Presentation is loading. Please wait.

Presentation is loading. Please wait.

Systems and Internet Infrastructure Security (SIIS) LaboratoryPage Systems and Internet Infrastructure Security Network and Security Research Center Department.

Similar presentations


Presentation on theme: "Systems and Internet Infrastructure Security (SIIS) LaboratoryPage Systems and Internet Infrastructure Security Network and Security Research Center Department."— Presentation transcript:

1 Systems and Internet Infrastructure Security (SIIS) LaboratoryPage Systems and Internet Infrastructure Security Network and Security Research Center Department of Computer Science and Engineering Pennsylvania State University, University Park PA 1 Privacy, Location Based Services, and You Joshua Schiffman

2 Systems and Internet Infrastructure Security (SIIS) LaboratoryPage 2 They know where you are… A brief story about a bomb and a razor blade… … and what about your cell phone?

3 Systems and Internet Infrastructure Security (SIIS) LaboratoryPage 3 What is privacy to you? What should be made public? What is the primary difference between normal and location based services? What new threats do they present? Trade-off between privacy and utility

4 Systems and Internet Infrastructure Security (SIIS) LaboratoryPage 4 What can we do? We want to detach our identity from our requests Is removing identifiers enough? ‣ Can still re-identify k-anonymity [Sweeney ‘02] ‣ Use Generalizations to suppress ‣ Avoid linking of records public knowledge too… ‣ Cliques, Cloaked Regions, etc…

5 Systems and Internet Infrastructure Security (SIIS) LaboratoryPage 5 The Friendly Ghost The New Casper: Query Processing for Location Services without Compromising Privacy Mokbel et al. notice that previous approaches: ‣ Ignore the difficulties of privacy based queries ‣ Offer a severely limiting Location Anonymizer Uniform privacy policy Fundamentally flawed Computationally heavy

6 Systems and Internet Infrastructure Security (SIIS) LaboratoryPage 6 Architecture Location Anonymizer receives continuous updates ‣ Blurs the results based on privacy profile (k min,A min ) Query Processor is built-in to the Database ‣ Returns candidate list of answers

7 Systems and Internet Infrastructure Security (SIIS) LaboratoryPage 7 Location Anonymizer Identify four requirements: ‣ Accuracy ‣ Quality ‣ Efficiency ‣ Flexibility Any others? Spatio-temporal cloaking meets only quality CliqueCloak gives some accuracy and flexibility

8 Systems and Internet Infrastructure Security (SIIS) LaboratoryPage 8 Data Structure A grid-based pyramid is used to represent the entire service area Each cell is made up of 4 cells found a level below Hash table is maintained for quick lookup Key Idea: ‣ Cells contain user count ‣ Boundaries are independent of user’s location

9 Systems and Internet Infrastructure Security (SIIS) LaboratoryPage 9 Basic Cloaking Method Bottom-up approach using a complete pyramid Recursively move up the pyramid looking for a cell that satisfies the privacy profile ‣ First attempt to combine neighbor ‣ Move up if both constraints in profile are not met Is there anything wrong with this data structure?

10 Systems and Internet Infrastructure Security (SIIS) LaboratoryPage 10 Adaptive Cloaking Method Uses an incomplete pyramid structure ‣ Only maintain cells that contain users ‣ Only at the highest level necessary Hash table will point to this level instead of lowest ‣ May not even need recursion ‣ Updates must consider Splitting / Merging High speed users would invoke costly updates

11 Systems and Internet Infrastructure Security (SIIS) LaboratoryPage 11 Is this better? Does the pyramid meet the four requirements? ‣ Accuracy: small grid cells ‣ Quality: predefined cells are independent of data ‣ Efficient: pre-computed cells ‣ Flexible: individual privacy profile

12 Systems and Internet Infrastructure Security (SIIS) LaboratoryPage 12 People are data too… Traditional LBSDBs do not consider the case of private data objects ‣ User gathered data is sensitive Private over public Public over private Private over private

13 Systems and Internet Infrastructure Security (SIIS) LaboratoryPage 13 Private over Public How do we query if we don’t know the query point? ‣ Two extremes are a little extreme… ‣ Solution: determine what could be the results Algorithm for NN queries: ‣ Filter ‣ Find the middle point ‣ Extend the search area ‣ Gather the candidate list

14 Systems and Internet Infrastructure Security (SIIS) LaboratoryPage 14 An example Find Filters MidpointsExtend

15 Systems and Internet Infrastructure Security (SIIS) LaboratoryPage 15 Private over Private Only difference is the target objects’ shape is unknown ‣ All steps must consider farthest corner of cloaked data points Candidate list is selected from regions that are covered by some desired percentage ‣ This is policy based and orthogonal ‣ Works with any probabilistic query processing

16 Systems and Internet Infrastructure Security (SIIS) LaboratoryPage 16 Is it correct? The result set must be both ‣ Inclusive ‣ Minimal (Accuracy) The proof is elementary… geometry

17 Systems and Internet Infrastructure Security (SIIS) LaboratoryPage 17 Sketch of Proof Theorem 1: The candidate list contains the NN to the query point. ‣ Two cases Theorem 2: The minimum possible range query is issued to get the candidate list Private targets would be the cloaked cells

18 Systems and Internet Infrastructure Security (SIIS) LaboratoryPage 18 Experiment Using the map of Nennepin County, MN and the Network-based Generator of Moving Objects Location Anonymizer ‣ No comparisons done with other techniques Limited to small number of users [previous paper] Privacy requirement [CliqueCloak]

19 Systems and Internet Infrastructure Security (SIIS) LaboratoryPage 19 Results Pyramid Height greater than 6 levels ‣ Adaptive approach reigns supreme Effective because of the tiered levels = less searching With lower levels, the basic approach is better ‣ Cell splitting and merging is expensive Smaller pyramid levels = less accurate ‣ Why?

20 Systems and Internet Infrastructure Security (SIIS) LaboratoryPage 20 Results - Scalability Basic method ‣ More relaxed users = faster cloaking time ‣ More restrictive users = more recursion Adaptive method ‣ More users = slower ‣ Always better than basic method Less maintained cells ‣ More restrictive users = higher clustering

21 Systems and Internet Infrastructure Security (SIIS) LaboratoryPage 21 Results - Query Processor Number of filters are used as the experimental factor ‣ 1, 2, and 4 (normal) Public targets: ‣ Greater filters gave a smaller candidate list ‣ 4 always gives a best processing time result Private: ‣ Similar to public for list size ‣ But greater CPU time for analyzing private areas with 4

22 Systems and Internet Infrastructure Security (SIIS) LaboratoryPage 22 End to End How efficient is CASPER? For relaxed (<10) privacy profiles ‣ Query processing is the dominate factor For stricter profiles transmission time is exceedingly dominate ‣ Using less than 4 filters increase list size ‣ Any processing time gain with less filters is negligible

23 Systems and Internet Infrastructure Security (SIIS) LaboratoryPage 23 Take Away So what does CASPER mean to us? A more complete framework ‣ Location Anonymizer that meets requirements ‣ Considers the processing side of private queries ‣ Differentiates between public and private targets

24 Systems and Internet Infrastructure Security (SIIS) LaboratoryPage 24 Criticism What are the flaws of this paper? Will extending the query to other types break the system? What if all users fill the adaptive pyramid’s lowest level? Can a user demand privacy that defeats the utility of the system? Users on cell borders?


Download ppt "Systems and Internet Infrastructure Security (SIIS) LaboratoryPage Systems and Internet Infrastructure Security Network and Security Research Center Department."

Similar presentations


Ads by Google