Deanonymizing Mobility Traces With Co-Location Information

被引:0
|
作者
Khazbak, Youssef [1 ]
Cao, Guohong [1 ]
机构
[1] Penn State Univ, Dept Comp Sci & Engn, University Pk, PA 16802 USA
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Mobility traces have been widely used in the design and evaluation of mobile networks. To mitigate the privacy threat. of publishing mobility traces, the traces are often anonymized and obfuscated. However, even with anonymization and obfuscation techniques, traces can still be deanonymized by exploiting some side information such as users' co-location. With online social networks, mobile users increasingly report their co-locations with other users. For example, a user may report being with friends at a restaurant for lunch or dinner, and hence his friends' location information can be inferred. To find out whether co-location information can be exploited to identify a user and reveal his behavior from a set of mobility traces, we use a dataset from Twitter and Swarm to illustrate how an adversary can gather side information consisting of users' location and co-location. Based on the collected information, the adversary can run a simple yet effective location inference attack. We generalize this attack, formulate the identity inference problem, and develop inference attacks, under different observed side information, that deem effective in identifying the users. We perform comprehensive experimental analysis based on real datasets for taxi cabs and buses. The evaluation results show that co-location information can be used to significantly improve the accuracy of the identity inference attack.
引用
收藏
页码:19 / 27
页数:9
相关论文
共 50 条
  • [1] Co-location, co-location, co-location
    Watkins, Peter
    Structural Engineer, 2020, 98 (11): : 59 - 61
  • [2] Quantifying the Effect of Co-location Information on Location Privacy
    Olteanu, Alexandra-Mihaela
    Huguenin, Kevin
    Shokri, Reza
    Hubaux, Jean-Pierre
    PRIVACY ENHANCING TECHNOLOGIES, PETS 2014, 2014, 8555 : 184 - 203
  • [3] Leveraging Bluetooth co-location traces in group discovery algorithms
    Boston, Daniel
    Mardenfeld, Steve
    Pan, Juan
    Jones, Quentin
    Iamnitchi, Adriana
    Borcea, Cristian
    PERVASIVE AND MOBILE COMPUTING, 2014, 11 : 88 - 105
  • [4] Co-location and separability
    Biro, John
    PHILOSOPHICAL INQUIRIES, 2016, 4 (02): : 29 - 36
  • [5] CO-LOCATION IS CONSTITUTIONAL
    Yap, Po Jen
    Jiang Zixin
    HONG KONG LAW JOURNAL, 2018, 48 : 37 - 50
  • [6] Innovation and Co-location
    Das, Satyasiba
    Finne, Hakon
    SPATIAL ECONOMIC ANALYSIS, 2008, 3 (02) : 159 - 194
  • [7] The Effect of Industry Co-Location on Analysts' Information Acquisition Costs
    Jennings, Jared
    Lee, Joshua
    Matsumoto, Dawn A.
    ACCOUNTING REVIEW, 2017, 92 (06): : 103 - 127
  • [8] Discovering Prevalent Co-location Patterns Without Collecting Co-location Instances
    Vanha Tran
    Caodai Pham
    Thanhcong Do
    Hoangnam Pham
    INTELLIGENT INFORMATION AND DATABASE SYSTEMS, ACIIDS 2023, PT I, 2023, 13995 : 408 - 420
  • [9] Co-location Detection on the Cloud
    Inci, Mehmet Sinan
    Gulmezoglu, Berk
    Eisenbarth, Thomas
    Sunar, Berk
    CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN, COSADE 2016, 2016, 9689 : 19 - 34
  • [10] Virtual co-location: As if being there?
    Lukosch, Stephan G.
    2014 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS (PERCOM WORKSHOPS), 2014, : 531 - 531