340 likes | 355 Views
This research paper explores a unified approach to organizing and safeguarding location privacy. It provides a generic model, terminology, and protection mechanisms, enhancing understanding and measurement of location privacy in different layers. Components include Spatial Model, Events, Threat Model, and Protection Mechanisms. The study delves into the significance of location privacy preservation through methods such as obfuscation, anonymization, and distortion-based metrics, addressing both microscopic and macroscopic location privacy concerns.
E N D
A Unified Framework for Location Privacy Reza……..Shokri Julien.....Freudiger Jean-Pierre....Hubaux http://lca.epfl.ch/privacy
Location Privacy “… a special type of information privacy which concerns the claim of individuals to determine for themselves when, how, and to what extent location information about them is communicated to others.” Duckham, M. and L. Kulik, Location privacy and location-aware computing, 2006.
Research on Location PrivacyAchievements So Far • Attracted researchers from various disciplines • Database, Network Anonymity, Ubiquitous Computing, Cryptography • Variety of protection mechanisms proposed • Highly influenced by methods that are not tailored for location privacy (e.g., K-anonymity) • Different terminologies and models make the proposed methods difficult to compare
A Unified Framework • Organizing and classifying location privacy fundamental components • Providing a generic model and terminology • Modeling and understanding existing efforts • Identifying missing elements • Designing new schemes
Components of the Framework • Basic elements • Spatial Model • Events and Traces • Threat Model • Protection Mechanisms • Measurement
Spatial Model Layer I - location instances e.g., <latitude, longitude> Layer II - location sites e.g., hospital A at 45th St. Layer III - location types e.g., bar, hospital
Events and Traces Events <who, when, where> - Who: identifier - When: time-stamp - Where: location-stamp Trace - Set of events
Threat Model Adversary is an observer of users’ events LBS Operator Eavesdroppers
Adversary Statistical Information Statistical information about users’ actual events. e.g., users’ spatiotemporal distribution and mobility pattern
Adversary Knowledge • Real-time location information • A set of events (observed by the adversary) • Statistical information • Users’ population • Users’ mobility pattern • Users’ spatiotemporal distribution • …
Tracking Identification ? Bob’s Home Bob’s Workplace AttacksTargeting individuals or communities
Consequences Presence Disclosure • Layer I: Finding mobility traces/patterns • Layer II: Disclosing visits to some places • Layer III: Profiling the type of visited locations • Personal activities => My Hobbies/Interests • Professional activities => Where I Work • Social activities => My Social Network
Consequences Absence Disclosure
Location Privacy Preservation Modifying the set of events before they are observable to the adversary Observation Observable Events Actual Events
Location Privacy Preservation Users Applications Privacy Tools Observable Events Actual Events Entities Methods
Location Privacy Preservation Users Applications Privacy Tools Hiding Events Observable Events Actual Events Entities Methods
Location Privacy Preservation Users Applications Privacy Tools Hiding Events Adding Dummy Events Observable Events Actual Events Entities Methods
Location Privacy Preservation Users Applications Privacy Tools Hiding Events Adding Dummy Events Obfuscation Observable Events Actual Events Entities Methods
Location Privacy Preservation Users Applications Privacy Tools Hiding Events Adding Dummy Events Obfuscation Observable Events Actual Events Anonymization Entities Methods
Location Privacy Measurement • Notions of location privacy in two different scales: • Microscopic Location Privacy • How far is the adversary’s estimation of a user’s location by having a single event observed from the user? • Macroscopic Location Privacy • How far is the adversary’s estimation of a user’s location by observing a set of events from the users?
Microscopic Location Privacy with respect to a single observed event ? who is abc? Alice, Bob, …? where is abc? <ID: abc, Location-stamp: Midtown Center Manhattan, Time-stamp: 1pm>
Macroscopic Location Privacy with respect to a set of observed events Alice’s House Bob’s House Eve’s House whom the trajectories belong to? what are the trajectories?
Location Privacy Metrics • Uncertainty-based Metrics • K-anonymity, l-diversity, … • Clustering-based Metrics • Distortion-based Metrics
Obfuscated Area User’s actual location Hypothesized locations for the user Distortion-based Metric Location Privacy = Distortion in the user’s reconstructed location by the adversary Sumi (pi*di) Darkness: the probability that a user is there. The darker, the more probable.
Location Privacy Measurement • Existing schemes only focus on measuring location privacy in 1st layer of the spatial model • What about other layers?
Location Privacy Measurement Layer II – Location Sites Diversity matters Distance (to user’s location) matters Suggestion: Distortion-based Metric
bar casino bar Location Privacy Measurement Layer III – Location Types bar Suggestion: Uncertainty-based or Distortion-based Metric
Conclusion • Proposed a unified framework for location privacy • Helps to design, understand and compare location privacy schemes • Embedded existing schemes in our framework