Mosaic: Quantifying Privacy Leakage in Mobile Networks

被引:26
|
作者
Xia, Ning [1 ]
Song, Han Hee
Liao, Yong
Iliofotou, Marios
Nucci, Antonio
Zhang, Zhi-Li [2 ]
Kuzmanovic, Aleksandar [1 ]
机构
[1] Northwestern Univ, Evanston, IL 60208 USA
[2] Univ Minnesota, Minneapolis, MN 55455 USA
关键词
privacy; security; mobile network; user profile; online social network;
D O I
10.1145/2534169.2486008
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the proliferation of online social networking (OSN) and mobile devices, preserving user privacy has become a great challenge. While prior studies have directly focused on OSN services, we call attention to the privacy leakage in mobile network data. This concern is motivated by two factors. First, the prevalence of OSN usage leaves identifiable digital footprints that can be traced back to users in the real-world. Second, the association between users and their mobile devices makes it easier to associate traffic to its owners. These pose a serious threat to user privacy as they enable an adversary to attribute significant portions of data traffic including the ones with NO identity leaks to network users' true identities. To demonstrate its feasibility, we develop the Tessellation methodology. By applying Tessellation on traffic from a cellular service provider (CSP), we show that up to 50% of the traffic can be attributed to the names of users. In addition to revealing the user identity, the reconstructed profile, dubbed as "mosaic," associates personal information such as political views, browsing habits, and favorite apps to the users. We conclude by discussing approaches for preventing and mitigating the alarming leakage of sensitive user information.
引用
收藏
页码:279 / 290
页数:12
相关论文
共 50 条
  • [41] Privacy Leakage via Attribute Inference in Directed Social Networks
    Wong, Raymond K.
    Vidyalakshmi, B. S.
    INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2016, 2016, 9977 : 333 - 346
  • [42] Deciphering privacy leakage in microblogging social networks: a measurement study
    Li, Gaoxiang
    Wu, Di
    Shen, Junfeng
    Li, Tingting
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (17) : 3191 - 3204
  • [43] Quantifying Location Privacy for Navigation Services in Sustainable Vehicular Networks
    Li, Meng
    Chen, Yifei
    Kumar, Neeraj
    Lal, Chhagan
    Conti, Mauro
    Alazab, Mamoun
    IEEE TRANSACTIONS ON GREEN COMMUNICATIONS AND NETWORKING, 2022, 6 (03): : 1267 - 1275
  • [44] Gas Leakage Monitoring with Mobile Wireless Sensor Networks
    Guo, Ke
    Yang, Pan
    Guo, Dan Huai
    Liu, Yi
    PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE OF INFORMATION AND COMMUNICATION TECHNOLOGY [ICICT-2019], 2019, 154 : 430 - 438
  • [45] Quantifying trust in mobile ad-hoc networks
    Virendra, M
    Jadliwala, M
    Chandrasekaran, M
    Upadhyaya, S
    2005 International Conference on Integration of Knowledge Intensive Multi-Agent Systems: KIMAS'05: MODELING, EXPLORATION, AND ENGINEERING, 2005, : 65 - 70
  • [46] CPLM: Cloud Facilitated Privacy Shielding Leakage Resilient Mobile Health Monitoring
    Anita, R. Jasmine
    Rao, A. Narayana
    2014 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (IEEE ICCIC), 2014, : 125 - 129
  • [47] Protecting Location Privacy in Opportunistic Mobile Social Networks
    Huang, Rui
    Ying, Bidi
    Nayak, Amiya
    NOMS 2018 - 2018 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, 2018,
  • [48] Privacy addressing and autoconfiguration for mobile ad hoc networks
    Li, Longjiang
    Mao, Yuming
    Leng, Supeng
    COMPUTER COMMUNICATIONS, 2011, 34 (03) : 423 - 428
  • [49] Security and Privacy in Mobile Crowdsourcing Networks: Challenges and Opportunities
    Yang, Kan
    Zhang, Kuan
    Ren, Ju
    Shen, Xuemin
    IEEE COMMUNICATIONS MAGAZINE, 2015, 53 (08) : 75 - 81
  • [50] Providing Source Privacy in Mobile Ad Hoc Networks
    Ren, Jian
    Li, Yun
    Li, Tongtong
    2009 IEEE 6TH INTERNATIONAL CONFERENCE ON MOBILE ADHOC AND SENSOR SYSTEMS (MASS 2009), 2009, : 513 - 522