Trajectory and Policy Aware Sender Anonymity in Location Based Services

作者: Alin Deutsch , Kevin Keliang Zhao , Richard Hull , Avinash Vyas

DOI:

关键词: Service (business)Location-based serviceMobile deviceNetwork managementInternet privacyAnonymityComputer securityComputer scienceCommunication sourcePublication

摘要: We consider Location-based Service (LBS) settings, where a LBS provider logs the requests sent by mobile device users over period of time and later wants to publish/share these logs. Log sharing can be extremely valuable for advertising, data mining research network management, but it poses serious threat privacy users. Sender anonymity solutions prevent malicious attacker from inferring interests associating them with their service after gaining access anonymized With fast-increasing adoption smartphones concern that historic user trajectories are becoming more accessible, becomes necessary any sender solution protect against attackers trajectory-aware (i.e. have trajectories) as well policy-aware (i.e they know log anonymization policy). call such TP-aware. This paper introduces first guarantee TP-aware attackers, called k-anonymity. It turns out there many possible anonymizations same log, each different utility consumer log. The problem finding optimal is investigated. show trajectory-awareness renders computationally harder than trajectory-unaware variants found in literature (NP-complete size versus PTIME). describe PTIME l-approximation algorithm length l empirically scales large (up 2 million users).

参考文章(20)
Aris Gkoulalas-Divanis, Vassilios S. Verykios, Mohamed F. Mokbel, Identifying Unsafe Routes for Network-Based Trajectory Privacy. siam international conference on data mining. pp. 942- 953 ,(2009)
Paola Bonizzoni, Gianluca Della Vedova, Riccardo Dondi, The k-anonymity problem is hard fundamentals of computation theory. ,vol. 5699, pp. 26- 37 ,(2009) , 10.1007/978-3-642-03409-1_4
Claudio Bettini, X. Sean Wang, Sushil Jajodia, Protecting privacy against location-based personal identification very large data bases. ,vol. 3674, pp. 185- 199 ,(2005) , 10.1007/11552338_13
William Enck, Patrick McDaniel, Jaeyeon Jung, Byung-Gon Chun, Peter Gilbert, Anmol N. Sheth, Landon P. Cox, TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones operating systems design and implementation. pp. 393- 407 ,(2010) , 10.5555/1924943.1924971
Osman Abul, Francesco Bonchi, Mirco Nanni, Never Walk Alone: Uncertainty for Anonymity in Moving Objects Databases 2008 IEEE 24th International Conference on Data Engineering. pp. 376- 385 ,(2008) , 10.1109/ICDE.2008.4497446
Alin Deutsch, Richard Hull, Avinash Vyas, Kevin Keliang Zhao, Policy-aware sender anonymity in location based services 2010 IEEE 26th International Conference on Data Engineering (ICDE 2010). pp. 133- 144 ,(2010) , 10.1109/ICDE.2010.5447823
Toby Xu, Ying Cai, Location anonymity in continuous location-based services advances in geographic information systems. pp. 39- ,(2007) , 10.1145/1341012.1341062
Noman Mohammed, Benjamin C.M. Fung, Mourad Debbabi, Walking in the crowd Proceeding of the 18th ACM conference on Information and knowledge management - CIKM '09. pp. 1441- 1444 ,(2009) , 10.1145/1645953.1646140
Marco Gruteser, Dirk Grunwald, Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking Proceedings of the 1st international conference on Mobile systems, applications and services - MobiSys '03. pp. 31- 42 ,(2003) , 10.1145/1066116.1189037
Walid G. Aref, Mohamed F. Mokbel, Chi-Yin Chow, The new Casper: query processing for location services without compromising privacy very large data bases. pp. 763- 774 ,(2006) , 10.5555/1182635.1164193