Quantifying Location Privacy: The Case of Sporadic Location Exposure

被引:0
|
作者
Shokri, Reza [1 ]
Theodorakopoulos, George [1 ]
Danezis, George [2 ]
Hubaux, Jean-Pierre [1 ]
Le Boudec, Jean-Yves [1 ]
机构
[1] Ecole Polytech Fed Lausanne, LCA, CH-1015 Lausanne, Switzerland
[2] Microsoft Res, Cambridge, England
来源
关键词
ANONYMITY;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Mobile users expose their location to potentially untrusted entities by using location-based services. Based on the frequency of location exposure in these applications, we divide them into two main types: Continuous and Sporadic. These two location exposure types lead to different threats. For example, in the continuous case, the adversary can track users over time and space, whereas in the sporadic case, his focus is more on localizing users at certain points in time. We propose a systematic way to quantify users' location privacy by modeling both the location-based applications and the location-privacy preserving mechanisms (LPPMs), and by considering a well-defined adversary model. This framework enables us to customize the LPPMs to the employed location-based application, in order to provide higher location privacy for the users. In this paper, we formalize localization attacks for the case of sporadic location exposure, using Bayesian inference for Hidden Markov Processes. We also quantify user location privacy with respect to the adversaries with two different forms of background knowledge: Those who only know the geographical distribution of users over the considered regions, and those who also know how users move between the regions (i.e., their mobility pattern). Using the Location-Privacy Meter tool, we examine the effectiveness of the following techniques in increasing the expected error of the adversary in the localization attack: Location obfuscation and fake location injection mechanisms for anonymous traces.
引用
收藏
页码:57 / +
页数:4
相关论文
共 50 条
  • [1] Quantifying Location Privacy
    Shokri, Reza
    Theodorakopoulos, George
    Le Boudec, Jean-Yves
    Hubaux, Jean-Pierre
    [J]. 2011 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2011), 2011, : 247 - 262
  • [2] Quantifying and protecting location privacy
    Shokri, Reza
    [J]. IT-INFORMATION TECHNOLOGY, 2015, 57 (04): : 257 - 263
  • [3] Quantifying the Effect of Co-location Information on Location Privacy
    Olteanu, Alexandra-Mihaela
    Huguenin, Kevin
    Shokri, Reza
    Hubaux, Jean-Pierre
    [J]. PRIVACY ENHANCING TECHNOLOGIES, PETS 2014, 2014, 8555 : 184 - 203
  • [4] Co-location and Air Pollution Exposure: Case Studies on the Usefulness of Location Privacy
    Fan, Liyue
    Marinak, Julius
    Bang, Ashley
    [J]. PROCEEDINGS OF THE 6TH ACM SIGSPATIAL INTERNATIONAL WORKSHOP ON LOCATION-BASED RECOMMENDATIONS, GEOSOCIAL NETWORKS AND GEOADVERTISING, LOCALREC 2022, 2022, : 31 - 36
  • [5] Process Calculus for Modeling and Quantifying Location Privacy
    Ding, Jingquan
    Li, Xiao
    Guo, Yunchuan
    Yin, Lihua
    Zhang, Huibing
    [J]. 2018 INTERNATIONAL CONFERENCE ON IDENTIFICATION, INFORMATION AND KNOWLEDGE IN THE INTERNET OF THINGS, 2019, 147 : 407 - 415
  • [6] δ-calculus: A new approach to quantifying location privacy
    Yin L.
    Li R.
    Ding J.
    Li X.
    Guo Y.
    Zhang H.
    Li A.
    [J]. Computers, Materials and Continua, 2020, 63 (03): : 1323 - 1342
  • [7] δ-Calculus: A New Approach to Quantifying Location Privacy
    Yin, Lihua
    Li, Ran
    Ding, Jingquan
    Li, Xiao
    Guo, Yunchuan
    Zhang, Huibing
    Li, Ang
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2020, 63 (03): : 1323 - 1342
  • [8] Quantifying Interdependent Privacy Risks with Location Data
    Olteanu, Alexandra-Mihaela
    Huguenin, Kevin
    Shokri, Reza
    Humbert, Mathias
    Hubaux, Jean-Pierre
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2017, 16 (03) : 829 - 842
  • [9] Quantifying Location Privacy Risks Under Heterogeneous Correlations
    Li, Bing
    Zhu, Hong
    Xie, Meiyi
    [J]. IEEE ACCESS, 2021, 9 : 23876 - 23893
  • [10] Quantifying Location Privacy Leakage from Transaction Prices
    Gervais, Arthur
    Ritzdorf, Hubert
    Lucic, Mario
    Lenders, Vincent
    Capkun, Srdjan
    [J]. COMPUTER SECURITY - ESORICS 2016, PT II, 2016, 9879 : 382 - 405