skip to main content
10.1145/2660460.2660485acmconferencesArticle/Chapter ViewAbstractPublication PagescosnConference Proceedingsconference-collections
research-article

It's the way you check-in: identifying users in location-based social networks

Published: 01 October 2014 Publication History

Abstract

In recent years, the rapid spread of smartphones has led to the increasing popularity of Location-Based Social Networks (LBSNs). Although a number of research studies and articles in the press have shown the dangers of exposing personal location data, the inherent nature of LBSNs encourages users to publish information about their current location (i.e., their check-ins). The same is true for the majority of the most popular social networking websites, which offer the possibility of associating the current location of users to their posts and photos. Moreover, some LBSNs, such as Foursquare, let users tag their friends in their check-ins, thus potentially releasing location information of individuals that have no control over the published data. This raises additional privacy concerns for the management of location information in LBSNs.
In this paper we propose and evaluate a series of techniques for the identification of users from their check-in data. More specifically, we first present two strategies according to which users are characterized by the spatio-temporal trajectory emerging from their check-ins over time and the frequency of visit to specific locations, respectively. In addition to these approaches, we also propose a hybrid strategy that is able to exploit both types of information. It is worth noting that these techniques can be applied to a more general class of problems where locations and social links of individuals are available in a given dataset. We evaluate our techniques by means of three real-world LBSNs datasets, demonstrating that a very limited amount of data points is sufficient to identify a user with a high degree of accuracy. For instance, we show that in some datasets we are able to classify more than 80% of the users correctly.

References

[1]
D. Ashbrook and T. Starner. Using GPS to Learn Significant Locations and Predict Movement Across Multiple Users. Personal and Ubiquitous Computing, 7(5):275--286, 2003.
[2]
A. R. Beresford and F. Stajano. Location privacy in pervasive computing. IEEE Pervasive Computing, 2(1):46--55, 2003.
[3]
D. J. Berndt and J. Clifford. Using dynamic time warping to find patterns in time series. In Proceedings of the AAAI-94 Workshop on Knowledge Discovery in Databases, volume 10, pages 359--370. Seattle, WA, 1994.
[4]
C. Bettini, X. S. Wang, and S. Jajodia. Protecting privacy against location-based personal identification. In Secure Data Management, pages 185--199. Springer, 2005.
[5]
J. Bohn, V. Coroam\ua, M. Langheinrich, F. Mattern, and M. Rohs. Social, economic, and ethical implications of ambient intelligence and ubiquitous computing. In Ambient Intelligence, pages 5--29. Springer, 2005.
[6]
E. Cho, S. A. Myers, and J. Leskovec. Friendship and mobility: User movement in location-based social networks. In Proceedings of SIGKDD'11, pages 1082--1090. ACM, 2011.
[7]
C.-Y. Chow and M. F. Mokbel. Trajectory privacy in location-based services and data publication. ACM SIGKDD Explorations Newsletter, 13(1):19--29, 2011.
[8]
T. M. Cover and J. A. Thomas. Elements of information theory. John Wiley & Sons, 2012.
[9]
Y.-A. de Montjoye, C. A. Hidalgo, M. Verleysen, and V. D. Blondel. Unique in the crowd: The privacy bounds of human mobility. Scientific Reports, 3, 2013.
[10]
M.-P. Dubuisson and A. K. Jain. A Modified Hausdorff Distance for Object Matching. In Proceedings of ICPR'94, pages 566--568, 1994.
[11]
C. Dwork. Differential privacy: A survey of results. In Theory and Applications of Models of Computation, pages 1--19. Springer, 2008.
[12]
T. Eiter and H. Mannila. Computing Discrete Fréchet Distance. Technical report, Technische Universitat Wien, 1994.
[13]
H. Gao, J. Tang, and H. Liu. Exploring social-historical ties on location-based social networks. In Proceedings of ICWSM'12, 2012.
[14]
H. Gao, J. Tang, and H. Liu. gSCorr: modeling geo-social correlations for new check-ins on location-based social networks. In Proceedings of CIKM'12, pages 1582--1586. ACM, 2012.
[15]
J. F. Gómez-Lopera, J. Martínez-Aroza, A. M. Robles-Pérez, and R. Román-Roldán. An analysis of edge detection by using the jensen-shannon divergence. Journal of Mathematical Imaging and Vision, 13(1):35--56, 2000.
[16]
M. C. Gonzalez, C. A. Hidalgo, and A.-L. Barabasi. Understanding individual human mobility patterns. Nature, 453(7196):779--782, 2008.
[17]
M. Gruteser and D. Grunwald. Anonymous usage of location-based services through spatial and temporal cloaking. In Proceedings of MobiSys'03, pages 31--42. ACM, 2003.
[18]
K. Joseph, C. H. Tan, and K. M. Carley. Beyond Local, Categories and Friends: Clustering Foursquare Users with Latent Topics. In Proceedings of UbiComp'12, pages 919--926. ACM, 2012.
[19]
P. Kalnis, G. Ghinita, K. Mouratidis, and D. Papadias. Preventing location-based identity inference in anonymous spatial queries. IEEE Transactions on Knowledge and Data Engineering, 19(12):1719--1733, 2007.
[20]
J. Krumm. A survey of computational location privacy. Personal and Ubiquitous Computing, 13(6):391--399, 2009.
[21]
J. Lin. Divergence Measures based on the Shannon Entropy. IEEE Transactions on Information Theory, 37(1):145--151, 1991.
[22]
C. Y. T. Ma, D. K. Y. Yau, N. K. Yip, and N. S. Rao. Privacy vulnerability of published anonymous mobility traces. IEEE/ACM Transactions on Networking, 21(3):720--733, 2013.
[23]
E. Malmi, T. M. T. Do, and D. Gatica-Perez. From Foursquare to My Square: Learning Check-in Behavior from Multiple Sources. In Proceedings of ICWSM'13, 2013.
[24]
C. D. Manning, P. Raghavan, and H. Schütze. Introduction to Information Retrieval. Cambridge University Press, 2008.
[25]
A. McCallum and K. Nigam. A comparison of event models for naive bayes text classification. In Proceeding of the AAAI-98 Workshop on Learning for Text Categorization, volume 752, pages 41--48, 1998.
[26]
A. Narayanan and V. Shmatikov. Robust de-anonymization of large sparse datasets. In Proceedings of SP'08, pages 111--125. IEEE, 2008.
[27]
A. Noulas, S. Scellato, R. Lambiotte, M. Pontil, and C. Mascolo. A tale of many cities: Universal patterns in human urban mobility. PLOS ONE, 7(5):e37027, 2012.
[28]
T. Pontes, G. Magno, M. Vasconcelos, A. Gupta, J. Almeida, P. Kumaraguru, and V. Almeida. Beware of what you share: Inferring home location in social networks. In Proceedings of ICDM'12 Workshops, pages 571--578. IEEE, 2012.
[29]
T. Pontes, M. Vasconcelos, J. Almeida, P. Kumaraguru, and V. Almeida. We Know Where you Live: Privacy Characterization of Foursquare Behavior. In Proceedings of UbiComp'12, pages 898--905. ACM, 2012.
[30]
C. C. Robusto. The Cosine-Haversine formula. The American Mathematical Monthly, 64(1):38--40, 1957.
[31]
C. Ruiz Vicente, D. Freni, C. Bettini, and C. S. Jensen. Location-related privacy in geo-social networks. IEEE Internet Computing, 15(3):20--27, 2011.
[32]
J.-R. Sack and J. Urrutia. Handbook of Computational Geometry. North Holland, 1999.
[33]
L. Sweeney. k-anonymity: A model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 10(05):557--570, 2002.
[34]
M. A. Vasconcelos, S. Ricci, J. Almeida, F. Benevenuto, and V. Almeida. Tips, Dones and Todos: Uncovering User Profiles in Foursquare. In Proceedings of WSDM'12, pages 653--662. ACM, 2012.
[35]
Y. Zheng, Q. Li, Y. Chen, X. Xie, and W.-Y. Ma. Understanding Mobility based on GPS Data. In Proceedings of UbiComp'08, pages 312--321. ACM, 2008.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
COSN '14: Proceedings of the second ACM conference on Online social networks
October 2014
288 pages
ISBN:9781450331982
DOI:10.1145/2660460
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 October 2014

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. location-based social networks
  2. privacy
  3. user identification

Qualifiers

  • Research-article

Funding Sources

Conference

COSN'14
Sponsor:
COSN'14: Conference on Online Social Networks
October 1 - 2, 2014
Dublin, Ireland

Acceptance Rates

COSN '14 Paper Acceptance Rate 25 of 87 submissions, 29%;
Overall Acceptance Rate 69 of 307 submissions, 22%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)32
  • Downloads (Last 6 weeks)1
Reflects downloads up to 01 Jan 2025

Other Metrics

Citations

Cited By

View all

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media