1 / 6

Obscuring

Obscuring. draft- ietf - geopriv -policy. Model. Recovered Location. Target. Rule Maker. Location Recipient. Rules. Location Server (Obfuscation). Known Location. Reported Location. Assumptions. Given a reported location A , …and assuming X , …then the recovered location is B

callum
Download Presentation

Obscuring

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Obscuring draft-ietf-geopriv-policy

  2. Model Recovered Location Target Rule Maker LocationRecipient Rules Location Server (Obfuscation) Known Location Reported Location

  3. Assumptions • Given a reported location A, • …and assuming X, • …then the recovered location is B • If uncertainty(B) < uncertainty(A), • …then the assumption was productive. • Apply multiple assumptions for big gains.

  4. Example Assumptions • The target is on Earth • The target is on the ground • The target has constrained speed/acceleration • The target is walking • The target is on a boat • The target cannot fly • The target cannot breathe under water • The target likes ice cream • The target plays Theremin • The target wears red-and-white striped shirt, bobble hat, and glasses

  5. Assume Nothing • An obscuring algorithm might reveal something when the location recipient makes no assumptions • A good algorithm doesn’t reveal much unless the location recipient makes an assumption

  6. Algorithm Assessment • The effectiveness of an algorithm is assessed against a set of assumptions. • The information that is recovered when the assumption is correct determines how effective the algorithm is. • Recovery depends on the reliability of the assumption • …but the assessment must assume that the assumption is correct.

More Related