1 Preserving Privacy in GPS Traces via Uncertainty-Aware Path Cloaking by: Baik Hoh, Marco Gruteser, Hui Xiong, Ansaf Alrabady ACM CCS '07 Presentation:

Slides:



Advertisements
Similar presentations
On the Optimal Placement of Mix Zones Julien Freudiger, Reza Shokri and Jean-Pierre Hubaux PETS, 2009.
Advertisements

Overcoming Limitations of Sampling for Agrregation Queries Surajit ChaudhuriMicrosoft Research Gautam DasMicrosoft Research Mayur DatarStanford University.
Virtual Trip Lines for Distributed Privacy-Preserving Traffic Monitoring Baik Hoh, Marco Gruteser WINLAB / ECE Dept., Rutgers University Ryan Herring,
October 1999 Statistical Methods for Computer Science Marie desJardins CMSC 601 April 9, 2012 Material adapted.
1 An Approach to Real-Time Support in Ad Hoc Wireless Networks Mark Gleeson Distributed Systems Group Dept.
1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.
Yu Stephanie Sun 1, Lei Xie 1, Qi Alfred Chen 2, Sanglu Lu 1, Daoxu Chen 1 1 State Key Laboratory for Novel Software Technology, Nanjing University, China.
Quantifying Location Privacy: The Case of Sporadic Location Exposure Reza Shokri George Theodorakopoulos George Danezis Jean-Pierre Hubaux Jean-Yves Le.
All Hands Meeting, 2006 Title: Grid Workflow Scheduling in WOSE (Workflow Optimisation Services for e- Science Applications) Authors: Yash Patel, Andrew.
Distributed Algorithms for Secure Multipath Routing
1 A Distortion-based Metric for Location Privacy Workshop on Privacy in the Electronic Society (WPES), Chicago, IL, USA - November 9, 2009 Reza Shokri.
Avatar Path Clustering in Networked Virtual Environments Jehn-Ruey Jiang, Ching-Chuan Huang, and Chung-Hsien Tsai Adaptive Computing and Networking Lab.
Privacy Preserving Publication of Moving Object Data Joey Lei CS295 Francesco Bonchi Yahoo! Research Avinguda Diagonal 177, Barcelona, Spain 6/10/20151CS295.
Communication-Efficient Distributed Monitoring of Thresholded Counts Ram Keralapura, UC-Davis Graham Cormode, Bell Labs Jai Ramamirtham, Bell Labs.
TrafficView: A Scalable Traffic Monitoring System Tamer Nadeem, Sasan Dashtinezhad, Chunyuan Liao, Liviu Iftode* Department of Computer Science University.
Tracking Moving Objects in Anonymized Trajectories Nikolay Vyahhi 1, Spiridon Bakiras 2, Panos Kalnis 3, and Gabriel Ghinita 3 1 St. Petersburg State University.
Using Entropy to Trade Privacy for Trust Yuhui Zhong Bharat Bhargava {zhong, Department of Computer Sciences Purdue University This work.
Department of Computer Engineering Koc University, Istanbul, Turkey
TrafficView: A Driver Assistant Device for Traffic Monitoring based on Car-to-Car Communication Sasan Dashtinezhad, Tamer Nadeem Department of CS, University.
Garmin GPS III Plus Data Collection. Objectives Collect: - Waypoints -Average Position Waypoints -Reference Waypoints - Multiple Tracks in One Track Log.
Rutgers: Gayathri Chandrasekaran, Tam Vu, Marco Gruteser, Rich Martin,
MATE: MPLS Adaptive Traffic Engineering Anwar Elwalid, et. al. IEEE INFOCOM 2001.
Design of Cooperative Vehicle Safety Systems Based on Tight Coupling of Communication, Computing and Physical Vehicle Dynamics Yaser P. Fallah, ChingLing.
Baik Hoh Marco Gruteser Hui Xiong Ansaf Alrabady All images are credited to “ACM” Hoh et al (2007), pp
Differentially Private Transit Data Publication: A Case Study on the Montreal Transportation System Rui Chen, Concordia University Benjamin C. M. Fung,
Hashed Samples Selectivity Estimators for Set Similarity Selection Queries.
Lifetime and Coverage Guarantees Through Distributed Coordinate- Free Sensor Activation ACM MOBICOM 2009.
Minimal Test Collections for Retrieval Evaluation B. Carterette, J. Allan, R. Sitaraman University of Massachusetts Amherst SIGIR2006.
Topic Models in Text Processing IR Group Meeting Presented by Qiaozhu Mei.
Mirco Nanni, Roberto Trasarti, Giulio Rossetti, Dino Pedreschi Efficient distributed computation of human mobility aggregates through user mobility profiles.
1 Realtime Location Privacy Via Mobility Prediction Creating Confusion at Crossroads Joseph Meyerowitz Romit Roy Choudhury Undergraduate Senior,Asst. Professor.
“Intra-Network Routing Scheme using Mobile Agents” by Ajay L. Thakur.
Demo. Overview Overall the project has two main goals: 1) Develop a method to use sensor data to determine behavior probability. 2) Use the behavior probability.
Knowledge Discovery and Delivery Lab (ISTI-CNR & Univ. Pisa)‏ www-kdd.isti.cnr.it Anna Monreale Fabio Pinelli Roberto Trasarti Fosca Giannotti A. Monreale,
An Introduction to Programming and Algorithms. Course Objectives A basic understanding of engineering problem solving process. A basic understanding of.
Aadil Zia Khan and Shahab Baqai LUMS School of Science and Engineering QoS Aware Path Selection in Content Centric Networks Fahad R. Dogar Carnegie Mellon.
A Hybrid Method for achieving High Accuracy and Efficiency in Object Tracking using Passive RFID Lei Yang 1, Jiannong Cao 1, Weiping Zhu 1, and Shaojie.
Department of Computer Science City University of Hong Kong Department of Computer Science City University of Hong Kong 1 Probabilistic Continuous Update.
DISCERN: Cooperative Whitespace Scanning in Practical Environments Tarun Bansal, Bo Chen and Prasun Sinha Ohio State Univeristy.
A study of Intelligent Adaptive beaconing approaches on VANET Proposal Presentation Chayanin Thaina Advisor : Dr.Kultida Rojviboonchai.
ACOMP 2011 A Novel Framework for LBS Privacy Preservation in Dynamic Context Environment.
1 Hiding Stars with Fireworks: Location Privacy through Camouflage Joseph Meyerowitz Romit Roy Choudhury ECE and PhysicsDept. of ECE and CS.
Security Control Methods for Statistical Database Li Xiong CS573 Data Privacy and Security.
Elastic Pathing: Your Speed Is Enough to Track You Presented by Ali.
Mobile Agent Migration Problem Yingyue Xu. Energy efficiency requirement of sensor networks Mobile agent computing paradigm Data fusion, distributed processing.
Preserving Location Privacy in Wireless LANs Jiang, Wang and Hu MobiSys 2007 Presenter: Bibudh Lahiri.
POOLED DATA DISTRIBUTIONS GRAPHICAL AND STATISTICAL TOOLS FOR EXAMINING COMPARISON REFERENCE VALUES Alan Steele, Ken Hill, and Rob Douglas National Research.
A Sociability-Based Routing Scheme for Delay-Tolerant Networks May Chan-Myung Kim
Preserving Privacy in GPS Traces via Uncertainty- Aware Path Cloaking Baik Hoh, Marco Gruteser, Hui Xiong, Ansaf Alrabady Presented by Joseph T. Meyerowitz.
Privacy vs. Utility Xintao Wu University of North Carolina at Charlotte Nov 10, 2008.
Virtual Trip Lines for Distributed Privacy- Preserving Traffic Monitoring Baik Hoh et al. MobiSys08 Slides based on Dr. Hoh’s MobiSys presentation.
Thesis Presentation Chayanin Thaina Advisor : Asst.Prof. Dr. Kultida Rojviboonchai.
MaskIt: Privately Releasing User Context Streams for Personalized Mobile Applications SIGMOD '12 Proceedings of the 2012 ACM SIGMOD International Conference.
By: Gang Zhou Computer Science Department University of Virginia 1 Medians and Beyond: New Aggregation Techniques for Sensor Networks CS851 Seminar Presentation.
Preserving Privacy GPS Traces via Uncertainty-Aware Path Cloaking Baik Hoh, Marco Gruteser, Hui Xiong, Ansaf Alrabady Presenter:Yao Lu ECE 256, Spring.
Location Privacy Protection for Location-based Services CS587x Lecture Department of Computer Science Iowa State University.
Probabilistic km-anonymity (Efficient Anonymization of Large Set-valued Datasets) Gergely Acs (INRIA) Jagdish Achara (INRIA)
2010 IEEE Fifth International Conference on networking, Architecture and Storage (NAS), pp , 2010 作者: Filip Cuckov and Min Song 指導教授:許子衡 教授 報告學生:馬敏修.
1 Travel Times from Mobile Sensors Ram Rajagopal, Raffi Sevlian and Pravin Varaiya University of California, Berkeley Singapore Road Traffic Control TexPoint.
Smartphone-based Wi-Fi Pedestrian-Tracking System Tolerating the RSS Variance Problem Yungeun Kim, Hyojeong Shin, and Hojung Cha Yonsei University Bing.
DOiT Dynamic Optimization in Transportation Ragnhild Wahl, SINTEF (Per J. Lillestøl SINTEF)
ParkNet: Drive-by Sensing of Road-Side Parking Statistics Irfan Ullah Department of Information and Communication Engineering Myongji university, Yongin,
Privacy Vulnerability of Published Anonymous Mobility Traces Chris Y. T. Ma, David K. Y. Yau, Nung Kwan Yip (Purdue University) Nageswara S. V. Rao (Oak.
How many iterations in the Gibbs sampler? Adrian E. Raftery and Steven Lewis (September, 1991) Duke University Machine Learning Group Presented by Iulian.
Location Cloaking for Location Safety Protection of Ad Hoc Networks
Presented By Siddartha Ailuri Graduate Student, EECS 04/07/17
Motion Planning for Multiple Autonomous Vehicles
Location Privacy.
Continuous Density Queries for Moving Objects
A Unified Framework for Location Privacy
Presentation transcript:

1 Preserving Privacy in GPS Traces via Uncertainty-Aware Path Cloaking by: Baik Hoh, Marco Gruteser, Hui Xiong, Ansaf Alrabady ACM CCS '07 Presentation: Martin Azizyan ECE 256, Spring 09 Duke University

2 Overview Introduction Problem Previous work Proposed methods Evaluation Discussion

3 Introduction Emerging use for aggregate location traces Automotive traffic monitoring City planning Privacy a big issue Individuals can be “followed” with their traces Existing techniques have drawbacks Either sacrifice data accuracy, or anonymity

4 Traffic monitoring Goal: estimate travel time for routes “Probe vehicles” report real-time position and speed Data stored in central database for analysis  Both real-time and historical

5 Traffic monitoring Requires high spacial accuracy Parallel roads may be only 10m apart Thus, individuals can be tracked with high accuracy In area of high density traffic, not an issue Can't track one person in a crowd Privacy must also be guaranteed in low density Though data from low-traffic routes not as important

6 Existing privacy algorithms (1) K-anonymity Guarantees degree of anonymity Very low accuracy

7 Existing privacy algorithms (2) Best effort Exploit confusion from multiple crossing paths

8 Existing privacy algorithms (2) Best effort Tang et al. Subsampling

9 Existing privacy algorithms (2) Best effort Tang et al. Subsampling

10 Existing privacy algorithms (2) Best effort Tang et al. Subsampling Non-uniform subsampling also explored Suppress information in high-density areas Unclear worst-case privacy guarantees Individual users still at risk

11 Trace privacy metric Given trace, determine degree of privacy Mean Time To Confusion (MTTC) Time adversary can correctly follow a trace Need Adversary model Last position + heading ~ current position Calculate Tracking Uncertainty H due to confusion If H > a threshold, then assume trace lost MTTC depends on threshold for H

12 Proposed algorithm Parameter: maximum time to confusion Longest time interval a trace can be followed Also need to set maximum uncertainty level Divide into time slots For each sample in a time slot, check: Time since last point of confusion < max Tracking uncertainty > min If either satisfied, release sample (make available)

13 Possible modifications Algorithm not specific to one adversary model Independent tracking uncertainty calculation Reacquisition tracking model Adversary can skip over some points of confusion Minor modifications to algorithm necessary

14 Experimental setup Data Collected GPS traces from 233 vehicles  Sample includes timestamp, coordinates, velocity and heading Experiments performed on 24 hour traces  With 500 and 2000 probe vehicles  One vehicle's traces from 24 hour periods simulate multiple vehicles

15 Experimental setup Evaluation metrics Maximum and median time to confusion (TTC) Relative weighted road coverage  Each sample assigned weight based on number of samples in its area  Quality of sample set = sum of sample weights

16 Results High-density scenario (2000 vehicles) Without reacquisition

17 Results High-density scenario (2000 vehicles) With reacquisition

18 Results Low density scenario (500 vehicles) Without reacquisition With reacquisition

19 QoS analysis Samples kept: uncertainty-aware algorithm v.s. random sampling

20 QoS analysis Relative weighted road coverage No significant change after executing algorithm

21 QoS analysis Maximum TTC vs. weighted road coverage Without reacquisition With reacquisition

22 Discussion Map-based tracking Roads not a continuous 2D space Adversary can assign probabilities more intelligently A priori knowledge Tracking select individual easier than data mining Trust in central location server Fully distributed approach seems infeasible Hybrid approach more likely Inform vehicle of probe density in their area

23 The End

snapshots:

25 Proposed algorithm Processes with time slots Reveals sample if confusion

26 Existing privacy algorithms (2) Best effort Exploit confusion from multiple crossing paths