Barcelona, Spain 6/10/20151CS295.

Offline Analysis

• Traffic Management Application– Paths (trajectories) of vehicles with GPS are recorded

• Geographic Privacy-aware Knowledge Discovery and Delivery (GeoPKDD)– Traffic data published for the city of Milan (Italy)– Car identifiers were replaced with pseudonyms

• Daily Commute Example– Bob’s home and workplace are traceable by location

systems (QIDs)– Join data with a telephone directory

04/18/23 5CS295 - Privacy and Data Management

Page 6: Privacy Preserving Publication of Moving Object Data Joey Lei CS295 Francesco Bonchi Yahoo! Research Avinguda Diagonal 177, Barcelona, Spain 6/10/20151CS295.

Definitions

• Anonymity Preserving Data Publishing of Moving Objects Databases– How to transform published location data while

maintaining utility

• Moving Object Database (MOD)– A set of individuals, time points, and trajectories

04/18/23 6CS295 - Privacy and Data Management

Page 7: Privacy Preserving Publication of Moving Object Data Joey Lei CS295 Francesco Bonchi Yahoo! Research Avinguda Diagonal 177, Barcelona, Spain 6/10/20151CS295.

Background: Location Based Services

• Ideals– Provide service without learning user’s exact

position– Location data is forgotten once service is provided

• k-anonymity definition– A response to a request for location data is k-

anonymous when it is indistinguishable from the spatial and temporal information of at least k – 1 other responses sent from different users

04/18/23 7CS295 - Privacy and Data Management

Page 8: Privacy Preserving Publication of Moving Object Data Joey Lei CS295 Francesco Bonchi Yahoo! Research Avinguda Diagonal 177, Barcelona, Spain 6/10/20151CS295.

LBS: Location k-Anonymity

• Spatial Requirements– Ubiquity – that a user visits at least k regions– Congestion – number of users be at least k

• One Way to Achieve This: Mix Zones– An area where LBS providers cannot trace a

specific users’ movement– Identity is replaced with pseudonyms

• Users entering these zones at the same time are mixed together

04/18/23 8CS295 - Privacy and Data Management

Page 9: Privacy Preserving Publication of Moving Object Data Joey Lei CS295 Francesco Bonchi Yahoo! Research Avinguda Diagonal 177, Barcelona, Spain 6/10/20151CS295.

LBS: Location Based Quasi-Identifier

• A spatio-temporal pattern that can uniquely identify one individual – set of spatial areas and time intervals plus a

recurrence formula– AreaCondominium [7am, 8am],AreaOfficeBldg

[8am, 9am],– AreaOfficeBldg [4pm,

6pm],AreaCondominium[5pm, 7pm]– Recurrence : 3.Weekdays 2.Weeks∗

04/18/23 9CS295 - Privacy and Data Management

Page 10: Privacy Preserving Publication of Moving Object Data Joey Lei CS295 Francesco Bonchi Yahoo! Research Avinguda Diagonal 177, Barcelona, Spain 6/10/20151CS295.

LBS: Historical k-Anonymity

• In the offline context– A set of requests satisfies historical k-anonymity if

there exists k – 1 personal histories of locations (trajectories) belonging to k – 1 different users such that they are location-time consistent (undistinguishable)

04/18/23 10CS295 - Privacy and Data Management

Page 11: Privacy Preserving Publication of Moving Object Data Joey Lei CS295 Francesco Bonchi Yahoo! Research Avinguda Diagonal 177, Barcelona, Spain 6/10/20151CS295.

Outline

• Intro & Background• Clustering and Perturbation Techniques• Spatio-Temporal Cloaking (Generalization)

Techniques• Conclusions

04/18/23 CS295 - Privacy and Data Management 11

Page 12: Privacy Preserving Publication of Moving Object Data Joey Lei CS295 Francesco Bonchi Yahoo! Research Avinguda Diagonal 177, Barcelona, Spain 6/10/20151CS295.

Clustering and Perturbation

• C&P ignores the inherent problems with location QIDs:– each individual can have their own QIDs which

makes it difficult to create a QID for all individuals– Area(Home,Office,??)[??am- ??pm]– Recurrence : 7.Weekdays 52.Weeks∗

• Solution: anonymize trajectories instead– Microaggregation / k-member anonymity

04/18/23 12CS295 - Privacy and Data Management

Page 13: Privacy Preserving Publication of Moving Object Data Joey Lei CS295 Francesco Bonchi Yahoo! Research Avinguda Diagonal 177, Barcelona, Spain 6/10/20151CS295.

Clustering and Perturbation

• Trajectories are not polylines, but instead a cylindrical volume with radius δ (or uncertainty radius)

• If another trajectory moves within the cylinder of the given trajectory, then the two trajectory are indistinguishable from each other ((k, δ)-anonymity set)

04/18/23 13CS295 - Privacy and Data Management

Page 14: Privacy Preserving Publication of Moving Object Data Joey Lei CS295 Francesco Bonchi Yahoo! Research Avinguda Diagonal 177, Barcelona, Spain 6/10/20151CS295.

Clustering and Perturbation

a) Uncertainty trajectoryb) Anonymity set for two trajectories

04/18/23 14CS295 - Privacy and Data Management

Page 15: Privacy Preserving Publication of Moving Object Data Joey Lei CS295 Francesco Bonchi Yahoo! Research Avinguda Diagonal 177, Barcelona, Spain 6/10/20151CS295.

Achieving (k, δ)-anonymity

• Achieved by Space Translation – slightly moving some observations in space

• Step One: cluster trajectories of similar sizes– NWA (Never Walk Alone)

• All equivalence classes have the same time span and special timestamp requirements π (ie. π = 60, only full hours, from 1:00PM-2:00PM)

04/18/23 15CS295 - Privacy and Data Management

Page 16: Privacy Preserving Publication of Moving Object Data Joey Lei CS295 Francesco Bonchi Yahoo! Research Avinguda Diagonal 177, Barcelona, Spain 6/10/20151CS295.

Achieving (k, δ)-anonymity

• Step Two: perturb trajectories within uncertainty radius δ (i.e. transformation into anonymity set)– Grouping and Reconstruction

• Finding the nearest matching points to group• Reconstruct a generalization for utility• Multi TGA and Fast TGA Algorithms

04/18/23 16CS295 - Privacy and Data Management

Page 17: Privacy Preserving Publication of Moving Object Data Joey Lei CS295 Francesco Bonchi Yahoo! Research Avinguda Diagonal 177, Barcelona, Spain 6/10/20151CS295.

Outline

• Intro & Background• Clustering and Perturbation Techniques• Spatio-Temporal Cloaking (Generalization)

Techniques• Conclusions

04/18/23 CS295 - Privacy and Data Management 17

Page 18: Privacy Preserving Publication of Moving Object Data Joey Lei CS295 Francesco Bonchi Yahoo! Research Avinguda Diagonal 177, Barcelona, Spain 6/10/20151CS295.

Trajectory Generalization

Anonymization of three trajectories tr1, tr2 and tr3, based on point matching and removal, and spatio-temporal generalization04/18/23 18CS295 - Privacy and Data Management

Page 19: Privacy Preserving Publication of Moving Object Data Joey Lei CS295 Francesco Bonchi Yahoo! Research Avinguda Diagonal 177, Barcelona, Spain 6/10/20151CS295.

Trajectory Reconstruction

Reference: Aggarwal, C.C., Yu, P.S.: A condensation approach to privacy preserving data mining.

04/18/23 19CS295 - Privacy and Data Management

Page 20: Privacy Preserving Publication of Moving Object Data Joey Lei CS295 Francesco Bonchi Yahoo! Research Avinguda Diagonal 177, Barcelona, Spain 6/10/20151CS295.

Quasi-identifier Methods

• QIDs are a sequence of locations with multiple sensitive values (locations) – values are different from the perspective of each

adversary

• Yet, must consider linkage attacks from all adversaries

04/18/23 20CS295 - Privacy and Data Management

Page 21: Privacy Preserving Publication of Moving Object Data Joey Lei CS295 Francesco Bonchi Yahoo! Research Avinguda Diagonal 177, Barcelona, Spain 6/10/20151CS295.

Quasi-identifier Methods

• Possible Attack– T5 and t5

A match! We know that person visited b1

04/18/23 21CS295 - Privacy and Data Management

Page 22: Privacy Preserving Publication of Moving Object Data Joey Lei CS295 Francesco Bonchi Yahoo! Research Avinguda Diagonal 177, Barcelona, Spain 6/10/20151CS295.

Space Generalization

• Each position is an exact point on a grid• Generalizations become rectangles of nearby

points.

04/18/23 22CS295 - Privacy and Data Management

Page 23: Privacy Preserving Publication of Moving Object Data Joey Lei CS295 Francesco Bonchi Yahoo! Research Avinguda Diagonal 177, Barcelona, Spain 6/10/20151CS295.

Attack Graph

• Privacy Breach on prior example• Definitions

– I-Nodes (Individuals)– O-Nodes (Moving Object IDs)

04/18/23 23CS295 – Data Privacy and Confidentiality

Page 24: Privacy Preserving Publication of Moving Object Data Joey Lei CS295 Francesco Bonchi Yahoo! Research Avinguda Diagonal 177, Barcelona, Spain 6/10/20151CS295.

Attack Graph

• If I1 is mapped to O2, there is no clear mapping for I2 or I3 – Both I2 and I3 map to O3.

• Conclusion– O1 must map to I1

04/18/23 24CS295 - Privacy and Data Management

Page 25: Privacy Preserving Publication of Moving Object Data Joey Lei CS295 Francesco Bonchi Yahoo! Research Avinguda Diagonal 177, Barcelona, Spain 6/10/20151CS295.

Attack Graph

• Shortcomings on basic k-anonymity definition– Standard k-anonymity states there should be at

least k paths originating from I (based on grouping).

– What if we group O to have at least k paths?

04/18/23 25CS295 - Privacy and Data Management

Page 26: Privacy Preserving Publication of Moving Object Data Joey Lei CS295 Francesco Bonchi Yahoo! Research Avinguda Diagonal 177, Barcelona, Spain 6/10/20151CS295.

Attack Graph

• Privacy Breach– Assume I2, O5 are a pair

– I1 maps to both O1, O2, but this is impossible!• I5 must map to O5

04/18/23 26CS295 - Privacy and Data Management

Page 27: Privacy Preserving Publication of Moving Object Data Joey Lei CS295 Francesco Bonchi Yahoo! Research Avinguda Diagonal 177, Barcelona, Spain 6/10/20151CS295.

Final k-Anonymity Definition

• Every I-node has degree k or more• The attack graph is symmetric

– For edge (Ii, Oj) there is also an edge (Ij,Oi)

• 2-anonymous attack graph:

04/18/23 27CS295 - Privacy and Data Management

Page 28: Privacy Preserving Publication of Moving Object Data Joey Lei CS295 Francesco Bonchi Yahoo! Research Avinguda Diagonal 177, Barcelona, Spain 6/10/20151CS295.

Future Research

• Ad-Hoc anonymization techniques for intended use of data

• Privacy Preserving Data Mining– Focus on the analysis methods instead of the

publishing

04/18/23 CS295 - Privacy and Data Management 28

Page 29: Privacy Preserving Publication of Moving Object Data Joey Lei CS295 Francesco Bonchi Yahoo! Research Avinguda Diagonal 177, Barcelona, Spain 6/10/20151CS295.

Questions?

04/18/23 CS295 - Privacy and Data Management 29


Recommended