Quality Aware Privacy Protection for Location-based Services Zhen Xiao, Xiaofeng Meng Renmin University of China Jianliang Xu Hong Kong Baptist University.

Slides:



Advertisements
Similar presentations
Efficient Evaluation of k-Range Nearest Neighbor Queries in Road Networks Jie BaoChi-Yin ChowMohamed F. Mokbel Department of Computer Science and Engineering.
Advertisements

Probabilistic Skyline Operator over Sliding Windows Wenjie Zhang University of New South Wales & NICTA, Australia Joint work: Xuemin Lin, Ying Zhang, Wei.
Tutorial 6 of CSCI2110 Bipartite Matching Tutor: Zhou Hong ( 周宏 )
Rumor Routing in Sensor Networks David Braginsky and Deborah Estrin Presented By Tu Tran 1.
PrivacyGrid Visualization Balaji Palanisamy Saurabh Taneja.
Mohamed F. Mokbel University of Minnesota
Gossip Scheduling for Periodic Streams in Ad-hoc WSNs Ercan Ucan, Nathanael Thompson, Indranil Gupta Department of Computer Science University of Illinois.
1 A Distortion-based Metric for Location Privacy Workshop on Privacy in the Electronic Society (WPES), Chicago, IL, USA - November 9, 2009 Reza Shokri.
Location Privacy in Casper: A Tale of two Systems
Modelling and Predicting Future Trajectories of Moving Objects in a Constrained Network appeared in “Proceedings of the 7th International Conference on.
Topology Control and Mobility Management in Mobile Ad Hoc Networks Fei Dai and JIe Wu Department of Electrical and Computer Engineering North Dakota State.
1 A Distributed Delay-Constrained Dynamic Multicast Routing Algorithm Quan Sun and Horst Langendorfer Telecommunication Systems Journal, vol.11, p.47~58,
Tracking Moving Objects in Anonymized Trajectories Nikolay Vyahhi 1, Spiridon Bakiras 2, Panos Kalnis 3, and Gabriel Ghinita 3 1 St. Petersburg State University.
LPT for Data Aggregation in Wireless Sensor networks Marc Lee and Vincent W.S Wong Department of Electrical and Computer Engineering, University of British.
The community-search problem and how to plan a successful cocktail party Mauro SozioAris Gionis Max Planck Institute, Germany Yahoo! Research, Barcelona.
MobiHide: A Mobile Peer-to-Peer System for Anonymous Location-Based Queries Gabriel Ghinita, Panos Kalnis, Spiros Skiadopoulos National University of Singapore.
Trip Planning Queries F. Li, D. Cheng, M. Hadjieleftheriou, G. Kollios, S.-H. Teng Boston University.
A Customizable k-Anonymity Model for Protecting Location Privacy Written by: B. Gedik, L.Liu Presented by: Tal Shoseyov.
PRIVACY CRITERIA. Roadmap Privacy in Data mining Mobile privacy (k-e) – anonymity (c-k) – safety Privacy skyline.
FLANN Fast Library for Approximate Nearest Neighbors
C LOAKING AND M ODELING T ECHNIQUES FOR LOCATION P RIVACY PROTECTION Ying Cai Department of Computer Science Iowa State University Ames, IA
Roger ZimmermannCOMPSAC 2004, September 30 Spatial Data Query Support in Peer-to-Peer Systems Roger Zimmermann, Wei-Shinn Ku, and Haojun Wang Computer.
Location Privacy Location privacy in mobile systems: A personalized Anonymization Model Burga Gedik, Ling Liu.
Privacy Preserving Data Mining on Moving Object Trajectories Győző Gidófalvi Geomatic ApS Center for Geoinformatik Xuegang Harry Huang Torben Bach Pedersen.
VLDB '2006 Haibo Hu (Hong Kong Baptist University, Hong Kong) Dik Lun Lee (Hong Kong University of Science and Technology, Hong Kong) Victor.
Network Aware Resource Allocation in Distributed Clouds.
Approximate Frequency Counts over Data Streams Loo Kin Kong 4 th Oct., 2002.
WALKING IN FACEBOOK: A CASE STUDY OF UNBIASED SAMPLING OF OSNS junction.
Location Privacy CompSci Instructor: Ashwin Machanavajjhala Some slides are from a tutorial by Mohamed Mokbel (ICDM 2008) Lecture 19: Fall.
1 On the Placement of Web Server Replicas Lili Qiu, Microsoft Research Venkata N. Padmanabhan, Microsoft Research Geoffrey M. Voelker, UCSD IEEE INFOCOM’2001,
A Distributed Clustering Framework for MANETS Mohit Garg, IIT Bombay RK Shyamasundar School of Tech. & Computer Science Tata Institute of Fundamental Research.
Energy-Aware Scheduling with Quality of Surveillance Guarantee in Wireless Sensor Networks Jaehoon Jeong, Sarah Sharafkandi and David H.C. Du Dept. of.
1 Exact Top-k Nearest Keyword Search in Large Networks Minhao Jiang†, Ada Wai-Chee Fu‡, Raymond Chi-Wing Wong† † The Hong Kong University of Science and.
Systems and Internet Infrastructure Security (SIIS) LaboratoryPage Systems and Internet Infrastructure Security Network and Security Research Center Department.
RELAX : An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks Bashir Yahya, Jalel Ben-Othman University of Versailles, France ICC.
Clustering Moving Objects in Spatial Networks Jidong Chen, Caifeng Lai, Xiaofeng Meng, Renmin University of China Jianliang Xu, and Haibo Hu Hong Kong.
1 SpaceTwist: A Flexible Approach for Hiding Query User Location Speaker: Man Lung Yiu Aalborg University Joint work with Christian S. Jensen, Xuegang.
Nearest Neighbor Queries Chris Buzzerd, Dave Boerner, and Kevin Stewart.
Kaleidoscope – Adding Colors to Kademlia Gil Einziger, Roy Friedman, Eyal Kibbar Computer Science, Technion 1.
Spatio-temporal Pattern Queries M. Hadjieleftheriou G. Kollios P. Bakalov V. J. Tsotras.
Privacy Preserving In LBS
On Computing Top-t Influential Spatial Sites Authors: T. Xia, D. Zhang, E. Kanoulas, Y.Du Northeastern University, USA Appeared in: VLDB 2005 Presenter:
9/2/2005VLDB 2005, Trondheim, Norway1 On Computing Top-t Most Influential Spatial Sites Tian Xia, Donghui Zhang, Evangelos Kanoulas, Yang Du Northeastern.
QoS Supported Clustered Query Processing in Large Collaboration of Heterogeneous Sensor Networks Debraj De and Lifeng Sang Ohio State University Workshop.
A Hybrid Technique for Private Location-Based Queries with Database Protection Gabriel Ghinita 1 Panos Kalnis 2 Murat Kantarcioglu 3 Elisa Bertino 1 1.
Preserving Privacy GPS Traces via Uncertainty-Aware Path Cloaking Baik Hoh, Marco Gruteser, Hui Xiong, Ansaf Alrabady Presenter:Yao Lu ECE 256, Spring.
Location Privacy Protection for Location-based Services CS587x Lecture Department of Computer Science Iowa State University.
Efficient OLAP Operations in Spatial Data Warehouses Dimitris Papadias, Panos Kalnis, Jun Zhang and Yufei Tao Department of Computer Science Hong Kong.
U of Minnesota DIWANS'061 Energy-Aware Scheduling with Quality of Surveillance Guarantee in Wireless Sensor Networks Jaehoon Jeong, Sarah Sharafkandi and.
Load Balanced Link Reversal Routing in Mobile Wireless Ad Hoc Networks Nabhendra Bisnik, Alhussein Abouzeid ECSE Department RPI Costas Busch CSCI Department.
Privacy Preserving in Social Network Based System PRENTER: YI LIANG.
Privacy-Preserving Publication of User Locations in the Proximity of Sensitive Sites Bharath Krishnamachari Gabriel Ghinita Panos Kalnis National University.
Similarity Measurement and Detection of Video Sequences Chu-Hong HOI Supervisor: Prof. Michael R. LYU Marker: Prof. Yiu Sang MOON 25 April, 2003 Dept.
Zaiben Chen et al. Presented by Lian Liu. You’re traveling from s to t. Which gas station would you choose?
CIS 825 Lecture 9. Minimum Spanning tree construction Each node is a subtree/fragment by itself. Select the minimum outgoing edge of the fragment Send.
1 Link Privacy in Social Networks Aleksandra Korolova, Rajeev Motwani, Shubha U. Nabar CIKM’08 Advisor: Dr. Koh, JiaLing Speaker: Li, HueiJyun Date: 2009/3/30.
Privacy Vulnerability of Published Anonymous Mobility Traces Chris Y. T. Ma, David K. Y. Yau, Nung Kwan Yip (Purdue University) Nageswara S. V. Rao (Oak.
 A Two-level Protocol to Answer Private Location-based Queries Roopa Vishwanathan Yan Huang [RoopaVishwanathan, Computer Science and.
Presented by: Mi Tian, Deepan Sanghavi, Dhaval Dholakia
A Study of Group-Tree Matching in Large Scale Group Communications
Location Cloaking for Location Safety Protection of Ad Hoc Networks
SocialMix: Supporting Privacy-aware Trusted Social Networking Services
Location Privacy.
Spatio-temporal Pattern Queries
Efficient Evaluation of k-NN Queries Using Spatial Mashups
Fast Nearest Neighbor Search on Road Networks
Presented by: Mahady Hasan Joint work with
GANG: Detecting Fraudulent Users in OSNs
Continuous Density Queries for Moving Objects
Efficient Processing of Top-k Spatial Preference Queries
Presentation transcript:

Quality Aware Privacy Protection for Location-based Services Zhen Xiao, Xiaofeng Meng Renmin University of China Jianliang Xu Hong Kong Baptist University Presented by Xiao Pan

Outline  Motivation  Contributions  Location K-Anonymity Model  Cloaking Algorithm  Improvement with Dummy  Experiments  Related Works  Conclusions

Motivation: Privacy in LBS  Unique identifier  Location information LBS Provider Where is my nearest hotel? Where is my way to The Emporium?

Privacy Requirements  Location anonymity –Sensitive location: clinic, nightclub Privacy & QoS Trade-Off r1 r2 r4 r3 L contains at least k-1 other users k-anonymity model  Identifier anonymity –Sensitive message: political, financial location point l(x,y) l(x,y) is covered by at least k-1 other requests cloaking region L

Contribution  New quality-aware anonymity model –Protect location privacy –Satisfy QoS requirements  Directed-graph based cloaking algorithm –Maximize cloaking success rate with QoS guaranteed.  Improvement –Use dummy locations to achieve a 100% cloaking success rate

System Model Trusted Anonymizing Proxy Anonymizing Expand the exact location point into cloaking region Mobile Clients Location-based Service Providers original request anonymized request

Request formats  Original Request –Identifier –Current location –Quality of service Maximum cloaking latency Maximum cloaking region –Location privacy Minimum anonymity level –Service related content –Current time  Anonymized Request –Pseudonym –Cloaking region –Service related content

Location K-Anonymity Model For any request, if and only if its cloaking region covers the locations of at least k- 1 other requests (location anonymity set) its location is covered by the cloaking regions of at least k-1 other requests (identifier anonymity set).

Quality Aware Location K-anonymity Model  Location Privacy –to expand the user location into a cloaking region such that the location k-anonymity model is satisfied.  Temporal QoS –the request must be anonymized before the pre- defined maximum cloaking delay  Spatial QoS –the cloaking region size should not exceed a threshold

Cloaking Algorithm  Directed graph –Find the location anonymity set and identifier anonymity set to satisfy the location k-anonymity model through neighbor ships of request nodes.  Spatial index –Use window query to facilitate construction and maintenance of neighbor ships in the graph  Min-heap –Order the requests according to their cloaking deadlines, detect the expiration of requests

Directed Graph  G (V, E): directed graph –V: set of nodes (requests) –E: set of edges –edge e ij =(r i, r j ) ∈ E, iff | r i r j | < r i. –edge e ji =(r j, r i ) ∈ E, iff | r i r j | < r j. –r i can be anonymized immediately if there are at least k-1 other forwarded requests in U out and k-1 other forwarded requests in U in r1r2 r4 r3 r1 r2 r4 r3 Location anonymity set U out = {r 2, r 3, r 4 } outgoing neighbors Identifier anonymity set Uin= {r3, r4 } incoming neighbors

Cloaking Algorithm: Maintenance Anonymizing Proxy original request Spatial Index Min Heap Directed Graph id Range Query Location Anonymity Set r.Uout Identifier Anonymity Set r.Uin C

Cloaking Algorithm: Cloaking Min Heap r Get the top request r Directed Graph remove r in the graph Delay it until all its neighbors have been forwarded Spatial Index Min Heap  r r Enough forwarded neighbors in Uout and Uin?

Improvement with Dummy  Guarantee a 100% success rate.  Only need to maintain the in-degree and out-degree of each node r.  Cloaking region of each dummy request d is a random spatial region between MBR (r, d) and MBR (r.U out ).  Both in-degree neighbors and out-degree neighbors  high privacy level  Satisfy the spatial QoS requirement of r  Indistinguishable from actual requests

Experimental Settings  Brinkhoff Network-based Generator of Moving Objects.  Input: –Road map of Oldenburg County  Output: –20K moving objects with the location range [0-200] –Minimum Update interval=20K –The identifier, the location information (x,y). –K=2-5 – = 2-10 – = , =10 CliqueCloak vs. No Dummy vs. DummyCliqueCloak –The success rate with different requirements –The relative anonymity level Cost of dummy

Cloaking Success Rate  Our method (no dummy) has 5-25% higher success rate.  Larger k  lower success rate.  Our method (no dummy) is more robust.  Relative location anonymity level = k’ / k  Our method (no dummy) supports larger k values

Cloaking Success Rate  =[ ]% of the space  =[ ]% of the update interval.  Our method (no dummy) has higher success rate.  Larger or, more flexibility, higher success rate.

Dummy Cost & Cloaking Efficiency  Our method (no dummy) has much shorter cloaking time.  Larger k, longer time.  Portion = dummy / (dummy + true)  Larger k, more dummies  Average 10%, acceptable

Related Works  Quad-tree based Cloaking Algorithm –Recursively subdivides the entire into quadrants, until the quadrant includes the user and other k-1 users M. Gruteser and D. Grunwald. Anonymous usage of location-based services through spatial and temporal cloaking, MobiSys, 2003  Clique-Cloak Algorithm – Personalized privacy requirements: k, spatial and temporal tolerance values – An undirected graph is constructed to search for clique that includes the user’s message and other k-1 messages. B. Gedik and L. Liu. Location Privacy in Mobile Systems: A Personalized Anonymization Model. ICDCS,  Casper –Grid-based cloaking algorithm –Privacy-aware query processor M. F. Mokbel, C. Chow and W. G. Aref. The New Casper: Query Processing for Location Services without Compromising Privacy. VLDB

Conclusions  Problem: quality-aware privacy protection in LBS  Classify location anonymity and identifier anonymity.  Solution –New Quality-Aware K-Anonymity Model –Efficient directed-graph based cloaking algorithm –An option of using dummy requests  Experimental evaluation –Various privacy and QoS requirements –Efficient

Thank you