Preventing Denial-of-request Inference Attacks in Location- sharing Services Kazuhiro Minami Institute of Statistical Mathematics ICMU 2014.

Slides:



Advertisements
Similar presentations
Xiaoming Sun Tsinghua University David Woodruff MIT
Advertisements

Cipher Techniques to Protect Anonymized Mobility Traces from Privacy Attacks Chris Y. T. Ma, David K. Y. Yau, Nung Kwan Yip and Nageswara S. V. Rao.
Statistics Review and Design Implications [TEMPLATE]
Efficient Information Retrieval for Ranked Queries in Cost-Effective Cloud Environments Presenter: Qin Liu a,b Joint work with Chiu C. Tan b, Jie Wu b,
An On-Chip IP Address Lookup Algorithm Author: Xuehong Sun and Yiqiang Q. Zhao Publisher: IEEE TRANSACTIONS ON COMPUTERS, 2005 Presenter: Yu Hao, Tseng.
Learning Location Correlation From GPS Trajectories Yu Zheng Microsoft Research Asia March 16, 2010.
Quantifying Location Privacy: The Case of Sporadic Location Exposure Reza Shokri George Theodorakopoulos George Danezis Jean-Pierre Hubaux Jean-Yves Le.
Security and Privacy Issues in Wireless Communication By: Michael Glus, MSEE EEL
Constructing Popular Routes from Uncertain Trajectories Ling-Yin Wei 1, Yu Zheng 2, Wen-Chih Peng 1 1 National Chiao Tung University, Taiwan 2 Microsoft.
Active Learning and Collaborative Filtering
Hidden Markov Models Ellen Walker Bioinformatics Hiram College, 2008.
Natural Language Processing Spring 2007 V. “Juggy” Jagannathan.
Yu Zheng, Lizhu Zhang, Xing Xie, Wei-Ying Ma Microsoft Research Asia
Anatomy: Simple and Effective Privacy Preservation Israel Chernyak DB Seminar (winter 2009)
Probabilistic Model of Sequences Bob Durrant School of Computer Science University of Birmingham (Slides: Dr Ata Kabán)
Privacy-Aware Computing Introduction. Outline  Brief introduction Motivating applications Major research issues  Tentative schedule  Reading assignments.
Learning Transportation Mode from Raw GPS Data for Geographic Applications on the Web Yu Zheng, Like Liu, Xing Xie Microsoft Research.
To Join or Not join: The Illusion of Privacy in Social Networks with Mixed Public and Private User Profiles May 20 Offense.
Mining Interesting Locations and Travel Sequences From GPS Trajectories Yu Zheng and Xing Xie Microsoft Research Asia March 16, 2009.
1 Preserving Privacy in GPS Traces via Uncertainty-Aware Path Cloaking by: Baik Hoh, Marco Gruteser, Hui Xiong, Ansaf Alrabady ACM CCS '07 Presentation:
Using GPS to learn significant locations and predict movement across multiple users Daniel Ashbrook, Thad Starner College Of Computing, Georgia Institute.
Learning Significant Locations and Predicting User Movement with GPS Daniel Ashbrook and Thad Starner Learning Significant Locations and Predicting User.
1 A Network Traffic Classification based on Coupled Hidden Markov Models Fei Zhang, Wenjun Wu National Lab of Software Development.
Chapter 8 Introduction to Hypothesis Testing
Masquerade Detection Mark Stamp 1Masquerade Detection.
Overview of Privacy Preserving Techniques.  This is a high-level summary of the state-of-the-art privacy preserving techniques and research areas  Focus.
Quantifying Location Privacy Reza Shokri George Theodorakopoulos Jean-Yves Le Boudec Jean-Pierre Hubaux May 2011.
Preserving Link Privacy in Social Network Based Systems Prateek Mittal University of California, Berkeley Charalampos Papamanthou.
APPLYING EPSILON-DIFFERENTIAL PRIVATE QUERY LOG RELEASING SCHEME TO DOCUMENT RETRIEVAL Sicong Zhang, Hui Yang, Lisa Singh Georgetown University August.
Focused Matrix Factorization for Audience Selection in Display Advertising BHARGAV KANAGAL, AMR AHMED, SANDEEP PANDEY, VANJA JOSIFOVSKI, LLUIS GARCIA-PUEYO,
Mining Interesting Locations and Travel Sequences from GPS Trajectories IDB & IDS Lab. Seminar Summer 2009 강 민 석강 민 석 July 23 rd,
14 Elements of Nonparametric Statistics
Your Friends Have More Friends Than You Do: Identifying Influential Mobile Users Through Random Walks Bo Han, Aravind Srinivasan University of Maryland.
Segmental Hidden Markov Models with Random Effects for Waveform Modeling Author: Seyoung Kim & Padhraic Smyth Presentor: Lu Ren.
BINF6201/8201 Hidden Markov Models for Sequence Analysis
1 Energy-efficient Localization Via Personal Mobility Profiling Ionut Constandache Co-authors: Shravan Gaonkar, Matt Sayler, Romit Roy Choudhury and Landon.
Protecting Sensitive Labels in Social Network Data Anonymization.
CSCD 218 : DATA COMMUNICATIONS AND NETWORKING 1
Hiding in the Mobile Crowd: Location Privacy through Collaboration.
Hidden Topic Markov Models Amit Gruber, Michal Rosen-Zvi and Yair Weiss in AISTATS 2007 Discussion led by Chunping Wang ECE, Duke University March 2, 2009.
One-class Training for Masquerade Detection Ke Wang, Sal Stolfo Columbia University Computer Science IDS Lab.
A New Handover Mechanism for Femtocell-to-Femtocell Adviser: Frank, Yeong - Sung Lin Presented by Li Wen Fang.
Zibin Zheng DR 2 : Dynamic Request Routing for Tolerating Latency Variability in Cloud Applications CLOUD 2013 Jieming Zhu, Zibin.
CS555Topic 251 Cryptography CS 555 Topic 25: Quantum Crpytography.
Processing Sequential Sensor Data The “John Krumm perspective” Thomas Plötz November 29 th, 2011.
A Passive Approach to Sensor Network Localization Rahul Biswas and Sebastian Thrun International Conference on Intelligent Robots and Systems 2004 Presented.
Preserving Privacy in GPS Traces via Uncertainty- Aware Path Cloaking Baik Hoh, Marco Gruteser, Hui Xiong, Ansaf Alrabady Presented by Joseph T. Meyerowitz.
Geo-Indistinguishability: Differential Privacy for Location Based Services Miguel Andres, Nicolas Bordenabe, Konstantinos Chatzikokolakis, Catuscia Palamidessi.
Dr. Sudharman K. Jayaweera and Amila Kariyapperuma ECE Department University of New Mexico Ankur Sharma Department of ECE Indian Institute of Technology,
A paper by: Paul Kocher, Joshua Jaffe, and Benjamin Jun Presentation by: Michelle Dickson.
CSC321: Neural Networks Lecture 16: Hidden Markov Models
TRAVEL & Tourism APPS
MaskIt: Privately Releasing User Context Streams for Personalized Mobile Applications SIGMOD '12 Proceedings of the 2012 ACM SIGMOD International Conference.
Comparison of Tarry’s Algorithm and Awerbuch’s Algorithm CS 6/73201 Advanced Operating System Presentation by: Sanjitkumar Patel.
Preserving Privacy GPS Traces via Uncertainty-Aware Path Cloaking Baik Hoh, Marco Gruteser, Hui Xiong, Ansaf Alrabady Presenter:Yao Lu ECE 256, Spring.
Graph Data Management Lab, School of Computer Science Personalized Privacy Protection in Social Networks (VLDB2011)
Towards Robustness in Query Auditing Shubha U. Nabar Stanford University VLDB 2006 Joint Work With B. Marthi, K. Kenthapadi, N. Mishra, R. Motwani.
Markov Games TCM Conference 2016 Chris Gann
Optimizing the Location Obfuscation in Location-Based Mobile Systems Iris Safaka Professor: Jean-Pierre Hubaux Tutor: Berker Agir Semester Project Security.
Artificial Intelligence Research Laboratory Bioinformatics and Computational Biology Program Computational Intelligence, Learning, and Discovery Program.
Dynamic Bandwidth Reservation in Cellular Networks Using Road Topology Based Mobility Predictions InfoCom 2004 Speaker : Bo-Chun Wang
Center for E-Business Technology Seoul National University Seoul, Korea Private Queries in Location Based Services: Anonymizers are not Necessary Gabriel.
Deriving Private Information from Association Rule Mining Results Zutao Zhu, Guan Wang, and Wenliang Du ICDE /3/181.
User Joining Behavior in Online Forums
Location Cloaking for Location Safety Protection of Ad Hoc Networks
“Location Privacy Protection for Smartphone Users”
Basic of Modern Cryptography
Discrete-time markov chain (continuation)
Secure Diffie-Hellman Algorithm
Volume 3, Issue 6, Pages e3 (December 2016)
Presentation transcript:

Preventing Denial-of-request Inference Attacks in Location- sharing Services Kazuhiro Minami Institute of Statistical Mathematics ICMU 2014

Location Sharing Services (LSSs) Enable users to share their identifiable location information with others LSS Examples: - Google Latitude, - Glympse - Instamapper Retrieve Location data Mobile Platforms: - iPhone - Android Publish location data GPS signal Compute GPS coordinates Raise significant concern on location privacy

Naïve Access Control in LSS LSS Target user Set of private locations S Requester Define No Examples: hospitals, drinking bars, etc.

Hospital Book store However, just protecting private locations is not enough Assume that Dave knows Bob’s previous traces Bob can figure out that Alice is visiting the hospital here Bob’s path Dave Bob

Location Predictor based on the Markov Model Siebel Center Unihigh DCL Union Siebel Center Unihigh DCL Union Consider locations as states of a user and define a state transition matrix M Probability of moving from l i to l k in n steps: M i,k (n) lili lklk n steps

(M, t)-Access control [MBL2011] Matrix M Ask if M i,k (n) < t LSS Target user Requester Prevent predicting the target user’s visiting a private location with probability higher than a given threshold value t Matrix M Set of private locations S For every private location l k

However, not publishing location data reveals some information Private location A user moves l 1, l 2, and l 3 in sequence A threshold value t = 0.8 ✔ ✔ ✔ Next location is either l 2 or l 4 Only l 2 is not publishable since the user will surely visit l 3 next If we get a sequence (l 1,ε) we learn: 1.The user is currently at l 2, and 2.The user will visit l 3 next ✔

Denial-of-request Inferences If LSS does not publish location data after publishing l i, the requester learns that lili lklk n steps ljlj DENY Private location

Algorithm for converting the original matrix M to compressed M’ If we see (l 2, ε), we know the user’s at l S = {l 6, l 8 } S = {l 2, l 3, l 6, l 8 } If we see (l 1, ε), we know the user’s either at l 2 or l

Hospital Book store Revisiting the previous example with our proposed method Bob’s path

Comparison of the two access-control methods with the Geolife dataset Consider a rectangular region of 39 × 30 kilometers in Beijing, China Use top 10 users in terms of data points Divide the region into 140 × 140 (=19,600) unit regions Q: How many more non-releasable locations when we consider denial-of-request inferences? GPS dataset published by Microsoft Asia 178 users in the period of four years Logged every 1 – 5 seconds

Initial private locations S 0 1.Pick two locations of an restaurant and a hospital, which was actually visited by users China-Japan Friendship Hospital ( N. latitude , E. longitude ) South Beauty Restaurant ( N. latitude , E. longitude ) 2.Randomly choose a given number of locations from the top most frequently visited locations

Dependency on the number of initial private locations #Final private locations #Initial private locations A threshold δ = 0.8. #inference steps = 1.

Dependency on the number of inference attacks #Final private locations #Inference steps A threshold δ = 0.8. #Initial private location = 2

Conclusions Study a new inference problem concerning a denial of service request in LSSs Model an adversary with a compressed state transition matrix Experimental results show a considerable in existing LSSs Future work includes studying inference problems based on the hidden Markov model

Thank you!