9,207 research outputs found
When and where do you want to hide? Recommendation of location privacy preferences with local differential privacy
In recent years, it has become easy to obtain location information quite
precisely. However, the acquisition of such information has risks such as
individual identification and leakage of sensitive information, so it is
necessary to protect the privacy of location information. For this purpose,
people should know their location privacy preferences, that is, whether or not
he/she can release location information at each place and time. However, it is
not easy for each user to make such decisions and it is troublesome to set the
privacy preference at each time. Therefore, we propose a method to recommend
location privacy preferences for decision making. Comparing to existing method,
our method can improve the accuracy of recommendation by using matrix
factorization and preserve privacy strictly by local differential privacy,
whereas the existing method does not achieve formal privacy guarantee. In
addition, we found the best granularity of a location privacy preference, that
is, how to express the information in location privacy protection. To evaluate
and verify the utility of our method, we have integrated two existing datasets
to create a rich information in term of user number. From the results of the
evaluation using this dataset, we confirmed that our method can predict
location privacy preferences accurately and that it provides a suitable method
to define the location privacy preference
SoK: differentially private publication of trajectory data
Trajectory analysis holds many promises, from improvements in traffic management to routing advice or infrastructure development. However, learning usersâ paths is extremely privacy-invasive. Therefore, there is a necessity to protect trajectories such that we preserve the global properties, useful for analysis, while specific and private information of individuals remains inaccessible. Trajectories, however, are difficult to protect, since they are sequential, highly dimensional, correlated, bound to geophysical restrictions, and easily mapped to semantic points of interest. This paper aims to establish a systematic framework on protective masking measures for trajectory databases with differentially private (DP) guarantees, including also utility properties, derived from ideas and limitations of existing proposals. To reach this goal, we systematize the utility metrics used throughout the literature, deeply analyze the DP granularity notions, explore and elaborate on the state of the art on privacy-enhancing mechanisms and their problems, and expose the main limitations of DP notions in the context of trajectories.We would like to thank the reviewers and shepherd for their useful comments and suggestions in the improvement of this paper. Javier Parra-Arnau is the recipient of a âRamĂłn y Cajalâ fellowship funded by the Spanish Ministry of Science and Innovation. This work also received support from âla Caixaâ Foundation (fellowship code LCF/BQ/PR20/11770009), the European Unionâs H2020 program (Marie SkĆodowska-Curie grant agreement â 847648) from the Government of Spain under the project âCOMPROMISEâ (PID2020-113795RB-C31/AEI/10.13039/501100011033), and from the BMBF project âPROPOLISâ (16KIS1393K). The authors at KIT are supported by KASTEL Security Research Labs (Topic 46.23 of the Helmholtz Association) and Germanyâs Excellence Strategy (EXC 2050/1 âCeTIâ; ID 390696704).Peer ReviewedPostprint (published version
SoK: Differentially Private Publication of Trajectory Data
Trajectory analysis holds many promises, from improvements in traffic management to routing advice or infrastructure development. However, learning users\u27 paths is extremely privacy-invasive. Therefore, there is a necessity to protect trajectories such that we preserve the global properties, useful for analysis, while specific and private information of individuals remains inaccessible. Trajectories, however, are difficult to protect, since they are sequential, highly dimensional, correlated, bound to geophysical restrictions, and easily mapped to semantic points of interest.
This paper aims to establish a systematic framework on protective masking and synthetic-generation measures for trajectory databases with syntactic and differentially private (DP) guarantees, including also utility properties, derived from ideas and limitations of existing proposals. To reach this goal, we systematize the utility metrics used throughout the literature, deeply analyze the DP granularity notions, explore and elaborate on the state of the art on privacy-enhancing mechanisms and their problems, and expose the main limitations of DP notions in the context of trajectories
ItsBlue: A Distributed Bluetooth-Based Framework for Intelligent Transportation Systems
Inefficiency in transportation networks is having an expanding impact, at a variety of levels. Transportation authorities expect increases in delay hours and in fuel consumption and, consequently, the total cost of congestion. Nowadays, Intelligent Transportation Systems (ITS) have become a necessity in order to alleviate the expensive consequences of the rapid demand on transportation networks. Since the middle of last century, ITS have played a significant role in road safety and comfort enhancements. However, the majority of state of the art ITS are suffering from several drawbacks, among them high deployment costs and complexity of maintenance.
Over the last decade, wireless technologies have reached a wide range of daily users. Today\u27s Mobile devices and vehicles are now heavily equipped with wireless communication technologies. Bluetooth is one of the most widely spread wireless technologies in current use. Bluetooth technology has been well studied and is broadly employed to address a variety of challenges due to its cost-effectiveness, data richness, and privacy perverseness, yet Bluetooth utilization in ITS is limited to certain applications. However, Bluetooth technology has a potential far beyond today\u27s ITS applications.
In this dissertation, we introduce itsBlue, a novel Bluetooth-based framework that can be used to provide ITS researchers and engineers with desired information. In the itsBlue framework, we utilize Bluetooth technology advantages to collect road user data from unmodified Bluetooth devices, and we extract a variety of traffic statistics and information to satisfy ITS application requirements in an efficient and cost-effective way.
The itsBlue framework consists of data collection units and a central computing unit. The itsBlue data collection unit features a compact design that allows for stationary or mobile deployment in order to extend the data collection area. Central computing units aggregate obtained road user data and extract a number of Bluetooth spatial and temporal features. Road usersâ Bluetooth features are utilized in a novel way to determine traffic-related information, such as road user context, appearance time, vehicle location and direction, etc. Extracted information is provided to ITS applications to generate the desired transportation services. Applying such a passive approach involves addressing several challenges, like discovering on-board devices, filtering out data received from vehicles out of the target location, or revealing vehicle status and direction.
Traffic information provided by the itsBlue framework opens a wide to the development of a wide range of ITS applications. Hence, on top of the itsBlue framework, we develop a pack of intersection management applications that includes pedestriansâ volume and waiting times, as well as vehicle queue lengths and waiting times. Also, we develop a vehicle trajectory reconstruction application.
The itsBlue framework and applications are thoroughly evaluated by experiments and simulations. In order to evaluate our work, we develop an enhanced version of the UCBT Network Simulator 2 (NS-2). According to evaluation outcomes, itsBlue framework and applications evaluations show promising results. For instance, the evaluation results show that the itsBlue framework has the ability to reveal road user context with accuracy exceeding 95% in 25s
Trajectory Privacy Preservation and Lightweight Blockchain Techniques for Mobility-Centric IoT
Various research efforts have been undertaken to solve the problem of trajectory privacy preservation in the Internet of Things (IoT) of resource-constrained mobile devices. Most attempts at resolving the problem have focused on the centralized model of IoT, which either impose high delay or fail against a privacy-invading attack with long-term trajectory observation. These proposed solutions also fail to guarantee location privacy for trajectories with both geo-tagged and non-geo-tagged data, since they are designed for geo-tagged trajectories only. While a few blockchain-based techniques have been suggested for preserving trajectory privacy in decentralized model of IoT, they require large storage capacity on resource-constrained devices and can only provide conditional privacy when a set of authorities governs the blockchain. This dissertation addresses these challenges to develop efficient trajectory privacy-preservation and lightweight blockchain techniques for mobility-centric IoT.
We develop a pruning-based technique by quantifying the relationship between trajectory privacy and delay for real-time geo-tagged queries. This technique yields higher trajectory privacy with a reduced delay than contemporary techniques while preventing a long-term observation attack. We extend our study with the consideration of the presence of non-geo-tagged data in a trajectory. We design an attack model to show the spatiotemporal correlation between the geo-tagged and non-geo-tagged data which undermines the privacy guarantee of existing techniques. In response, we propose a methodology that considers the spatial distribution of the data in trajectory privacy-preservation and improves existing solutions, in privacy and usability.
With respect to blockchain, we design and implement one of the first blockchain storage management techniques utilizing the mobility of the devices. This technique reduces the required storage space of a blockchain and makes it lightweight for resource-constrained mobile devices. To address the trajectory privacy challenges in an authority-based blockchain under the short-range communication constraints of the devices, we introduce a silence-based one of the first technique to establish a balance between trajectory privacy and blockchain utility.
The designed trajectory privacy- preservation techniques we established are light- weight and do not require an intermediary to guarantee trajectory privacy, thereby providing practical and efficient solution for different mobility-centric IoT, such as mobile crowdsensing and Internet of Vehicles
Protecting privacy of semantic trajectory
The growing ubiquity of GPS-enabled devices in everyday life has made large-scale collection of trajectories feasible, providing ever-growing opportunities for human movement analysis. However, publishing this vulnerable data is accompanied by increasing concerns about individualsâ geoprivacy. This thesis has two objectives: (1) propose a privacy protection framework for semantic trajectories and (2) develop a Python toolbox in ArcGIS Pro environment for non-expert users to enable them to anonymize trajectory data. The former aims to prevent usersâ re-identification when knowing the important locations or any random spatiotemporal points of users by swapping their important locations to new locations with the same semantics and unlinking the users from their trajectories. This is accomplished by converting GPS points into sequences of visited meaningful locations and moves and integrating several anonymization techniques. The second component of this thesis implements privacy protection in a way that even users without deep knowledge of anonymization and coding skills can anonymize their data by offering an all-in-one toolbox. By proposing and implementing this framework and toolbox, we hope that trajectory privacy is better protected in research
Privacy-Preserving Trajectory Data Publishing via Differential Privacy
Over the past decade, the collection of data by individuals, businesses and government agencies has increased tremendously. Due to the widespread of mobile computing and the advances in location-acquisition techniques, an immense amount of data concerning the mobility of moving objects have been generated. The movement data of an object (e.g. individual) might include specific information about the locations it visited, the time those locations were visited, or both. While it is beneficial to share data for the purpose of mining and analysis, data sharing might risk the privacy of the individuals involved in the data. Privacy-Preserving Data Publishing (PPDP) provides techniques that utilize several privacy models for the purpose of publishing useful information while preserving data privacy.
The objective of this thesis is to answer the following question: How can a data owner publish trajectory data while simultaneously safeguarding the privacy of the data and maintaining its usefulness? We propose an algorithm for anonymizing and publishing trajectory data that ensures the output is differentially private while maintaining high utility and scalability. Our solution comprises a twofold approach. First, we generalize trajectories by generalizing and then partitioning the timestamps at each location in a differentially private manner. Next, we add noise to the real count of the generalized trajectories according to the given privacy budget to enforce differential privacy. As a result, our approach achieves an overall epsilon-differential privacy on the output trajectory data. We perform experimental evaluation on real-life data, and demonstrate that our proposed approach can effectively answer count and range queries, as well as mining frequent sequential patterns. We also show that our algorithm is efficient w.r.t. privacy budget and number of partitions, and also scalable with increasing data size
- âŠ