Understanding Vulnerabilities of Location Privacy Mechanisms against Mobility Prediction Attacks

被引:4
|
作者
Riaz, Zohaib [1 ]
Duerr, Frank [1 ]
Rothermel, Kurt [1 ]
机构
[1] Univ Stuttgart, Inst Parallel & Distributed Syst, Stuttgart, Germany
关键词
location privacy; attack algorithms; semantic location information; usability prediction; hidden Markov models; MODEL;
D O I
10.1145/3144457.3144505
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In today's online social networks such as Facebook, users increasingly share their location information as a popular type of personal information. However, since location data can leak privacy-sensitive information about individuals such as the type of places they like to visit, a number of location obfuscation mechanisms have been proposed to avoid such disclosure. These mechanisms publish bigger regions containing the actual user location in order to make it imprecise. Thus an attacker may find it hard to precisely locate the user in a privacy-sensitive place such as a hospital. In this paper, we show that state-of-the-art location obfuscation mechanisms do not provide privacy guarantees against attacks based on mobility prediction. In this regard, we design and demonstrate a mobility predictions attack that exploits location history information of users and show its effectiveness on a year-long real-world location dataset. In particular, our results show that such an attack can successfully de-obfuscate up to 50% of sensitive user visits with high precision (>= 80%), even when the location history data used for the attack is already obfuscated. We also analyze the success of our mobility prediction attacks and suggest important design improvements for future location privacy mechanisms.
引用
收藏
页码:252 / 261
页数:10
相关论文
共 50 条
  • [21] A Survey on Privacy: Terminology, Mechanisms and Attacks
    Boussada, Rihab
    Elhdhili, Mohamed Elhoucine
    Saidane, Leila Azouz
    2016 IEEE/ACS 13TH INTERNATIONAL CONFERENCE OF COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2016,
  • [22] Privacy against Aggregate Knowledge Attacks
    Gkountouna, Olga
    Lepenioti, Katerina
    Terrovitis, Manolis
    2013 IEEE 29TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING WORKSHOPS (ICDEW), 2013, : 99 - 103
  • [23] RobLoP: Towards Robust Privacy Preserving Against Location Dependent Attacks in Continuous LBS Queries
    Jiang, Hongbo
    Zhao, Ping
    Wang, Chen
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2018, 26 (02) : 1018 - 1032
  • [24] Vulnerabilities and possible attacks against the GPRS backbone network
    Xenakis, Christos
    Merakos, Lazaros
    CRITICAL INFORMATION INFRASTRUCTURES SECURITY, 2006, 4347 : 262 - +
  • [25] TrafficAdaptor: An Adaptive Obfuscation Strategy for Vehicle Location Privacy Against Traffic Flow Aware Attacks
    Qiu, Chenxi
    Yan, Li
    Squicciarini, Anna
    Zhao, Juanjuan
    Xu, Chengzhong
    Pappachan, Primal
    30TH ACM SIGSPATIAL INTERNATIONAL CONFERENCE ON ADVANCES IN GEOGRAPHIC INFORMATION SYSTEMS, ACM SIGSPATIAL GIS 2022, 2022, : 27 - 36
  • [26] Preserving receiver-location privacy against traffic analysis attacks in wireless sensor networks
    Zhou, L. (zhouliming1985@gmail.com), 1600, Binary Information Press, P.O. Box 162, Bethel, CT 06801-0162, United States (09):
  • [27] Protecting Locations with Differential Privacy against Location-Dependent Attacks in Continuous LBS Queries
    Wen, Ruxue
    Zhang, Rui
    Peng, Kai
    Wang, Chen
    2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021), 2021, : 379 - 386
  • [28] Location-Privacy-Aware Service Migration Against Inference Attacks in Multiuser MEC Systems
    Wang, Weixu
    Zhou, Xiaobo
    Qiu, Tie
    He, Xin
    Ge, Shuxin
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (01) : 1413 - 1426
  • [29] Privacy-Preserving Location-Based Services Query Scheme Against Quantum Attacks
    Hu, Ziyuan
    Liu, Shengli
    Chen, Kefei
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (05) : 972 - 983
  • [30] Short paper: Location privacy with IP mobility
    Koodli, R
    Devarapalli, V
    Flinck, H
    Perkins, CE
    First International Conference on Security and Privacy for Emerging Areas in Communications Networks, Proceedings, 2005, : 222 - 224