skip to main content
10.1145/2665943.2665946acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Prolonging the Hide-and-Seek Game: Optimal Trajectory Privacy for Location-Based Services

Published: 03 November 2014 Publication History

Abstract

Human mobility is highly predictable. Individuals tend to only visit a few locations with high frequency, and to move among them in a certain sequence reflecting their habits and daily routine. This predictability has to be taken into account in the design of location privacy preserving mechanisms (LPPMs) in order to effectively protect users when they expose their whereabouts to location-based services (LBSs) continuously. In this paper, we describe a method for creating LPPMs tailored to a user's mobility profile taking into her account privacy and quality of service requirements. By construction, our LPPMs take into account the sequential correlation across the user's exposed locations, providing the maximum possible trajectory privacy, i.e., privacy for the user's past, present location, and expected future locations. Moreover, our LPPMs are optimal against a strategic adversary, i.e., an attacker that implements the strongest inference attack knowing both the LPPM operation and the user's mobility profile.
The optimality of the LPPMs in the context of trajectory privacy is a novel contribution, and it is achieved by formulating the LPPM design problem as a Bayesian Stackelberg game between the user and the adversary. An additional benefit of our formal approach is that the design parameters of the LPPM are chosen by the optimization algorithm.

References

[1]
O. Abul, F. Bonchi, and M. Nanni. Never walk alone: Uncertainty for anonymity in moving objects databases. In 24th International Conference on Data Engineering (ICDE 2008), pages 376--385. IEEE, 2008.
[2]
M. E. Andrés, N. E. Bordenabe, K. Chatzikokolakis, and C. Palamidessi. Geo-indistinguishability: Differential privacy for location-based systems. In ACM Conference on Computer and Communications Security (CCS'13), pages 901--914. ACM, 2013.
[3]
C. A. Ardagna, G. Livraga, and P. Samarati. Protecting privacy of user information in continuous location-based services. In 15th International Conference on Computational Science and Engineering (CSE), pages 162--169. IEEE, 2012.
[4]
A. R. Beresford and F. Stajano. Location privacy in pervasive computing. IEEE Pervasive Computing, 2(1):46--55, 2003.
[5]
N. E. Bordenabe, K. Chatzikokolakis, and C. Palamidessi. Optimal geo-indistinguishable mechanisms for location privacy. arXiv preprint arXiv:1402.5029, 2014.
[6]
K. Chatzikokolakis, C. Palamidessi, and M. Stronati. A predictive differentially-private mechanism for mobility traces. In Privacy Enhancing Technologies, pages 21--41. Springer International Publishing, 2014.
[7]
R. Cheng, Y. Zhang, E. Bertino, and S. Prabhakar. Preserving user location privacy in mobile data management infrastructures. In 6th International Workshop on Privacy Enhancing Technologies (PET 2006), pages 393--412, 2006.
[8]
C.-Y. Chow and M. F. Mokbel. Trajectory privacy in location-based services and data publication. SIGKDD Explorations Newsletter, 13(1):19--29, June 2011.
[9]
M. L. Damiani, E. Bertino, and C. Silvestri. The PROBE framework for the personalized cloaking of private locations. Transactions on Data Privacy, 3(2):123--148, 2010.
[10]
J. Freudiger, R. Shokri, and J.-P. Hubaux. On the optimal placement of mix zones. In PETS '09: Proceedings of the 9th International Symposium on Privacy Enhancing Technologies, pages 216--234, 2009.
[11]
S. Gao, J. Ma, W. Shi, G. Zhan, and C. Sun. TrPF: A trajectory privacy-preserving framework for participatory sensing. IEEE Transactions on Information Forensics and Security, 8(6):874--887, June 2013.
[12]
G. Ghinita, M. L. Damiani, C. Silvestri, and E. Bertino. Preventing velocity-based linkage attacks in location-aware applications. In 17th ACM SIGSPATIAL International Symposium on Advances in Geographic Information Systems (ACM-GIS 2009), pages 246--255. ACM, 2009.
[13]
G. Gidófalvi, X. Huang, and T. B. Pedersen. Privacy-preserving data mining on moving object trajectories. In 8th International Conference on Mobile Data Management (MDM 2007), pages 60--68. IEEE, 2007.
[14]
B. Hoh, M. Gruteser, H. Xiong, and A. Alrabady. Achieving guaranteed anonymity in gps traces via uncertainty-aware path cloaking. IEEE Transactions in Mobile Computing, 9(8):1089--1107, 2010.
[15]
L. Huang, H. Yamane, K. Matsuura, and K. Sezaki. Silent cascade: Enhancing location privacy without communication QoS degradation. In Security of Pervasive Computing (SPC), pages 165--180, 2006.
[16]
M. E. Nergiz, M. Atzori, Y. Saygin, and B. Güç. Towards trajectory anonymization: a generalization-based approach. Transactions on Data Privacy, 2(1):47--75, 2009.
[17]
X. Pan, X. Meng, and J. Xu. Distortion-based anonymity for continuous queries in location-based mobile services. In 17th ACM SIGSPATIAL International Symposium on Advances in Geographic Information Systems (ACM-GIS 2009), pages 256--265, 2009.
[18]
M. Piorkowski, N. Sarafijanovic-Djukic, and M. Grossglauser. CRAWDAD data set epfl/mobility (v. 2009-02-24).
[19]
L. R. Rabiner. A tutorial on hidden Markov models and selected applications in speech recognition. Proceedings of the IEEE, 77(2):257--286, 1989.
[20]
R. Shokri. Optimal user-centric data obfuscation. arXiv preprint arXiv:1402.3426, 2014.
[21]
R. Shokri, G. Theodorakopoulos, G. Danezis, J.-P. Hubaux, and J.-Y. Le Boudec. Quantifying location privacy: the case of sporadic location exposure. In Proceedings of the 11th international conference on Privacy enhancing technologies (PETS'11), pages 57--76, 2011.
[22]
R. Shokri, G. Theodorakopoulos, C. Troncoso, J.-P. Hubaux, and J.-Y. Le Boudec. Protecting location privacy: optimal strategy against localization attacks. In ACM Conference on Computer and Communications Security (CCS'12), pages 617--627, 2012.
[23]
M. Terrovitis and N. Mamoulis. Privacy preservation in the publication of trajectories. In 9th International Conference on Mobile Data Management (MDM '08), pages 65--72. IEEE, 2008.
[24]
G. Theodorakopoulos, R. Shokri, C. Troncoso, J.-P. Hubaux, and J.-Y. Le Boudec. Prolonging the hide-and-seek game: Optimal trajectory privacy for location-based services. arXiv preprint arXiv:1409.1716, 2014.
[25]
R. J. Vanderbei. Linear programming, volume 114. Springer, 2008.
[26]
T.-H. You, W.-C. Peng, and W.-C. Lee. Protecting moving trajectories with dummies. In 8th International Conference on Mobile Data Management (MDM '07), pages 278--282, May 2007.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
WPES '14: Proceedings of the 13th Workshop on Privacy in the Electronic Society
November 2014
218 pages
ISBN:9781450331487
DOI:10.1145/2665943
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 03 November 2014

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. bayesian stackelberg game
  2. location privacy
  3. location transition privacy
  4. optimal location obfuscation
  5. privacy-utility tradeoff
  6. trajectory privacy

Qualifiers

  • Research-article

Funding Sources

Conference

CCS'14
Sponsor:

Upcoming Conference

CCS '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)14
  • Downloads (Last 6 weeks)1
Reflects downloads up to 01 Jan 2025

Other Metrics

Citations

Cited By

View all

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media