Utility-Aware Synthesis of Differentially Private and Attack-Resilient Location Traces

被引:61
|
作者
Gursoy, Mehmet Emre [1 ]
Liu, Ling [1 ]
Truex, Stacey [1 ]
Yu, Lei [1 ]
Wei, Wenqi [1 ]
机构
[1] Georgia Inst Technol, Coll Comp, Atlanta, GA 30332 USA
关键词
data privacy; mobile computing; location privacy;
D O I
10.1145/3243734.3243741
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
As mobile devices and location-based services become increasingly ubiquitous, the privacy of mobile users' location traces continues to be a major concern. Traditional privacy solutions rely on perturbing each position in a user's trace and replacing it with a fake location. However, recent studies have shown that such point-based perturbation of locations is susceptible to inference attacks and suffers from serious utility losses, because it disregards the moving trajectory and continuity in full location traces. In this paper, we argue that privacy-preserving synthesis of complete location traces can be an effective solution to this problem. We present AdaTrace, a scalable location trace synthesizer with three novel features: provable statistical privacy, deterministic attack resilience, and strong utility preservation. AdaTrace builds a generative model from a given set of real traces through a four-phase synthesis process consisting of feature extraction, synopsis learning, privacy and utility preserving noise injection, and generation of differentially private synthetic location traces. The output traces crafted by AdaTrace preserve utility-critical information existing in real traces, and are robust against known location trace attacks. We validate the effectiveness of AdaTrace by comparing it with three state of the art approaches (ngram, DPT, and SGLT) using real location trace datasets (Geolife and Taxi) as well as a simulated dataset of 50,000 vehicles in Oldenburg, Germany. AdaTrace offers up to 3-fold improvement in trajectory utility, and is orders of magnitude faster than previous work, while preserving differential privacy and attack resilience.
引用
收藏
页码:196 / 211
页数:16
相关论文
共 14 条
  • [1] Differentially private and utility-aware publication of trajectory data
    Liu, Qi
    Yu, Juan
    Han, Jianmin
    Yao, Xin
    EXPERT SYSTEMS WITH APPLICATIONS, 2021, 180
  • [2] Differentially private and utility-aware publication of trajectory data
    Liu, Qi
    Yu, Juan
    Han, Jianmin
    Yao, Xin
    Expert Systems with Applications, 2021, 180
  • [3] Utility-Optimized Synthesis of Differentially Private Location Traces
    Gursoy, M. Emre
    Rajasekar, Vivekanand
    Liu, Ling
    2020 SECOND IEEE INTERNATIONAL CONFERENCE ON TRUST, PRIVACY AND SECURITY IN INTELLIGENT SYSTEMS AND APPLICATIONS (TPS-ISA 2020), 2020, : 30 - 39
  • [4] Demo Abstract: Synthesis of Platform-aware Attack-Resilient Vehicular Systems
    Pajic, Miroslav
    Bezzo, Nicola
    Weimer, James
    Sokolsky, Oleg
    Michael, Nathan
    Pappas, George J.
    Tabuada, Paulo
    Lee, Insup
    2013 ACM/IEEE INTERNATIONAL CONFERENCE ON CYBER-PHYSICAL SYSTEMS (ICCPS), 2013, : 251 - 251
  • [5] k-Trustee: Location injection attack-resilient anonymization for location privacy
    Jin, Lei
    Li, Chao
    Palanisamy, Balaji
    Joshi, James
    COMPUTERS & SECURITY, 2018, 78 : 212 - 230
  • [6] Camouflage: Utility-Aware Obfuscation for Accurate Simulation of Sensitive Program Traces
    Pal, Asmita
    Desai, Keerthana
    Chatterjee, Rahul
    Miguel, Joshua San
    ACM TRANSACTIONS ON ARCHITECTURE AND CODE OPTIMIZATION, 2024, 21 (02)
  • [7] Synthesizing differentially private location traces including co-locations
    Jun Narita
    Takao Murakami
    Hideitsu Hino
    Masakatsu Nishigaki
    Tetsushi Ohki
    International Journal of Information Security, 2024, 23 : 389 - 410
  • [8] Synthesizing differentially private location traces including co-locations
    Narita, Jun
    Murakami, Takao
    Hino, Hideitsu
    Nishigaki, Masakatsu
    Ohki, Tetsushi
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2024, 23 (01) : 389 - 410
  • [9] Utility Aware Optimal Data Selection for Differentially Private Federated Learning in IoV
    Zhang J.
    Li S.
    Wang C.
    IEEE Internet of Things Journal, 2024, 11 (20) : 1 - 1
  • [10] KAMINO: Constraint-Aware Differentially Private Data Synthesis
    Ge, Chang
    Mohapatra, Shubhankar
    He, Xi
    Ilyas, Ihab F.
    PROCEEDINGS OF THE VLDB ENDOWMENT, 2021, 14 (10): : 1886 - 1899