54
1 Location Privacy

1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications

Embed Size (px)

Citation preview

Page 1: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications

1

Location Privacy

Page 2: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications

2

Context

Better localization technology

+

Pervasive wireless connectivity

=

Location-based applications

Page 3: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications

3

Location-Based Apps

For Example: GeoLife shows grocery list near WalMart Micro-Blog allows location scoped querying Location-based ad: Coffee coupon at Starbucks …

Location expresses context of user Facilitating content delivery

Location is the IP addressLocation is the IP addressIts as if for content

Page 4: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications

4

While location drives this new class of applications,

it also violates user’s privacy

Sharper the location, richer the app, deeper the violation

Double-Edged Sword

Page 5: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications

5

The Location Based Service Workflow

Client Server LBS Database

(Location Based Service)

Request:Retrieve all available services in

client’s location

Forward to local service:Retrieve all available services in

location

Reply:Reply:

Page 6: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications

6

The Location Anonymity Problem

Client Server LBS Database

(Location Based Service)

Request: Retrieve all bus lines from location to address

= =

Privacy Violated

Page 7: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications

7

Moreover, range of apps are PUSH based.

Require continuous location information

Phone detected at Starbucks, PUSH a coffee coupon

Phone located on highway, query traffic congestion

Double-Edged Sword

Page 8: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications

8

Location Privacy

Problem:

Research:

Continuous location exposure

a serious threat to privacy

Continuous location exposure

a serious threat to privacy

Preserve privacy without

sacrificing the quality of

continuous loc. based apps

Preserve privacy without

sacrificing the quality of

continuous loc. based apps

Page 9: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications

9

Just Call Yourself ``Freddy”

Pseudonymns [Gruteser04] Effective only when infrequent location exposure Else, spatio-temporal patterns enough to deanonymize

… think breadcrumbs

Romit’s OfficeRomit’s Office

John Leslie Jack Susan

Alex

Page 10: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications

10

A Customizable k-Anonymity Model for Protecting Location Privacy

Paper by:

B. Gedik, L.Liu

(Georgia Tech)

Slides adopted from: Tal Shoseyov

Page 11: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications

11

Location Anonymity

“A message from a client to a database is called location anonymous if the client’s identity cannot be distinguished from other users based on the client’s location information.”

Database

Page 12: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications

12

k-Anonymity

“A message from a client to a database is called location k-anonymous if the client cannot be identified by the database based on the client’s location from other k-1 clients.”

Page 13: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications

13

Implementation of Location Anonymity

Client sends plain request to the server

Server sends “anonymized”

message

Database executes request according to the

received anonymous dataDatabase replies to server

with compiled data

Server forwards data to client

Server transforms the message by

“anonymizing” the location data in the message

Page 14: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications

14

Implementation of Location k-Anonymity

Spatial Cloaking – Setting a range of space to be a single box, where all clients located within the range are said to be in the “same location”.

x

y

Temporal Cloaking – Setting a time interval, where all the clients in a specific location sending a message in that time interval are said to have sent the message in the “same time”.

t

Page 15: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications

15

Implementation of Location k-Anonymity

x

yt

Spatial-Temporal Cloaking – Setting a range of space and a time interval, where all the messages sent by client inside the range in that time interval. This spatial and temporal area is called a “cloaking box”.

Page 16: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications

16

Previous solutions

M. Gruteser, D Grunwald (2003) – For a fixed k value, the server finds the smallest area around the client’s location that potentially contains k-1 different other clients, and monitoring that area over time until such k-1 clients are found.

Drawback:

Fixed anonymity value for all clients (service dependent)

Page 17: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications

17

Add Noise

K-anonymity [Gedic05] Convert location to a space-time bounding box Ensure K users in the box Location Apps reply to boxed region

Issues Poor quality of location Degrades in sparse regions Not real-time

YouBounding Box

K=4

Page 18: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications

18

Confuse Via Mixing

Path intersections is an opportunity for privacy If users intersect in space-time, cannot say who is who later

Page 19: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications

19

Confuse Via Mixing

Path intersections is an opportunity for privacy If users intersect in space-time, cannot say who is who later

Unfortunately, users may not intersect

in both space and time

Unfortunately, users may not intersect

in both space and time

Hospital

Airport

?

?

Page 20: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications

20

Hiding Until Mixed

Partially hide locations until users mixed [Gruteser07] Expose after a delay

Hospital

Airport

Page 21: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications

21

Hiding Until Mixed

Partially hide locations until users mixed [Gruteser07] Expose after a delay

But delays unacceptable to real-time appsBut delays unacceptable to real-time apps

Hospital

Airport

Page 22: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications

22

Existing solutions seem to suggest:

Privacy and Quality of Localization (QoL) is a zero sum game

Need to sacrifice one to gain the other

Page 23: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications

23

Hiding Stars with Fireworks:Location Privacy through Camouflage

Page 24: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications

24

Goal

Break away from this tradeoff

Target: Spatial accuracy

Real-time updates

Privacy guarantees

Even in sparse populations

New Proposal: CacheCloakNew Proposal: CacheCloak

Page 25: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications

25

The Intuition

Predict until paths intersect

Hospital

Airport

Page 26: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications

26

The Intuition

Predict until paths intersect

Hospital

Airport

Predict

Predict

Page 27: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications

27

The Intuition

Predict until paths intersect Expose predicted intersection to application

Hospital

Airport

Cache the information on each predicted locationCache the information on each predicted location

Predict

Predict

Page 28: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications

28

CacheCloak

System Design and Evaluation

Page 29: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications

29

Assume trusted privacy provider Reveal location to CacheCloak CacheCloak exposes anonymized location to Loc. App

Architecture

CacheCloakCacheCloak

Loc. App1Loc. App1 Loc. App2Loc. App2 Loc. App3Loc. App3 Loc. App4Loc. App4

Page 30: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications

30

In Steady State …

Location Based ApplicationLocation Based Application

CacheCloak

Page 31: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications

31

Prediction

Location Based ApplicationLocation Based Application

Backward

prediction

Forward

prediction

CacheCloak

Page 32: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications

32

Prediction

Location Based ApplicationLocation Based Application

CacheCloak

Page 33: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications

33

Predicted Intersection

Location Based ApplicationLocation Based Application

Predicted Path

CacheCloak

Page 34: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications

34

Query

Location Based ApplicationLocation Based Application

Predicted Path

CacheCloak

Page 35: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications

35

Query

Location Based ApplicationLocation Based Application

?

? ?

?

CacheCloak

Page 36: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications

36

LBA Responds

Location Based ApplicationLocation Based Application

Array of responses

CacheCloak

Page 37: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications

37

Cached

Location Based ApplicationLocation Based Application

Cached Responses

Location based

Information

CacheCloak

Page 38: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications

38

Cached Response

Location Based ApplicationLocation Based Application

Cached Responses

Location based

Information

CacheCloak

Page 39: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications

39

Cached Response

Location Based ApplicationLocation Based Application

Cached Responses

Location based

Information

CacheCloak

Page 40: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications

40

Cached Response

Location Based ApplicationLocation Based Application

Cached Responses

CacheCloak

Page 41: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications

41

Cached Response

Location Based ApplicationLocation Based Application

Predicted

Path

CacheCloak

Page 42: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications

42

Benefits

Real-time Response ready when user

arrives at predicted location

High QoL Responses can be specific to location Overhead on the wired backbone (caching helps)

Entropy guarantees Entropy increases at traffic intersections

Sparse population Can be handled with dummy users, false branching

Predicted Path

Page 43: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications

43

Quantifying Privacy

City converted into grid of small sqaures (pixels) Users are located at a pixel at a given time

Each pixel associated with 8x8 matrix Element (x, y) = probability that user enters x and exits y

Probabilities diffuse At intersections Over time

Privacy = entropy

x

y

Euser = − pipixels∑ log pi

pixel

Page 44: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications

44

Diffusion

Probability of user’s presence diffuses Diffusion gradient computed based on history i.e., what fraction of users take right turn at this

intersectionTime t1

Time t2

Time t3

Road

Intersection

Page 45: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications

45

Evaluation

Trace based simulation VanetMobiSim + US Census Bureau trace data Durham map with traffic lights, speed limits, etc.

Vehicles follow Google map paths Performs collision avoidance

6km x 6km

10m x 10m pixel

1000 cars

6km x 6km

10m x 10m pixel

1000 cars

Page 46: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications

46

Results

High average entropy Quite insensitive to user density (good for sparse regions) Minimum entropy reasonably high

Number of Users (N)Time (Minutes)

Min.

Max.

Bit

s o

f M

ean

En

tro

py

Page 47: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications

47

Results

Peak Counting # of places where attacker’s confidence is > Threshold

Time (Seconds)Time (Seconds)

Me

an

# o

f P

ea

ks

Page 48: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications

48

Results

Peak Counting # of places where attacker’s confidence is > Threshold

Number of Users (N)

Me

an

# o

f P

ea

ks

Page 49: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications

49

Limitations, Discussions …

CacheCloak overhead Application replies to lot of queries However, overhead on wired infrastructure Caching reduces this overhead significantly

CacheCloak assumes same, indistinguishable query Different queries can deanonymize Possible through query combination … future work

Per-user privacy guarantee not yet supported Adaptive branching & dummy users

CacheCloak - a central trusted entity Distributed version proposed in the paper

Page 50: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications

50

Closing Thoughts

Two nodes may intersect in space but not in time

Mixing not possible, without sacrificing timeliness

Mobility prediction creates space-time intersections

Enables virtual mixing in future

Page 51: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications

51

Closing Thoughts

CacheCloak Implements the prediction and caching function

High entropy possibleeven under sparse population

Spatio-temporal accuracy remains uncompromised

Page 52: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications

52

Page 53: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications

53

Page 54: 1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications

54

Thank You

For more related work, visit:

http://synrg.ee.duke.edu