Agility maneuvers to mitigate inference attacks on sensed location data

作者: Giuseppe Petracca , Lisa M. Marvel , Ananthram Swami , Trent Jaeger

DOI: 10.1109/MILCOM.2016.7795336

关键词: Real-time computingEngineeringData setLocation dataProtection mechanismAdversaryGraphical modelInferenceComputer securityGlobal Positioning SystemMobile telephony

摘要: Sensed location data is subject to inference attacks by cybercriminals that aim obtain the exact position of sensitive locations, such as victim's home and work launch a variety different attacks. Various Location-Privacy Preserving Mechanisms (LPPMs) exist reduce probability success on data. However, mechanisms have been shown be less effective when adversary informed protection mechanism adopted, also known white-box We propose novel approach makes use targeted agility maneuvers more robust defense against Agility are systematically activated in response specific system events rapidly continuously control rate change configurations increase diversity space readings, which would decrease an adversary. Experimental results, performed real set, show adoption reduces 2.68% average, compared 56.92% using state-of-the-art LPPMs.

参考文章(8)
S. Arunkumar, M. Srivatsa, M. Rajarajan, A review paper on preserving privacy in mobile environments Journal of Network and Computer Applications. ,vol. 53, pp. 74- 90 ,(2015) , 10.1016/J.JNCA.2015.01.008
George Theodorakopoulos, The Same-Origin Attack against Location Privacy workshop on privacy in the electronic society. pp. 49- 53 ,(2015) , 10.1145/2808138.2808150
Saritha Arunkumar, Mudhakar Srivatsa, Muttukrishnan Rajarajan, Location Security -- Where to Enforce? military communications conference. pp. 1651- 1656 ,(2014) , 10.1109/MILCOM.2014.271
Reza Shokri, George Theodorakopoulos, Carmela Troncoso, Jean-Pierre Hubaux, Jean-Yves Le Boudec, Protecting location privacy Proceedings of the 2012 ACM conference on Computer and communications security - CCS '12. pp. 617- 627 ,(2012) , 10.1145/2382196.2382261
Miguel E. Andrés, Nicolás E. Bordenabe, Konstantinos Chatzikokolakis, Catuscia Palamidessi, Geo-indistinguishability: differential privacy for location-based systems computer and communications security. pp. 901- 914 ,(2013) , 10.1145/2508859.2516735
Reza Shokri, George Theodorakopoulos, Jean-Yves Le Boudec, Jean-Pierre Hubaux, Quantifying Location Privacy ieee symposium on security and privacy. pp. 247- 262 ,(2011) , 10.1109/SP.2011.18
John Krumm, Inference Attacks on Location Tracks Lecture Notes in Computer Science. pp. 127- 143 ,(2007) , 10.1007/978-3-540-72037-9_8
Li Xiong, Yonghui Xiao, Protecting Locations with Differential Privacy under Temporal Correlations computer and communications security. pp. 1298- 1309 ,(2015) , 10.1145/2810103.2813640