330 likes | 348 Views
Explore a framework for assessing location privacy, including distortion-based metric effectiveness against existing tools. A focus on location privacy mechanisms and adversary profiling strategies.
E N D
Reza Shokri Julien Freudiger MurtuzaJadliwala Jean-Pierre Hubaux A Distortion-based Metric for Location Privacy http://lca.epfl.ch/privacy Workshop on Privacy in the Electronic Society (WPES), Chicago, IL, USA - November 9, 2009
Privacy in Mobile Networks Location-based Services Pervasive Networks
Location Privacy Protection • Several privacy preserving mechanisms • No common notation in previous work • Various metrics for location privacy • How to compare different mechanisms? • Which metric to use? • Is location privacy captured properly?
Our Contributions • A generic framework for location privacy • Analysis of the effectiveness of existing location privacy metrics • A distortion-based metric that can capture location privacy more accurately
Outline • A Framework for Location Privacy • Location Privacy Metrics • A Distortion-based Metric
A Framework for Location Privacy • Mobile Users • Actual Identities, Pseudonyms • Events and Traces (Trajectories)
events ----------------------------------------------- Color: user identity Number: time-stamp Position in the map: location-stamp 01 01 01 02 03 01 02 04 03 17 04 17 05 06 18 05 07 08 09 18 10 16 11 12 16 13 06 14 15 13 14 12 07 15 11 10 08 09 Actual Events/Traces
A Framework for Location Privacy Mobile Users Actual Identities, Pseudonyms Events and Traces (Trajectories) Location Privacy Preserving Mechanisms
A Framework for Location Privacy Location Privacy Preserving Mechanism Attack Elimination Observation Reconstruction Actual Events Observable Events Obfuscation Anonymization Transformation function
Location Privacy Preserving Mechanisms 01 02 03 01 02 04 03 17 04 17 05 06 18 05 07 08 09 18 10 16 11 12 16 13 06 14 15 13 14 12 07 15 11 10 08 09
Location Privacy Preserving Mechanisms • Elimination 01 03 02 17 04 05 18 05 18 16 11 14 15 13 12 07 09
Location Privacy Preserving Mechanisms • Elimination • Obfuscation 01 03 02 17 04 05 18 16 05 18 11 14 15 13 12 07 09
Location Privacy Preserving Mechanisms • Elimination • Obfuscation • Anonymization 01 03 02 17 04 05 18 16 05 18 11 14 15 13 12 07 09
A Framework for Location Privacy Mobile Users Actual Identities, Pseudonyms Events and Traces (Trajectories) Location Privacy Preserving Mechanisms Adversary
Adversary • Knows the privacy preserving mechanism • Knows how users tend to move • Profiles users mobility • What is the probability of going from a location to another location in a given time period • What is the probability of being in a location at a time instance (density of users on the map) • Aims at reconstructing users actual events
A Framework for Location Privacy Mobile Users Actual Identities, Pseudonyms Events and Traces (Trajectories) Location Privacy Preserving Mechanisms Adversary Location Privacy Metrics
Linkablity Graph Vertices: observed events Directed edges: linking subsequent events of the same user Weight of an edge: linkability probability 01 03 02 17 04 05 18 05 18 16 11 14 15 13 12 07 09
Outline • A Framework for Location Privacy • Location Privacy Metrics: Description • A Distortion-based Metric
Existing Location Privacy Metrics • Uncertainty-based • “Clustering Error”-based • K-anonymity
Uncertainty-based Metrics 01 User privacy at the time of an observed event adversary’s uncertainty (i.e., Entropy) in linking that event with its subsequent events 03 02 17 04 05 18 05 18 16 11 14 15 13 12 07 09 C. Diaz, S. Seys, J. Claessens, and B. Preneel. Towards measuring anonymity. In PET, 2002. A. Serjantov and G. Danezis. Towards an information theoretic metric for anonymity. In PET, 2002. A. R. Beresford and F. Stajano. Mix zones: User privacy in location-aware services. IEEE PerCom Workshops, 2004.
01 03 02 17 04 05 18 05 18 16 11 14 15 13 12 07 09 “Clustering Error”-based Metrics 01 System privacy Average distance of the adversary set partition and the actual set partition 03 02 17 04 05 18 05 18 16 11 14 15 13 12 07 Actual set partition ■■ Adversary set partition ■■ 09 B. Hoh and M. Gruteser. Protecting location privacy through path confusion. In SECURECOMM, 2005. L. Fischer, S. Katzenbeisser, and C. Eckert. Measuring unlinkability revisited. In ACM WPES, 2008.
K-anonymity 01 At an observed event, a user is k-anonymous if there are at least k-1 other users that have the same observed events 03 05 05 02 17 04 05 18 05 18 16 11 14 15 13 12 07 09 P. Samarati and L. Sweeney. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. In IEEE Symposium Research in Security and Privacy, 1998. L. Sweeney. k-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl.-Based Syst., 10(5), 2002. M. Gruteser and D. Grunwald. Anonymous usage of location-based services through spatial and temporal cloaking. In ACM MobiSys, 2003.
Outline A Framework for Location Privacy Location Privacy Metrics: Evaluation A Distortion-based Metric
02 02 04 04 05 05 17 18 18 16 11 14 15 13 12 Evaluation: Scenario 1 Drawback of uncertainty-based and k-anonymity metrics Adversary’s Probability of error Adversary’s tracking error
Evaluation: Scenario 2 Drawback of “clustering error”-based metrics 01 03 02 Adversary mistake 17 04 05 18 05 18 16 11 14 15 13 12 07 09 The clustering error is high although both users are tracked most of the time
Outline • A Framework for Location Privacy • Location Privacy Metrics • A Distortion-based Metric
A Distortion-based Metric (1) For each observed event for a given user For each time instance Predict the subsequent events (based on the adversary knowledge) Until the next observed event Distortion at each time instance The expected error (in space) in predicted events observed p1 02 03 d1 p2 d2 03 03 actual predicted D = P1.d1+p2.d2
02 02 03 04 04 05 06 05 07 05 08 09 10 11 11 12 07 13 09 A Distortion-based Metric (2) 02 Actual trace 03 03 04 04 05 05 06 06 07 08 07 09 06 10 08 11 09 10 11 07 08 09 11 08 10 11 10 09 Linkability graph
Evaluation: Scenario 1 02 02 04 04 05 05 17 18 18 16 11 14 15 13 12 Adversary’s Probability of error Adversary’s tracking error
Evaluation: Scenario 2 01 03 02 Adversary mistake 17 04 05 18 05 18 16 11 14 15 13 12 07 09
Sensitivity to Location/Time Home Sensitivity of a user to a locations at a specific time instance 01 03 02 17 04 Friend’s Place 05 18 05 18 16 11 Work Place 14 15 13 12 07 09 We weight the distortion based on the sensitivity of a user to a location/time parir
http://lca.epfl.ch/privacy Conclusion and Future Work • A framework for location privacy • Modeling different metrics within our framework • A new distortion-metric for measuring location privacy that satisfies the expected criteria • Future: Modeling time obfuscation methods • Future: Using the metric in different scenarios