Presentation is loading. Please wait.

Presentation is loading. Please wait.

PRIVÉ : Anonymous Location-Based Queries in Distributed Mobile Systems 1 National University of Singapore 2 University.

Similar presentations


Presentation on theme: "PRIVÉ : Anonymous Location-Based Queries in Distributed Mobile Systems 1 National University of Singapore 2 University."— Presentation transcript:

1 PRIVÉ : Anonymous Location-Based Queries in Distributed Mobile Systems 1 National University of Singapore {ghinitag,kalnis}@comp.nus.edu.sg 2 University of Peloponnese, Greece spiros@uop.gr Gabriel Ghinita 1 Panos Kalnis 1 SpirosSkiadopoulos 2

2 Location-Based Services (LBS)  LBS users Mobile devices with GPS capabilities Spatial database queries  Queries NN and Range Queries Location server is NOT trusted “Find closest hospital to my present location”

3 Problem Statement  Queries may disclose sensitive information Query through anonymous web surfing service  But user location may disclose identity Triangulation of device signal Publicly available databases Physical surveillance  How to preserve query source anonymity? Even when exact user locations are known

4 Solution Overview  Anonymizing Spatial Region (ASR) Identification probability ≤ 1/K  Minimize overhead Reduce ASR extent  Fast ASR assembly time  Support user mobility

5 Central Anonymizer Architecture  Intermediate tier between users and LBS Bottleneck and single point of attack/failure

6 PRIVÉ Architecture

7 K-Anonymity * AgeZipCodeDisease 4225000Ulcer 4635000Pneumonia 5020000Flu 5440000Gastritis 4850000Dyspepsia 5655000Bronchitis * L. Sweeney. k-Anonymity: A Model for Protecting Privacy. Int. J. of Uncertainty, Fuzziness and Knowledge-Based Systems, 10(5):557-570, 2002. NameAgeZipCode Andy4225000 Bill4635000 Ken5020000 Nash5440000 Mike4850000 Sam5655000 (a) Microdata (b) Voting Registration List (public)

8 K-Anonymity * AgeZipCodeDisease 42-4625000-35000Ulcer 42-4625000-35000Pneumonia 50-5420000-40000Flu 50-5420000-40000Gastritis 48-5650000-55000Dyspepsia 48-5650000-55000Bronchitis * L. Sweeney. k-Anonymity: A Model for Protecting Privacy. Int. J. of Uncertainty, Fuzziness and Knowledge-Based Systems, 10(5):557-570, 2002. (a) 2-anonymous microdata(b) Voting Registration List (public) NameAgeZipCode Andy4225000 Bill4635000 Ken5020000 Nash5440000 Mike4850000 Sam5655000

9 Relational and Spatial Anonymity 4244464850525456 20k 25k 30k 35k 40k 45k 50k 55k Zip Age

10 Existing Cloaking Solutions

11 Redundant Queries  Send K-1 redundant queries Gives away exact location of users Potentially high overhead

12 CloakP2P [Chow06]  Find K-1 NN of query source  Source likely to be closest to ASR center Vulnerable to “center-of-ASR” attack [Chow06] – Chow et al, A Peer-to-Peer Spatial Cloaking Algorithm for Anonymous Location- based Services, ACM GIS ’06 uquq 5-ASR NOT SECURE !!!

13 QuadASR [Gru03, Mok06]  Quad-tree based Fails to preserve anonymity for outliers Unnecessarily large ASR size u1u1 u2u2 u3u3 u4u4 A1A1 A2A2 u 4 ’s identity is disclosed If u 4 queries, ASR is A 2 If any of u 1, u 2, u 3 queries, ASR is A 1 Let K=3 [Gru03] - Gruteser et al, Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking, MobiSys 2003 [Mok06] – Mokbel et al, The New Casper: Query Processing for Location Services without Compromising Privacy, VLDB 2006 NOT SECURE !!!

14 Secure Location Anonymization

15 Reciprocity  Consider querying user u q and ASR A q  Let AS q = {set of users enclosed by A q }  A q has the reciprocity property iff i. |AS| ≥ K ii.  u i,u j  AS, u i  AS j  u j  AS i

16 hilbASR  Based on Hilbert space-filling curve index users by Hilbert value of location partition Hilbert sequence into “K-buckets” StartEnd

17 Advantages of hilbASR  Guarantees source privacy K-ASRs have the “reciprocity” property  Reduced ASR size Hilbert ordering preserves locality well K-ASR includes exactly K users (in most cases)  Efficient ASR assembly and user relocation Balanced, annotated index tree User relocation, ASR assembly in O(log #users)

18 hilbASR with Annotated Index K=6 Example

19 PRIVÉ

20 PRIVÉ Characteristics  P2P overlay network Resembles annotated B + -tree Hierarchical clustering architecture  Bounded cluster size [,3) S relocates to 60

21 Relocation

22 PRIVÉ Protocol  Users self-organize into clusters Bounded cluster size [,3) Cluster head handles operations State replicated at each cluster peer  Operations Join/Departure  Similar to B-tree insert/delete Relocation  Handled bottom-up, restrict propagation K-request  Decentralized implementation of hilbASR

23 Operation Complexity OperationLatency Communication Cost Join/Departurelog  N log  N +  Relocationlog  N log  N +  K-requestlog  N + log  K log  N + K/

24 Load Balancing  Hierarchical architecture Inherent imbalance in peer load  Cluster head rotation mechanism Rotation triggered by load Communication cost predominant

25 Fault Tolerance  Soft-state mechanism Cluster membership periodically updated Recovery facilitated by state replication  Leader election protocol In case of cluster head failure

26 Experimental Evaluation

27 Experimental Setup  San Francisco Bay Area road network  Network-based Generator of Moving Objects * Up to 10000 users Velocities from 18 to 68 km/h  Uniform and skewed query distributions  Anonymity degree K in the range [10, 160] * T. Brinkhoff. A Framework for Generating Network-Based Moving Objects. Geoinformatica, 6(2):153–180, 2002.

28 Anonymity Strength (center-of-ASR)

29 ASR Size

30 Query Efficiency

31 Relocation Efficiency

32 Load Balancing 0% 20% 40% 60% 80% 100% Node Fraction

33 Conclusions  LBS Privacy an important concern Existing solutions have no privacy guarantees Centralized approach has limitations  Poor scalability, legal issues  Contribution Anonymization with privacy guarantees  hilbASR Extension to decentralized systems  Improved scalability and availability  No single point-of-attack/failure

34 Ongoing & Future Work  Relational DB Employ space mapping techniques to achieve k-anonymity and l-diversity We outperform existing “state-of-the art”  Space/Data Partitioning and Clustering  Spatial anonymity Address anonymization of trajectories  As opposed to point locations

35 Ongoing & Future Work  Address anonymization of trajectories As opposed to point locations  Infrastructure-less scenario

36 Bibliography on LBS Privacy http://anonym.comp.nus.edu.sg

37 Bibliography  [Chow06] – Mokbel et al, A Peer-to-Peer Spatial Cloaking Algorithm for Anonymous Location-based Services, ACM GIS ’06  [Gru03] - Gruteser et al, Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking, MobiSys 2003  [Ged05] – Gedik et al, Location Privacy in Mobile Systems: A Personalized Anonymization Model, ICDCS 2005  [Mok06] – Mokbel et al, The New Casper: Query Processing for Location Services without Compromising Privacy, VLDB 2006

38 MobiHide  Randomized ASR assembly technique: Also uses Hilbert ordering ASR chosen as random K-user sequence  Advantages No global knowledge required Flat index structure (Chord DHT)  Disadvantages No privacy guarantees for skewed query distributions  but still strong anonymity in practice


Download ppt "PRIVÉ : Anonymous Location-Based Queries in Distributed Mobile Systems 1 National University of Singapore 2 University."

Similar presentations


Ads by Google