Privacy-Preserving Location- Dependent Query Processing Mikhail J. Atallah and Keith B. Frikken Purdue University.

Slides:



Advertisements
Similar presentations
Tight Bounds for Distributed Functional Monitoring David Woodruff IBM Almaden Qin Zhang Aarhus University MADALGO.
Advertisements

Geographic Routing Without Location Information AP, Sylvia, Ion, Scott and Christos.
ECE /24/2005 A Survey on Position-Based Routing in Mobile Ad-Hoc Networks Alok Sabherwal.
Scalable and Dynamic Quorum Systems Moni Naor & Udi Wieder The Weizmann Institute of Science.
Nearest Neighbor Search
Oblivious Branching Program Evaluation
Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT and Berkeley presented by Daniel Figueiredo Chord: A Scalable Peer-to-peer.
COS 461 Fall 1997 Routing COS 461 Fall 1997 Typical Structure.
Efficient access to TIN Regular square grid TIN Efficient access to TIN Let q := (x, y) be a point. We want to estimate an elevation at a point q: 1. should.
2/14/13CMPS 3120 Computational Geometry1 CMPS 3120: Computational Geometry Spring 2013 Planar Subdivisions and Point Location Carola Wenk Based on: Computational.
1 Routing Techniques in Wireless Sensor networks: A Survey.
Geographic Routing Without Location Information A. Rao, S. Ratnasamy, C. Papadimitriou, S. Shenker, I. Stoica Paper and Slides by Presented by Ryan Carr.
Ad-Hoc Networks Beyond Unit Disk Graphs
SIA: Secure Information Aggregation in Sensor Networks Bartosz Przydatek, Dawn Song, Adrian Perrig Carnegie Mellon University Carl Hartung CSCI 7143: Secure.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
A Beacon-Less Location Discovery Scheme for Wireless Sensor Networks Lei Fang (Syracuse) Wenliang (Kevin) Du (Syracuse) Peng Ning (North Carolina State)
Privacy-Preserving Trust Negotiations Mikhail Atallah Department of Computer Science Purdue University.
An architecture for Privacy Preserving Mining of Client Information Jaideep Vaidya Purdue University This is joint work with Murat.
Distance-Based Location Update and Routing in Irregular Cellular Networks Victor Chepoi, Feodor Dragan, Yan Vaxes University of Marseille, France Kent.
Database caching in MANETs Based on Separation of Queries and Responses Author: Hassan Artail, Haidar Safa, and Samuel Pierre Publisher: Wireless And Mobile.
Chapter 5: Path Planning Hadi Moradi. Motivation Need to choose a path for the end effector that avoids collisions and singularities Collisions are easy.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
1 University of Denver Department of Mathematics Department of Computer Science.
Route Planning Vehicle navigation systems, Dijkstra’s algorithm, bidirectional search, transit-node routing.
DAST 2005 Week 4 – Some Helpful Material Randomized Quick Sort & Lower bound & General remarks…
Foundations of Privacy Lecture 11 Lecturer: Moni Naor.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
 Structured peer to peer overlay networks are resilient – but not secure.  Even a small fraction of malicious nodes may result in failure of correct.
Distributed Systems: Client/Server Computing
Database Laboratory Regular Seminar TaeHoon Kim.
Freenet. Anonymity  Napster, Gnutella, Kazaa do not provide anonymity  Users know who they are downloading from  Others know who sent a query  Freenet.
UNC Chapel Hill M. C. Lin Point Location Reading: Chapter 6 of the Textbook Driving Applications –Knowing Where You Are in GIS Related Applications –Triangulation.
Processing Monitoring Queries on Mobile Objects Lecture for COMS 587 Department of Computer Science Iowa State University.
1 SD-Rtree: A Scalable Distributed Rtree Witold Litwin & Cédric du Mouza & Philippe Rigaux.
Computational Geometry The systematic study of algorithms and data structures for geometric objects, with a focus on exact algorithms that are asymptotically.
Network Aware Resource Allocation in Distributed Clouds.
Carnet: Scalable Ad-Hoc Mobile Networking Robert Morris with Kaashoek and Karger.
Distributed Protein Structure Analysis By Jeremy S. Brown Travis E. Brown.
Leader Election Algorithms for Mobile Ad Hoc Networks Presented by: Joseph Gunawan.
CCAN: Cache-based CAN Using the Small World Model Shanghai Jiaotong University Internet Computing R&D Center.
Disclosure risk when responding to queries with deterministic guarantees Krish Muralidhar University of Kentucky Rathindra Sarathy Oklahoma State University.
Locating Mobile Agents in Distributed Computing Environment.
Artificial Intelligence in Game Design N-Grams and Decision Tree Learning.
PODC Distributed Computation of the Mode Fabian Kuhn Thomas Locher ETH Zurich, Switzerland Stefan Schmid TU Munich, Germany TexPoint fonts used in.
1 MANETS – An overview. 2 MANETs Model and Definitions Simulatability – mobility models Routing algorithms Security issues with routing algorithms Tracing.
Geo Location Service CS218 Fall 2008 Yinzhe Yu, et al : Enhancing Location Service Scalability With HIGH-GRADE Yinzhe Yu, et al : Enhancing Location Service.
TELE202 Lecture 6 Routing in WAN 1 Lecturer Dr Z. Huang Overview ¥Last Lecture »Packet switching in Wide Area Networks »Source: chapter 10 ¥This Lecture.
1 30 November 2006 An Efficient Nearest Neighbor (NN) Algorithm for Peer-to-Peer (P2P) Settings Ahmed Sabbir Arif Graduate Student, York University.
1/14/ :59 PM1/14/ :59 PM1/14/ :59 PM Research overview Koen Victor, 12/2007.
Minkyoon Kim, Sangjin Han1 Querying in Highly Mobile Distributed Environments T.Imielinski and B. R. Badrinath Minkyoon Kim Sangjin Han.
Quantum Computing MAS 725 Hartmut Klauck NTU
CSCE 411H Design and Analysis of Algorithms Set 10: Lower Bounds Prof. Evdokia Nikolova* Spring 2013 CSCE 411H, Spring 2013: Set 10 1 * Slides adapted.
Location Privacy Protection for Location-based Services CS587x Lecture Department of Computer Science Iowa State University.
Introduction to Information Retrieval Introduction to Information Retrieval CS276 Information Retrieval and Web Search Chris Manning and Pandu Nayak Efficient.
Privacy-Preserving and Content-Protecting Location Based Queries.
Mobility Increases the Connectivity of K-hop Clustered Wireless Networks Qingsi Wang, Xinbing Wang and Xiaojun Lin.
Geometric Probability Brittany Crawford-Purcell. Bertrand’s Paradox “Given a circle. Find the probability that a chord chosen at random be longer than.
1 Plaxton Routing. 2 History Greg Plaxton, Rajmohan Rajaraman, Andrea Richa. Accessing nearby copies of replicated objects, SPAA 1997 Used in several.
Distance Vector Routing
: MobileIP. : r Goal: Allow machines to roam around and maintain IP connectivity r Problem: IP addresses => location m This is important for efficient.
Geographical Routing Using Partial Information for Wireless Ad Hoc Networks Rahul Jain, Anuj Puri, and Raja Sengupta Department of EECS University of California,
Secure Biometric Authentication for Weak Computational Devices Mikhail Atallah (Purdue),Keith Frikken (Purdue), Michael Goodrich (UC- Irvine), Roberto.
Domain Name System: DNS To identify an entity, TCP/IP protocols use the IP address, which uniquely identifies the Connection of a host to the Internet.
Review: Tree search Initialize the frontier using the starting state
Peer-to-Peer and Social Networks
Accessing nearby copies of replicated objects
Compact routing schemes with improved stretch
COMPUTER NETWORKS PRESENTATION
Path Oram An Extremely Simple Oblivious RAM Protocol
Presentation transcript:

Privacy-Preserving Location- Dependent Query Processing Mikhail J. Atallah and Keith B. Frikken Purdue University

Framework Mobile device queries remote database Queries depend on geographic location –“Get address of nearest gas station” –“Is there a restaurant from here to destination” Much previous work –Caching and performance issues, updating strategies for dealing with rapid change, continuous motion models, etc.

Our Framework Our focus is on privacy of client’s location Proximity queries (“nearest site”) Query contains client’s precise location Answer reveals client’s rough location Goal is to avoid revealing precise location –OK to reveal answer and rough location –Hiding answer from server ? Not in this work

Approach 1: Perturbation Random perturbation of client’s location –Chosen by client –Variable, and not known to server Large enough to “hide” exact location (privacy) Small enough to avoid “too much damage” to quality of answer Issue: Quantifying the damage to answer

Perturbation Results Add to query position a vector of length L and of random direction Worst-case damage to answer is 2L –The bound is tight Average-case damage to answer is L –Probabilistic model: Independent and uniformly distributed queries, sites, perturbation angles

Approach 2: Grid Method The plane is covered with squares tiles Client sends as “query” the tile that contains the true query point –Hence tile size known to both client and server Large tiles imply better privacy, but also a cost –Cost in efficiency (if exact answer) –Cost in quality of answer (if most efficient)

Grid Method Variants Variant 1: Server returns all sites nearest to query tile’s points –Returned sites can be outside the query tile –Client chooses the best site among them –Costly in communication, but no sacrifice in answer quality Variant 2: Server itself chooses 1 to return –Return the site with the most “votes”

Grid Method Results (Variant 2) Quantifying the damage from “gridding” in terms of D = tile diameter Worst-case damage to answer is D –The bound is tight Average-case damage to answer is 0.27D –Probabilistic model: Independent and uniformly distributed queries and sites, fixed tiling

Approach 3: Crypto Protocol Client gets correct answer –Learns nothing else about the database Server learns nothing other than the answer to the query “As if” server knew query (even though doesn’t)

Protocol-Based Solution (1) Server builds hierarchical search DAG (a “Kirkpatrick” structure) on top of a Voronoi Diagram of the n sites –Height h of DAG = O( log n ), size O(n) –Each node of DAG = a geometric triangle A query is processed by tracing a root-to- leaf path in the DAG –Leaf contains 1 site -- the answer

Protocol-Based Solution (2) “Is query point in or out of triangle v” –Up to d such comparisons at a node of the DAG –Must be done without revealing the query point to the server (and, if required, without the server sending the triangles to the client) Search steps down the DAG can be thought of as successive geometric refinements –Opens way for “excessive refinement” attack

Protocol-Based Solution (3) Excessive refinement: Server continues querying even after a leaf is reached To mitigate, client can store or receive a “certified” d*h and refuse to engage in more than d*h point-triangle comparisons But: d*h is only an upper bound –# comparisons needed can be less than d*h –Discovery, by server, of a more efficient search structure increases ability to refine

Future Work (in Progress) Computing proximity between routes –Whether planned route gets near (or avoids) another party’s own planned route –Whether route is within (or avoids by at least) a distance of d another party’s set of points Do so without either party revealing their data to the other, and without using a third party (even an untrusted one)