Systems and Internet Infrastructure Security (SIIS) LaboratoryPage Systems and Internet Infrastructure Security Network and Security Research Center Department.

Slides:



Advertisements
Similar presentations
Efficient Evaluation of k-Range Nearest Neighbor Queries in Road Networks Jie BaoChi-Yin ChowMohamed F. Mokbel Department of Computer Science and Engineering.
Advertisements

Quality Aware Privacy Protection for Location-based Services Zhen Xiao, Xiaofeng Meng Renmin University of China Jianliang Xu Hong Kong Baptist University.
Bio Michel Hanna M.S. in E.E., Cairo University, Egypt B.S. in E.E., Cairo University at Fayoum, Egypt Currently is a Ph.D. Student in Computer Engineering.
Pete Bohman Adam Kunk.  Introduction  Related Work  System Overview  Indexing Scheme  Ranking  Evaluation  Conclusion.
©Silberschatz, Korth and Sudarshan12.1Database System Concepts Chapter 12: Part C Part A:  Index Definition in SQL  Ordered Indices  Index Sequential.
Chapter 11 Indexing and Hashing (2) Yonsei University 2 nd Semester, 2013 Sanghyun Park.
Semantic Matching of candidates’ profile with job data from Linkedln PRESENTED BY: TING XIAO SARABPREET KAUR DHILLON.
Progressive Computation of The Min-Dist Optimal-Location Query Donghui Zhang, Yang Du, Tian Xia, Yufei Tao* Northeastern University * Chinese University.
Mohamed F. Mokbel University of Minnesota
Systems and Internet Infrastructure Security (SIIS) LaboratoryPage Systems and Internet Infrastructure Security Network and Security Research Center Department.
Query Processing in Databases Dr. M. Gavrilova.  Introduction  I/O algorithms for large databases  Complex geometric operations in graphical querying.
Location Privacy in Casper: A Tale of two Systems
B+-tree and Hashing.
The ABSTRACT. ABSTRACT Several names for summaries exist Summary Abstract Technical Abstract Executive Summary Descriptive Abstract Informative Abstract.
De-normalize if… Performance is unsatisfactory Table has a low update rate –(sacrifice flexibility) Table has a high query rate –(speed up retrieval)
Chapter 8 File organization and Indices.
Communication-Efficient Distributed Monitoring of Thresholded Counts Ram Keralapura, UC-Davis Graham Cormode, Bell Labs Jai Ramamirtham, Bell Labs.
1 SINA: Scalable Incremental Processing of Continuous Queries in Spatio-temporal Databases Mohamed F. Mokbel, Xiaopeng Xiong, Walid G. Aref Presented by.
Suppose I learn that Garth has 3 friends. Then I know he must be one of {v 1,v 2,v 3 } in Figure 1 above. If I also learn the degrees of his neighbors,
Solving the Protein Threading Problem in Parallel Nocola Yanev, Rumen Andonov Indrajit Bhattacharya CMSC 838T Presentation.
1 SINA: Scalable Incremental Processing of Continuous Queries in Spatio-temporal Databases Mohamed F. Mokbel, Xiaopeng Xiong, Walid G. Aref Presented by.
The Union-Split Algorithm and Cluster-Based Anonymization of Social Networks Brian Thompson Danfeng Yao Rutgers University Dept. of Computer Science Piscataway,
A Customizable k-Anonymity Model for Protecting Location Privacy Written by: B. Gedik, L.Liu Presented by: Tal Shoseyov.
C LOAKING AND M ODELING T ECHNIQUES FOR LOCATION P RIVACY PROTECTION Ying Cai Department of Computer Science Iowa State University Ames, IA
Ch 4. The Evolution of Analytic Scalability
DEXA 2005 Quality-Aware Replication of Multimedia Data Yicheng Tu, Jingfeng Yan and Sunil Prabhakar Department of Computer Sciences, Purdue University.
Distributed Systems. Outline  Services: DNSSEC  Architecture Models: Grid  Network Protocols: IPv6  Design Issues: Security  The Future: World Community.
Database Systems: Design, Implementation, and Management Eighth Edition Chapter 10 Database Performance Tuning and Query Optimization.
Surface Simplification Using Quadric Error Metrics Michael Garland Paul S. Heckbert.
Privacy Preserving Data Mining on Moving Object Trajectories Győző Gidófalvi Geomatic ApS Center for Geoinformatik Xuegang Harry Huang Torben Bach Pedersen.
APPLYING EPSILON-DIFFERENTIAL PRIVATE QUERY LOG RELEASING SCHEME TO DOCUMENT RETRIEVAL Sicong Zhang, Hui Yang, Lisa Singh Georgetown University August.
Network Aware Resource Allocation in Distributed Clouds.
Location Privacy CompSci Instructor: Ashwin Machanavajjhala Some slides are from a tutorial by Mohamed Mokbel (ICDM 2008) Lecture 19: Fall.
Compact Data Structures and Applications Gil Einziger and Roy Friedman Technion, Haifa.
Searching for Extremes Among Distributed Data Sources with Optimal Probing Zhenyu (Victor) Liu Computer Science Department, UCLA.
Disclosure risk when responding to queries with deterministic guarantees Krish Muralidhar University of Kentucky Rathindra Sarathy Oklahoma State University.
Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data.
Secure Sensor Data/Information Management and Mining Bhavani Thuraisingham The University of Texas at Dallas October 2005.
Toward A Session-Based Search Engine Smitha Sriram, Xuehua Shen, ChengXiang Zhai Department of Computer Science University of Illinois, Urbana-Champaign.
PRISM: Private Retrieval of the Internet’s Sensitive Metadata Ang ChenAndreas Haeberlen University of Pennsylvania.
Hashing is a method to store data in an array so that sorting, searching, inserting and deleting data is fast. For this every record needs unique key.
BARD / April BARD: Bayesian-Assisted Resource Discovery Fred Stann (USC/ISI) Joint Work With John Heidemann (USC/ISI) April 9, 2004.
Virtual Trip Lines for Distributed Privacy- Preserving Traffic Monitoring Baik Hoh et al. MobiSys08 Slides based on Dr. Hoh’s MobiSys presentation.
© 2006 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Applying Syntactic Similarity Algorithms.
High-Speed Policy-Based Packet Forwarding Using Efficient Multi-dimensional Range Matching Lakshman and Stiliadis ACM SIGCOMM 98.
Accelerating Dynamic Time Warping Clustering with a Novel Admissible Pruning Strategy Nurjahan BegumLiudmila Ulanova Jun Wang 1 Eamonn Keogh University.
Data and Knowledge Engineering Laboratory Clustered Segment Indexing for Pattern Searching on the Secondary Structure of Protein Sequences Minkoo Seo Sanghyun.
R-Trees: A Dynamic Index Structure For Spatial Searching Antonin Guttman.
Location Privacy Protection for Location-based Services CS587x Lecture Department of Computer Science Iowa State University.
Nonlinear differential equation model for quantification of transcriptional regulation applied to microarray data of Saccharomyces cerevisiae Vu, T. T.,
1 ECE 526 – Network Processing Systems Design System Implementation Principles I Varghese Chapter 3.
Large Scale Sharing Marco F. Duarte COMP 520: Distributed Systems September 19, 2004.
CLUSTERING GRID-BASED METHODS Elsayed Hemayed Data Mining Course.
Dynamics Tech Conference 2015 PART 1. Dynamics R3 CU8 Retail warehouse Built-in modules for warehouse efficiency License plating.
Unit 4 Cellular Telephony
UNC Chapel Hill David A. O’Brien Automatic Simplification of Particle System Dynamics David O’Brien Susan Fisher Ming C. Lin Department of Computer Science.
Output Perturbation with Query Relaxation By: XIAO Xiaokui and TAO Yufei Presenter: CUI Yingjie.
Department of Computer Science, Johns Hopkins University Lecture 7 Finding Concurrency EN /420 Instructor: Randal Burns 26 February 2014.
Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications * CS587x Lecture Department of Computer Science Iowa State University *I. Stoica,
Computer Science and Engineering Jianye Yang 1, Ying Zhang 2, Wenjie Zhang 1, Xuemin Lin 1 Influence based Cost Optimization on User Preference 1 The University.
Systems and Internet Infrastructure Security (SIIS) LaboratoryPage Systems and Internet Infrastructure Security Network and Security Research Center Department.
Data Mining Soongsil University
Improving searches through community clustering of information
Hybrid Cloud Architecture for Software-as-a-Service Provider to Achieve Higher Privacy and Decrease Securiity Concerns about Cloud Computing P. Reinhold.
Location Privacy.
Introduction to locality sensitive approach to distributed systems
Data Warehousing Data Mining Privacy
Minwise Hashing and Efficient Search
Indexing, Access and Database System Architecture
Presentation transcript:

Systems and Internet Infrastructure Security (SIIS) LaboratoryPage Systems and Internet Infrastructure Security Network and Security Research Center Department of Computer Science and Engineering Pennsylvania State University, University Park PA 1 Privacy, Location Based Services, and You Joshua Schiffman

Systems and Internet Infrastructure Security (SIIS) LaboratoryPage 2 They know where you are… A brief story about a bomb and a razor blade… … and what about your cell phone?

Systems and Internet Infrastructure Security (SIIS) LaboratoryPage 3 What is privacy to you? What should be made public? What is the primary difference between normal and location based services? What new threats do they present? Trade-off between privacy and utility

Systems and Internet Infrastructure Security (SIIS) LaboratoryPage 4 What can we do? We want to detach our identity from our requests Is removing identifiers enough? ‣ Can still re-identify k-anonymity [Sweeney ‘02] ‣ Use Generalizations to suppress ‣ Avoid linking of records public knowledge too… ‣ Cliques, Cloaked Regions, etc…

Systems and Internet Infrastructure Security (SIIS) LaboratoryPage 5 The Friendly Ghost The New Casper: Query Processing for Location Services without Compromising Privacy Mokbel et al. notice that previous approaches: ‣ Ignore the difficulties of privacy based queries ‣ Offer a severely limiting Location Anonymizer Uniform privacy policy Fundamentally flawed Computationally heavy

Systems and Internet Infrastructure Security (SIIS) LaboratoryPage 6 Architecture Location Anonymizer receives continuous updates ‣ Blurs the results based on privacy profile (k min,A min ) Query Processor is built-in to the Database ‣ Returns candidate list of answers

Systems and Internet Infrastructure Security (SIIS) LaboratoryPage 7 Location Anonymizer Identify four requirements: ‣ Accuracy ‣ Quality ‣ Efficiency ‣ Flexibility Any others? Spatio-temporal cloaking meets only quality CliqueCloak gives some accuracy and flexibility

Systems and Internet Infrastructure Security (SIIS) LaboratoryPage 8 Data Structure A grid-based pyramid is used to represent the entire service area Each cell is made up of 4 cells found a level below Hash table is maintained for quick lookup Key Idea: ‣ Cells contain user count ‣ Boundaries are independent of user’s location

Systems and Internet Infrastructure Security (SIIS) LaboratoryPage 9 Basic Cloaking Method Bottom-up approach using a complete pyramid Recursively move up the pyramid looking for a cell that satisfies the privacy profile ‣ First attempt to combine neighbor ‣ Move up if both constraints in profile are not met Is there anything wrong with this data structure?

Systems and Internet Infrastructure Security (SIIS) LaboratoryPage 10 Adaptive Cloaking Method Uses an incomplete pyramid structure ‣ Only maintain cells that contain users ‣ Only at the highest level necessary Hash table will point to this level instead of lowest ‣ May not even need recursion ‣ Updates must consider Splitting / Merging High speed users would invoke costly updates

Systems and Internet Infrastructure Security (SIIS) LaboratoryPage 11 Is this better? Does the pyramid meet the four requirements? ‣ Accuracy: small grid cells ‣ Quality: predefined cells are independent of data ‣ Efficient: pre-computed cells ‣ Flexible: individual privacy profile

Systems and Internet Infrastructure Security (SIIS) LaboratoryPage 12 People are data too… Traditional LBSDBs do not consider the case of private data objects ‣ User gathered data is sensitive Private over public Public over private Private over private

Systems and Internet Infrastructure Security (SIIS) LaboratoryPage 13 Private over Public How do we query if we don’t know the query point? ‣ Two extremes are a little extreme… ‣ Solution: determine what could be the results Algorithm for NN queries: ‣ Filter ‣ Find the middle point ‣ Extend the search area ‣ Gather the candidate list

Systems and Internet Infrastructure Security (SIIS) LaboratoryPage 14 An example Find Filters MidpointsExtend

Systems and Internet Infrastructure Security (SIIS) LaboratoryPage 15 Private over Private Only difference is the target objects’ shape is unknown ‣ All steps must consider farthest corner of cloaked data points Candidate list is selected from regions that are covered by some desired percentage ‣ This is policy based and orthogonal ‣ Works with any probabilistic query processing

Systems and Internet Infrastructure Security (SIIS) LaboratoryPage 16 Is it correct? The result set must be both ‣ Inclusive ‣ Minimal (Accuracy) The proof is elementary… geometry

Systems and Internet Infrastructure Security (SIIS) LaboratoryPage 17 Sketch of Proof Theorem 1: The candidate list contains the NN to the query point. ‣ Two cases Theorem 2: The minimum possible range query is issued to get the candidate list Private targets would be the cloaked cells

Systems and Internet Infrastructure Security (SIIS) LaboratoryPage 18 Experiment Using the map of Nennepin County, MN and the Network-based Generator of Moving Objects Location Anonymizer ‣ No comparisons done with other techniques Limited to small number of users [previous paper] Privacy requirement [CliqueCloak]

Systems and Internet Infrastructure Security (SIIS) LaboratoryPage 19 Results Pyramid Height greater than 6 levels ‣ Adaptive approach reigns supreme Effective because of the tiered levels = less searching With lower levels, the basic approach is better ‣ Cell splitting and merging is expensive Smaller pyramid levels = less accurate ‣ Why?

Systems and Internet Infrastructure Security (SIIS) LaboratoryPage 20 Results - Scalability Basic method ‣ More relaxed users = faster cloaking time ‣ More restrictive users = more recursion Adaptive method ‣ More users = slower ‣ Always better than basic method Less maintained cells ‣ More restrictive users = higher clustering

Systems and Internet Infrastructure Security (SIIS) LaboratoryPage 21 Results - Query Processor Number of filters are used as the experimental factor ‣ 1, 2, and 4 (normal) Public targets: ‣ Greater filters gave a smaller candidate list ‣ 4 always gives a best processing time result Private: ‣ Similar to public for list size ‣ But greater CPU time for analyzing private areas with 4

Systems and Internet Infrastructure Security (SIIS) LaboratoryPage 22 End to End How efficient is CASPER? For relaxed (<10) privacy profiles ‣ Query processing is the dominate factor For stricter profiles transmission time is exceedingly dominate ‣ Using less than 4 filters increase list size ‣ Any processing time gain with less filters is negligible

Systems and Internet Infrastructure Security (SIIS) LaboratoryPage 23 Take Away So what does CASPER mean to us? A more complete framework ‣ Location Anonymizer that meets requirements ‣ Considers the processing side of private queries ‣ Differentiates between public and private targets

Systems and Internet Infrastructure Security (SIIS) LaboratoryPage 24 Criticism What are the flaws of this paper? Will extending the query to other types break the system? What if all users fill the adaptive pyramid’s lowest level? Can a user demand privacy that defeats the utility of the system? Users on cell borders?