290 likes | 413 Views
Assessing the Trustworthiness of Location Data Based on Provenance. Chenyun Dai, Hyo -Sang Lim, Elisa Bertino Purdue University Yang- Sae Moon Kangwon National University. Outline. Motivation Definitions Computing Trustworthiness Collusion Performance Study Conclusion. Motivation.
E N D
Assessing the Trustworthiness of Location Data Based on Provenance Chenyun Dai, Hyo-Sang Lim, Elisa Bertino Purdue University Yang-SaeMoon Kangwon National University
Outline • Motivation • Definitions • Computing Trustworthiness • Collusion • Performance Study • Conclusion
Motivation • Forensics analysis and disease control • Locations of individuals (e.g., a suspect was present at the scene of a crime) • Individuals may lie or information may not be precise • Mobile computing techniques (GPS, cell phone) • Approximate information or stolen
Motivation • An example • Peter’s location • Chicago, 5pm -> Lafayette, 8pm -> Cincinati, 10pm (reported by a GPS service) • Los Angels, 5pm ->San Francisco, 8pm -> Seattle, 10pm (reported by a cell phone service) • Lafayette, 8pm (reported by the local police.) • Two events are most likely possible: a) Peter was at Lafayette at 8pm; b) Peter was at Seattle at 8pm.
Motivation • Trustworthiness of location information depends on the source • E.g., Cell phone logs are transmitted through the GSM network • Evidences forward/process through investigation agencies • How much we can trust the evidence items? • How much we can trust the source?
Motivation • Problems: • Do the evidence items reported by one source support each other? • Do the trajectories reported by different sources about an individual support each other? • Where does the evidence items come from? • How to detect potential collusion among different sources and agents?
Definitions • Time-Stamped Position and Trajectory • A timestamped position P is (oid, s, t), oid is a unique identifier, s is a two-dimensional point (x,y) in S, and t is a time-stamp in Z. A trajectory T is a sequence of time-stamped positions P0 = (oid, s0, t0), …, Pk = (oid, sk, tk) where 0<=i<k (ti < ti+1). • Movement • Given a trajectory T = (P0, … ,Pk), a movement M is a pair of a position and its successor, that is (Pi, Pi+1). We call Pi and Pi+1 the start and end positions of M. i+1 i+1 i+1
Definitions • Group of Movements • Let M be a movement, and let M.Ps and M.Pe denote its start and end positions. Given a distance threshold, a group of movements G is a set of movements such that:
Definitions • Support and Conflict • Let T and T’ be two trajectories of the same object. Pa = (oid, sa, ta) be a position in T , Pb = (oid, sb, tb) and Pc = (oid, sc, tc) be two positions in T’ such that tb < ta < tc, and fline (.,.) be an interpolation function. Given a distance threshold , if D(Pa, fline (Pb,Pc)) <, we say that Pa and (Pb,Pc) support each other; otherwise Pa conflicts with (Pb,Pc).
Definitions • Provenance • For a position P, let S be its source provider and I1,…, Im be m intermediate agents that processed P. The provenance of P is a sequence of S, I1, …, Im which describes the flow of the data according to time-based ordering.
Computing Trustworthiness • Intra-assessment • Clustering Positions • Grouping Movements • Assigning the Trust Scores
Grouping Movements • A group of movement: two positions are in the same cluster and their successor are in one cluster
Assigning Trust Scores • Normalized distance • Trust score
Inter-Assessment • P have k different (linearly interpolated) positions P1,...,Pk of k different trajectories at the time-stamp of P. • Count the number of supports and the number of conflicts • Scoreinter (P) as follows:
Provenance-based assessment • Trust Scores of Positions • Trust Scores of Network Nodes
Collusion • A collusion attack • An active form of lies involving two or more subjects who provide evidences • Frequently by a group of people who want to make a fake evidence • Avoid possible disadvantages over the group due to a true event
Collusion • Majority Rule • Let C0,…, Ci be clusters of positions which represent evidences for an object at a certain time. If the average trust score of Ck is larger than the average trust scores of any other clusters, we call positions in Ck are correct evidences for an event of O at t, and the positions in the other clusters are incorrect evidences. Ck
Reflecting Collusion • Observation 1. The less the number of network nodes involved with a position cluster of incorrect evidences, the more penalty for the possible collusion.
Reflecting Collusion • Observation 2. The more simila provenance among positions in a cluster of incorrect evidences, the more penalty for the possible collusion.
Reflecting Collusion • Observation 3. The more the number of positions in a cluster of incorrect evidences, the more penalty for the possible collusion.
Performance Study • Intra-source assessment consumes most of the time. • Inter-source assessment grows almost linear to the data size. our algorithm is linear to the number of trajectories. • The time on provenance-based assessment is very small and grows linearly.
Performance Study • The trust score remains high for correct data and remains low for incorrect data. • The trust scores of both inter and intra assessment in two figures remain almost unchanged
Performance Study • The intra-assessment trust score increases slightly. The reason is that the randomness of the incorrect data increases the deviation of the distribution. • Both assessments remain unchanged. We only introduced random incorrect data
Performance Study • Collusions affect the trust scores of both correct and incorrect data • Trust score of inter-assessment increases when the ratio of incorrect data increases.
Conclusion • Importance of considering the trustworthiness of location • Defined the problem based on some simple spatio-temporal notions • proposed a systematic method for assessing the trust scores of location data provided by multiple sources. • Handle collusion attacks
Future work • The privacy of location data • Locations with different spatial granularities • More accurate collusion detection