380 likes | 536 Views
The 6 th Workshop on Privacy Enhancing Technologies (2006). Preserving User Location Privacy in Mobile Data Management Infrastructures. Reynold Cheng ( csckcheng@comp.polyu.edu.hk ) The Hong Kong Polytechnic University. A joint work with: Yu Zhang, Elisa Bertino, and Sunil Prabhakar
E N D
The 6th Workshop on Privacy Enhancing Technologies (2006) Preserving User Location Privacy in Mobile Data Management Infrastructures Reynold Cheng (csckcheng@comp.polyu.edu.hk) The Hong Kong Polytechnic University A joint work with: Yu Zhang, Elisa Bertino, and Sunil Prabhakar Purdue University
Location-Based Services Find a friend within 50m of my location. Where is my nearest gas station? Service Provider Cheng, Zhang, Bertino, Prabhakar
The Location Privacy Problem • Beresford et al. [BG03]: “Location privacy is the ability to prevent other parties from learning one’s current or past location” • Need to prevent: • Tracking of the user’s whereabouts • Discovery of the user’s personal habits Cheng, Zhang, Bertino, Prabhakar
Location Cloaking [BS03,GG03] Actual Location y x time Uncertainty region seen by service provider Cheng, Zhang, Bertino, Prabhakar
Privacy, Cloaking, and Quality Location Cloaking More uncertainty, More privacy • More uncertainty, Poorer service Better service, lower privacy? Location Privacy Service Quality Cheng, Zhang, Bertino, Prabhakar
Location Cloaking Framework [CP04] Imprecise Location + Service Request Precise Location + Service Request Location Cloaking Engine Service Provider User Service + quality report Cheng, Zhang, Bertino, Prabhakar
Our Contributions • A framework that trades off location privacy and service quality • An efficient algorithm for processing an important query class • Definition of “query quality” • Experimental simulations • Privacy threats and solutions Cheng, Zhang, Bertino, Prabhakar
Cloaked Location Model Uniform distribution Evaluated by imprecise queries to produce answers with probabilistic confidence Cheng, Zhang, Bertino, Prabhakar
The Cloaking Agent Cheng, Zhang, Bertino, Prabhakar
The Policy Translator • Possible privacy preferences: • k-anonymity [BG03, GG03]: at least k users in the cloaking region • Privacy: minimum uncertainty region size • Accuracy: maximum uncertainty region size • Locations: cloaking required when being near to a certain object (physical or logical) • Other users/service providers: presence known/hidden to them? Cheng, Zhang, Bertino, Prabhakar
Service Translator and Service Provider • Evaluate cloaked data, provide probabilistic answer, compute quality • Example: Range query (e.g., who is within 50m from me) Cheng, Zhang, Bertino, Prabhakar
Result Translator • Provide query result and quality reports • Convert probabilistic answers to interpretable results • Example: Map probability ranges (0,0.2],(0.2,0.8],(0.8,1] to LOW, MEDIUM and HIGH Cheng, Zhang, Bertino, Prabhakar
Precise Location-based Range Query Example: Who is within 100 metres from me? Only S4 is the answer. Cheng, Zhang, Bertino, Prabhakar
Imprecise Location-based Range Query Overall probability: {(S2,0.1),, (S3,0.7), (S4,0.9)} Q2: {(S3,0.9), (S4,1)} Q1: {(S2,0.2),, (S3,0.6), (S4,0.7)} Cheng, Zhang, Bertino, Prabhakar
Query Evaluation (1) • Transformation: decomposes imprecise queries into sub-queries • Evaluation: computes the probabilistic answers for each precise sub-queries • Aggregation: summarizes the final result from all sub-queries Cheng, Zhang, Bertino, Prabhakar
Query Evaluation (2) • Probability pj(u,v) of user Sjsatisfying the range query issued at point (u,v) U : Can be Expensive! • Probability pj of user Sjsatisfying the range query issued byU : Cheng, Zhang, Bertino, Prabhakar
Efficient Query Evaluation • Pruning: removes all objects that do not have any chance of satisfying the query • Transformation: decomposes imprecise queries into sub-queries • Evaluation: computes the probabilistic answers for each precise sub-queries • Aggregation: summarizes the final result from all sub-queries Cheng, Zhang, Bertino, Prabhakar
Pruning Cloaked Locations • The Minkowski Sum can be evaluated with computational geometry techniques [BK00] Cheng, Zhang, Bertino, Prabhakar
Quality of Imprecise Queries • Query quality metric measures the effect of cloaking on service quality • Query quality is affected by: • Uncertainty of query issuer’s location • Uncertainty of data being queried Cheng, Zhang, Bertino, Prabhakar
Quality of Imprecise Queries • The larger the query issuer’s uncertainty, the more likely that different sub-query answers are generated • Low quality when: • There are many different answer sets; • The members of different answer sets differ from each other significantly Cheng, Zhang, Bertino, Prabhakar
Query Quality: An Illustration Cheng, Zhang, Bertino, Prabhakar
Query Quality Metric • Precision of Rk with respect to R: • Probability that S gets the answer Rk: • Query Score: Cheng, Zhang, Bertino, Prabhakar
Experiment Model • Based on the City Simulator 2.0 developed at IBM [KMJ01] • 71 buildings, 48 roads, 6 road intersections and 1 park • 10,000 people moving in a city Cheng, Zhang, Bertino, Prabhakar
Quality and Privacy Cheng, Zhang, Bertino, Prabhakar
Privacy and Performance Cheng, Zhang, Bertino, Prabhakar
Quality and Query Size Cheng, Zhang, Bertino, Prabhakar
Implementation Issues • Systems that don’t track locations regularly • Example: GPS, RFID • GPS receiver in user obtains info from satellites • Cloaking agent controls when to report location • Systems that track locations regularly • Example: GSM, PCS • Cloaking agent reports cloaked locations in terms of neighboring cells regularly [WL00] Cheng, Zhang, Bertino, Prabhakar
References [BK00] M. Berg, M. Kreveld, M. Overmars and O. Schwarzkopf. Computational Geometry – Algorithms and Applications. 2nd ed., Springer Verlag (2000). [BS03] A. Beresford and F. Stajano. Location Privacy in Pervasive Computing. IEEE Pervasive Computing, 2(1):46-55, 2003. [CKP03] R. Cheng, D. Kalashnikov and S. Prabhakar. Evaluating Probabilistic Queries over Imprecise Data. In Proc. of ACM SIGMOD, June 2003. [CKP04] R. Cheng, D. Kalashnikov and S. Prabhakar. Querying Imprecise Data in Moving Object Environments. . In Transactions of Knowledge and Data Engineering, 2004. [CP04] R. Cheng and S. Prabhakar. Using uncertainty to provide privacy-preserving and high-quality location-based services. In Workshop on Location Systems Privacy and Control, MobileHCI 2004. [GG03] M. Gruteser and D. Grunwald. Anonymous Usage of Location-based Services through Spatial and Temporal Cloaking. In Proc. of the 1st Intl. Conf. on Mobile Systems, Applications and Services, May 2003. [GL05] B. Gedik and L. Liu.Location Privacy in Mobile Systems: A Personalized Anonymization Model. ICDCS, 2005. [KMJ01] J. Kaufman, J. Myllymaki and J. Jackson. IBM City Simulator Spatial Data Generator 2.0, 2001. [VL2000] V. Wong and V. Leung. Location management for next-generation personal communications network. IEEE Network (2000). Cheng, Zhang, Bertino, Prabhakar
Conclusions and Future Work • A framework for capturing uncertainty, location privacy, service quality • Evaluation and quality metrics for imprecise range queries • Future work: • Large-scale data indexing • Other query types • Possible privacy threats • System prototype development Contact Reynold Cheng (csckcheng@comp.polyu.edu.hk) for more details http://www.comp.polyu.edu.hk/~csckcheng Cheng, Zhang, Bertino, Prabhakar
Related Work: Cloaking • Adaptive-Interval Cloaking Algorithm [GG03]: partition the area into quadrants of equal area until the user and other k-1 users are included • Clique-cloak algorithm [GL05]: each user has her own k-anonymity requirement • These work did not provide probability computation and precise measurements over service quality Cheng, Zhang, Bertino, Prabhakar
Related Work: Uncertainty Management • Probabilistic queries [CKP03, CKP04] manage uncertain data in location and sensor databases • Evaluation of answers with probabilities • Metrics for query ambiguity • Assume queries are precise (i.e., no uncertainty about the query issuer) Cheng, Zhang, Bertino, Prabhakar
Privacy of Cloaking • Size of uncertainty region • Coverage of sensitive region Cheng, Zhang, Bertino, Prabhakar
Privacy Threats Cheng, Zhang, Bertino, Prabhakar
Possible Solutions to Privacy Threats Cheng, Zhang, Bertino, Prabhakar
Uncertainty vs. Velocity Cheng, Zhang, Bertino, Prabhakar
Quality vs. Privacy Cheng, Zhang, Bertino, Prabhakar
Response Time vs. Velocity Cheng, Zhang, Bertino, Prabhakar
Query Pruning • Called the Minkowski Sum, which can be computed with computational geometric techniques [BK00] Cheng, Zhang, Bertino, Prabhakar