1 Realtime Location Privacy Via Mobility Prediction Creating Confusion at Crossroads Joseph Meyerowitz Romit Roy Choudhury Undergraduate Senior,Asst. Professor.

Slides:



Advertisements
Similar presentations
Preserving Location Privacy Uichin Lee KAIST KSE Slides based on by Ling Liuhttp://
Advertisements

1 (ECE 256: Wireless Networking and Mobile Computing) Location Privacy in Mobile Computing Topics: Pseudonymns, CliqueCloak, Path Confusion, CacheCloak.
Directed Diffusion for Wireless Sensor Networking
Virtual Trip Lines for Distributed Privacy-Preserving Traffic Monitoring Baik Hoh, Marco Gruteser WINLAB / ECE Dept., Rutgers University Ryan Herring,
VTrack: Accurate, Energy-Aware Road Traffic Delay Estimation Using Mobile Phones Arvind Thiagarajan, Lenin Ravindranath, Katrina LaCurts, Sivan Toledo,
Delay bounded Routing in Vehicular Ad-hoc Networks Antonios Skordylis Niki Trigoni MobiHoc 2008 Slides by Alex Papadimitriou.
Group #1: Protocols for Wireless Mobile Environments.
1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.
MPAC 2004Rae Harbird 1 RUBI Adaptive Resource Discovery for Ubiquitous Computing Rae Harbird Stephen Hailes
Ranveer Chandra , Kenneth P. Birman Department of Computer Science
Security and Privacy Issues in Wireless Communication By: Michael Glus, MSEE EEL
The Structure of Networks with emphasis on information and social networks T-214-SINE Summer 2011 Chapter 8 Ýmir Vigfússon.
Demolishing Information Silos for the Benefit of Customers Pete Johnston Programme Manager.
 Guarantee that EK is safe  Yes because it is stored in and used by hw only  No because it can be obtained if someone has physical access but this can.
Vehicle-to-Vehicle Wireless Communication Protocols for Enhancing Highway Traffic Safety - A Comparative Study of Data Dissemination Models for VANETs.
Putting People in their Places An Anonymous and Privacy-Sensitive Approach to Collecting Sensed Data in Location-Based Applications Karen P. Tang Pedram.
Aggregation in Sensor Networks NEST Weekly Meeting Sam Madden Rob Szewczyk 10/4/01.
1 Location Information Management and Moving Object Databases “Moving Object Databases: Issues and Solutions” Ouri, Bo, Sam and Liqin.
Milano, 4-5 Ottobre 2004 IS-MANET The Virtual Routing Protocol for Ad Hoc Networks ISTI – CNR S. Chessa.
Anonymous Gossip: Improving Multicast Reliability in Mobile Ad-Hoc Networks Ranveer Chandra (joint work with Venugopalan Ramasubramanian and Ken Birman)
The Structure of Networks with emphasis on information and social networks T-214-SINE Summer 2011 Chapter 8 Ýmir Vigfússon.
1 Preserving Privacy in GPS Traces via Uncertainty-Aware Path Cloaking by: Baik Hoh, Marco Gruteser, Hui Xiong, Ansaf Alrabady ACM CCS '07 Presentation:
Baik Hoh Marco Gruteser Hui Xiong Ansaf Alrabady All images are credited to “ACM” Hoh et al (2007), pp
Data Structures Introduction Phil Tayco Slide version 1.0 Jan 26, 2015.
ENHANCING AND EVALUATION OF AD-HOC ROUTING PROTOCOLS IN VANET.
On the Anonymity of Anonymity Systems Andrei Serjantov (anonymous)
Location Privacy Location privacy in mobile systems: A personalized Anonymization Model Burga Gedik, Ling Liu.
Mediamatics / Knowledge based systems Dynamic vehicle routing using Ant Based Control Ronald Kroon Leon Rothkrantz Delft University of Technology October.
1 SurroundSense: Mobile Phone Localization via Ambience Fingerprinting Ionut Constandache Co-authors: Martin Azizyan and Romit Roy Choudhury.
GUI: GPS-Less Traffic Congestion Avoidance in Urban Area with Inter-Vehicular Communication Presenter: Zhen Jiang or
Privacy Preserving Data Mining on Moving Object Trajectories Győző Gidófalvi Geomatic ApS Center for Geoinformatik Xuegang Harry Huang Torben Bach Pedersen.
Opportunities for Mobile Enhanced Library Services and Collections Tito Sierra, NCSU Libraries JHU Libraries Assembly May 21, 2010.
HERO: Online Real-time Vehicle Tracking in Shanghai Xuejia Lu 11/17/2008.
1 1 CSCE 5013: Hot Topics in Mobile and Pervasive Computing Discussion of LOC1 and LOC2 Nilanjan Banerjee Hot Topic in Mobile and Pervasive Computing University.
1 Energy-efficient Localization Via Personal Mobility Profiling Ionut Constandache Co-authors: Shravan Gaonkar, Matt Sayler, Romit Roy Choudhury and Landon.
Evgueni (Eugene) Khokhlov1 A Mobility-Centric Data Dissemination Algorithm for Vehicular Networks (MDDV) Evgueni (Eugene) Khokhlov.
Mobile Traffic Sensor Network versus Motion-MIX: Tracing and Protecting Mobile Wireless Nodes JieJun Kong Dapeng Wu Xiaoyan Hong and Mario Gerla.
International Telecommunication Union No 1 The Executive Round Tables High-level perspectives and strategies regarding the present and future use of ICT.
Hiding in the Mobile Crowd: Location Privacy through Collaboration.
1 Flow Identification Assume you want to guarantee some type of quality of service (minimum bandwidth, maximum end-to-end delay) to a user Before you do.
Infrastructure Mobility: A What-If Analysis Mahanth Gowda Nirupam Roy Romit Roy Choudhury.
Towards Exploiting User- Centric Information for Proactive Caching in Mobile Networks ‡ , WWRF28, Athens Xenofon Vasilakos Xenofon Vasilakos,
Bob Knowledge Plane -- Scaling of the WHY App Bob Braden, ISI 24 Sept 03.
1 Hiding Stars with Fireworks: Location Privacy through Camouflage Joseph Meyerowitz Romit Roy Choudhury ECE and PhysicsDept. of ECE and CS.
1 Data Naming in Vehicle-to-Vehicle Communications HU Yao Goto Lab
Alastair R. Beresford Frank Stajano University of Cambridge Presented by Arcadiy Kantor — CS4440 September 13, 2007.
Lecture 12 Page 1 CS 236, Spring 2008 Virtual Private Networks VPNs What if your company has more than one office? And they’re far apart? –Like on opposite.
A Mobile Terminal Based Trajectory Preserving Strategy for Continuous Querying LBS Users Yunxia Feng, Peng Liu, Jianhui Zhang May , 2012 Hangzhou,
How Others Compromise Your Location Privacy: The Case of Shared Public IPs at Hotspots N. Vratonjic, K. Huguenin, V. Bindschaedler, and J.-P. Hubaux PETS.
Preserving Privacy in GPS Traces via Uncertainty- Aware Path Cloaking Baik Hoh, Marco Gruteser, Hui Xiong, Ansaf Alrabady Presented by Joseph T. Meyerowitz.
BARD / April BARD: Bayesian-Assisted Resource Discovery Fred Stann (USC/ISI) Joint Work With John Heidemann (USC/ISI) April 9, 2004.
1 TBD: Trajectory-Based Data Forwarding for Light-Traffic Vehicular Networks IEEE ICDCS’09, Montreal, Quebec, Canada Jaehoon Jeong, Shuo Gu, Yu Gu, Tian.
Virtual Trip Lines for Distributed Privacy- Preserving Traffic Monitoring Baik Hoh et al. MobiSys08 Slides based on Dr. Hoh’s MobiSys presentation.
1 Utilizing Shared Vehicle Trajectories for Data Forwarding in Vehicular Networks IEEE INFOCOM MINI-CONFERENCE Fulong Xu, Shuo Gu, Jaehoon Jeong, Yu Gu,
1 Upcoming Topics and Projects Romit Roy Choudhury Dept. of ECE.
Chapter 14 : Modeling Mobility Andreas Berl. 2 Motivation  Wireless network simulations often involve movements of entities  Examples  Users are roaming.
1 SurroundSense: Mobile Phone Localization via Ambience Fingerprinting.
February 4, Location Based M-Services Soon there will be more on-line personal mobile devices than on-line stationary PCs. Location based mobile-services.
Location Privacy Protection for Location-based Services CS587x Lecture Department of Computer Science Iowa State University.
1 The Importance of Being Wireless Romit Roy Choudhury.
U of Minnesota DIWANS'061 Energy-Aware Scheduling with Quality of Surveillance Guarantee in Wireless Sensor Networks Jaehoon Jeong, Sarah Sharafkandi and.
H IDING S TARS WITH F IREWORKS : L OCATION P RIVACY THROUGH C AMOUFLAGE H IDING S TARS WITH F IREWORKS : L OCATION P RIVACY THROUGH C AMOUFLAGE J OSEPH.
1 Travel Times from Mobile Sensors Ram Rajagopal, Raffi Sevlian and Pravin Varaiya University of California, Berkeley Singapore Road Traffic Control TexPoint.
Improving Fault Tolerance in AODV Matthew J. Miller Jungmin So.
VADD: Vehicle-Assisted Data Delivery in Vehicular Ad Hoc Networks Zhao, J.; Cao, G. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 鄭宇辰
National Taiwan University Department of Computer Science and Information Engineering Vinod Namboodiri and Lixin Gao University of Massachusetts Amherst.
1 Desiging a Virtual Information Telescope using Mobile Phones and Social Participation Romit Roy Choudhury Asst. Prof. (Duke University)
Dude, where’s that IP? Circumventing measurement-based geolocation
Location Privacy.
Data Structures Introduction
Presentation transcript:

1 Realtime Location Privacy Via Mobility Prediction Creating Confusion at Crossroads Joseph Meyerowitz Romit Roy Choudhury Undergraduate Senior,Asst. Professor ECE and Physics,Dept. of ECE and CS Duke UniversityDuke University

2 Context Better localization technology + Pervasive wireless connectivity = Location-based pervasive applications

3 Location-Based Apps For Example:  GeoLife shows grocery list on phone when near WalMart  Micro-Blog allows querying people at a desired region  Location-based ad: Phone gets coupon at Starbucks  … Location expresses context of user  Facilitating content delivery Location is the IP address Its as if for content

4 Double-Edged Sword While location drives this new class of applications, it also violates user’s privacy Sharper the location, richer the app, deeper the violation

5 While location drives this new class of applications, it also violates user’s privacy Sharper the location, richer the app, deeper the violation Moreover, range of apps are PUSH based. Require continuous location information Phone detected at Starbucks, PUSH a coffee coupon Phone located on highway, query traffic congestion Double-Edged Sword

6 Location Privacy Problem: Research: Continuous location exposure a serious threat to privacy Continuous location exposure a serious threat to privacy Preserve privacy without sacrificing the quality of continuous loc. based apps Preserve privacy without sacrificing the quality of continuous loc. based apps

7 Just Call Yourself ``Freddy” Pseudonymns  Effective only when infrequent location exposure  Else, spatio-temporal patterns enough to deanonymize … think breadcrumbs Romit’s Office John LeslieJack Susan Alex

8 Add Noise K-anonymity  Convert location to a space-time bounding box  Ensure K users in the box  Location Apps reply to boxed region Issues  Poor quality of location  Degrades in sparse regions  Not real-time You Bounding Box K=4

9 Confuse Via Mixing Path intersections is an opportunity for privacy  If users intersect in space-time, cannot say who is who later Issues  Users may not be collocated in space and time  Mixing still possible at the expense of delay

10 Existing solutions seem to suggest: Privacy and Quality of Localization (QoL) is a zero sum game Need to sacrifice one to gain the other

11 Our Goal Break away from this tradeoff Target: Spatial accuracy Real-time updates Privacy guarantees Even in sparse populations We design: CacheCloak

12 CacheCloak Intuition Exploit mobility prediction to create future path intersections User’s paths are like crossroads of breadcrumbs App knows precise locations, but doesn’t know the user

13 CacheCloak Assume trusted privacy provider  Reveal location to CacheCloak  CacheCloak exposes anonymized location to Loc. App CacheCloak Loc. App1 Loc. App2 Loc. App3 Loc. App4

14 CacheCloak Design User A drives down path P1  P1 is a sequence of locations  CacheCloak has cached response for each location User A takes a new turn (no cached response)  CacheCloak predicts mobility  Deliberately intersects predicted path with another path P2  Exposes predicted path to application Application replies to queries for entire path CacheCloak always knows user’s current location  Forwards cached responses for that precise location

15 CacheCloak Design Adversary confused  New path intersects paths P1 and P2 (crossroads)  Not clear where the user came from or turned onto Example …

16 Example

17 Benefits Real-time  Response ready when user arrives at predicted location High QoL  Responses can be specific to location  Overhead on the wired backbone (caching helps) Entropy guarantees  Entropy increases at traffic intersections  In low regions, desired entropy possible via false branching Sparse population  Can be handled with dummy users

18 Quantifying Privacy City converted into grid of small sqaures (pixels)  Users are located at a pixel at a given time Each pixel associated with 8x8 matrix  Element (x, y) = probability that user enters x and exits y Probabilities diffuse  At intersections  Over time Privacy = entropy x y pixel

19 Diffusion Probability of user’s presence diffuses  Diffusion gradient computed based on history  i.e., what fraction of users take right turn at this intersection Time t 1 Time t 2 Time t 3 Road Intersection

20 Evaluation Trace based simulation  VanetMobiSim + US Census Bureau trace data  Durham map with traffic lights, speed limits, etc.  Vehicles follow Google map paths  Performs collision avoidance 6km x 6km 10m x 10m pixel 1000 cars 6km x 6km 10m x 10m pixel 1000 cars

21 Results High average entropy  Quite insensitive to user density (good for sparse regions)  Minimum entropy reasonably high

22 Results Per-user entropy  Increases quickly over time  No user starves of location privacy

23 Issues and Limitations CacheCloak overhead  Application replies to lots of queries  However, overhead on wired infrastructure  Caching reduces this overhead significantly CacheCloak assumes same, indistinguishable query  Different queries can deanonymize  Need more work Per-user privacy guarantee not yet supported  Adaptive branching & dummy users

24 Closing Thoughts Two nodes may intersect in space but not in time Mixing not possible, without sacrificing timeliness Mobility prediction creates space-time intersections Enables virtual mixing in future

25 Closing Thoughts CacheCloak Implements the prediction and caching function Significant entropy attained even under sparse population Spatio-temporal accuracy remains uncompromised

26 Final Take Away Chasing a car is easier on highways … Much harder in Manhattan crossroads CacheCloak tries to turn a highway into a virtual Manhattan … Well, sort of …

27 Thank You For more related work, visit:

28 Emerging trends in content distribution Content delivered to a location / context  As opposed to a destination address Thus, “location” is a key driver of content delivery IP address : Internet = Location : CDN New wave of applications

29 Emerging trends in content distribution Content delivered to a location / context  As opposed to a destination address Thus, “location” is a key driver of content delivery IP address : Internet = Location : CDN New wave of applications

30 Example

31 Location Privacy Problem: Continuous location exposure deprives user of her privacy. Continuous location exposure deprives user of her privacy.

32 Location Frequency Some location apps are reactive / infrequent  E.g., List Greek restaurants around me now (PULL) But, many emerging apps are proactive  E.g., Phone detected at Starbucks, PUSH a coffee coupon

33 Location Frequency Some location apps are reactive / infrequent  E.g., List Greek restaurants around me now (PULL) But, many emerging apps are proactive  E.g., Phone detected at Starbucks, PUSH a coffee coupon Opportunity for Big Bro to track you over space and time Proactive apps require continuous location Proactive apps require continuous location

34 Categorizing Apps Some location apps are reactive  You ask, App answers  E.g., Pull all Greek restaurants around your location But, many emerging apps are proactive  E.g., Phone detected at Starbucks, PUSH a coffee coupon

35 Categorizing Apps Some location apps are reactive  You ask, App answers  E.g., Pull all Greek restaurants around your location But, many emerging apps are proactive  E.g., Phone detected at Starbucks, PUSH a coffee coupon Proactive apps require continuous location Proactive apps require continuous location