User Mobility Modeling in Crowdsourcing Application to Prevent Inference Attacks

被引:0
|
作者
Yessoufou, Farid [1 ,2 ]
Sassi, Salma [2 ]
Chicha, Elie [2 ]
Chbeir, Richard [2 ]
Degila, Jules [1 ]
机构
[1] Univ Abomey Calavi, Dept Comp Sci, IMSP, 01,POB 526, Abomey Calavi, Benin
[2] Univ Pau & Pays Adour, Dept Comp Sci, LIUPPA, E2S UPPA, F-64600 Anglet, France
关键词
location protection; personal data preservation; security breach; crowdsourcing; geolocated data; privacy; inference attack; LOCATION;
D O I
10.3390/fi16090311
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rise of the Internet of Things (IoT), mobile crowdsourcing has become a leading application, leveraging the ubiquitous presence of smartphone users to collect and process data. Spatial crowdsourcing, which assigns tasks based on users' geographic locations, has proven to be particularly innovative. However, this trend raises significant privacy concerns, particularly regarding the precise geographic data required by these crowdsourcing platforms. Traditional methods, such as dummy locations, spatial cloaking, differential privacy, k-anonymity, and encryption, often fail to mitigate the risks associated with the continuous disclosure of location data. An unauthorized entity could access these data and infer personal information about individuals, such as their home address, workplace, religion, or political affiliations, thus constituting a privacy violation. In this paper, we propose a user mobility model designed to enhance location privacy protection by accurately identifying Points of Interest (POIs) and countering inference attacks. Our main contribution here focuses on user mobility modeling and the introduction of an advanced algorithm for precise POI identification. We evaluate our contributions using GPS data collected from 10 volunteers over a period of 3 months. The results show that our mobility model delivers significant performance and that our POI extraction algorithm outperforms existing approaches.
引用
收藏
页数:29
相关论文
共 50 条
  • [41] Detecting Application-layer Attacks Based on User's Application-layer Behaviors
    Xie, Bailin
    Jiang, Shengyi
    INFORMATION TECHNOLOGY APPLICATIONS IN INDUSTRY II, PTS 1-4, 2013, 411-414 : 607 - 612
  • [42] Improving Urban Accessibility Data Collection through Enhanced User Experience in a Crowdsourcing Web Application
    Ortiz, Tyler
    Tang, Victor
    2024 4TH INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND SOFTWARE ENGINEERING, ICICSE 2024, 2024, : 55 - 59
  • [43] Modeling time-variant user mobility in wireless mobile networks
    Hsu, Wei-Jen
    Spyropoulos, Thrasyvoulos
    Psounis, Konstantinos
    Helmy, Ahmed
    INFOCOM 2007, VOLS 1-5, 2007, : 758 - +
  • [44] Modeling Spatial and Temporal Dependencies of User Mobility in Wireless Mobile Networks
    Hsu, Wei-Jen
    Spyropoulos, Thrasyvoulos
    Psounis, Konstantinos
    Helmy, Ahmed
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2009, 17 (05) : 1564 - 1577
  • [45] Attribute Inference by Link Strength Modeling in Online Social Networks with User Tags
    Xiao, Ya
    Fan, Zhijie
    Tan, Chengxiang
    Xu, Qian
    Zhu, Wenye
    JOURNAL OF INTERNET TECHNOLOGY, 2020, 21 (03): : 689 - 699
  • [46] Detecting Mobile Application Spoofing Attacks by Leveraging User Visual Similarity Perception
    Malisa, Luka
    Kostiainen, Kari
    Capkun, Srdjan
    PROCEEDINGS OF THE SEVENTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY'17), 2017, : 289 - 300
  • [47] Application of crowdsourced data to infer user satisfaction with Mobility as a Service (MaaS)
    Aman, Javad Jomehpour Chahar
    Smith-Colin, Janille
    TRANSPORTATION RESEARCH INTERDISCIPLINARY PERSPECTIVES, 2022, 15
  • [48] Sample Essentiality and Its Application to Modeling Attacks on Arbiter PUFs
    Zhu, Siwen
    Tang, Yi
    Zheng, Junxiang
    Cao, Yongzhi
    Wang, Hanpin
    Huang, Yu
    Margraf, Marian
    ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2019, 18 (05)
  • [49] Modeling and application of multimodal affective user interface with multimedia
    Zhou, JZ
    Jia, S
    Cao, PP
    Yang, YK
    Wang, XH
    2005 FIRST INTERNATIONAL CONFERENCE ON NEURAL INTERFACE AND CONTROL PROCEEDINGS, 2005, : 28 - 31
  • [50] User interface modeling within application system development
    Strahonja, V
    Picek, R
    ITI 2005: Proceedings of the 27th International Conference on Information Technology Interfaces, 2005, : 285 - 291