Deanonymizing Mobility Traces With Co-Location Information

被引:0
|
作者
Khazbak, Youssef [1 ]
Cao, Guohong [1 ]
机构
[1] Penn State Univ, Dept Comp Sci & Engn, University Pk, PA 16802 USA
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Mobility traces have been widely used in the design and evaluation of mobile networks. To mitigate the privacy threat. of publishing mobility traces, the traces are often anonymized and obfuscated. However, even with anonymization and obfuscation techniques, traces can still be deanonymized by exploiting some side information such as users' co-location. With online social networks, mobile users increasingly report their co-locations with other users. For example, a user may report being with friends at a restaurant for lunch or dinner, and hence his friends' location information can be inferred. To find out whether co-location information can be exploited to identify a user and reveal his behavior from a set of mobility traces, we use a dataset from Twitter and Swarm to illustrate how an adversary can gather side information consisting of users' location and co-location. Based on the collected information, the adversary can run a simple yet effective location inference attack. We generalize this attack, formulate the identity inference problem, and develop inference attacks, under different observed side information, that deem effective in identifying the users. We perform comprehensive experimental analysis based on real datasets for taxi cabs and buses. The evaluation results show that co-location information can be used to significantly improve the accuracy of the identity inference attack.
引用
收藏
页码:19 / 27
页数:9
相关论文
共 50 条
  • [21] The identity of indiscernibles and the co-location problem
    Jeshion, R
    PACIFIC PHILOSOPHICAL QUARTERLY, 2006, 87 (02) : 163 - 176
  • [22] The co-location of innovation and production in clusters
    Delgado, Mercedes
    INDUSTRY AND INNOVATION, 2020, 27 (08) : 842 - 870
  • [23] The double-assignment plant location problem with co-location
    Marin, Alfredo
    Pelegrin, Mercedes
    COMPUTERS & OPERATIONS RESEARCH, 2021, 126
  • [24] Loca: A Location-Oblivious Co-location Attack in Crowds
    Pasqua, Roberto
    Roy, Matthieu
    Tredan, Gilles
    UBICOMP'16: PROCEEDINGS OF THE 2016 ACM INTERNATIONAL JOINT CONFERENCE ON PERVASIVE AND UBIQUITOUS COMPUTING, 2016, : 535 - 544
  • [25] Role of Algorithmic and Co-Location Trading on the Speed of Information Adjustments: Evidence from India
    Jawed, Mohammad Shameem
    Chakrabarti, Prasenjit
    EMERGING MARKETS FINANCE AND TRADE, 2018, 54 (09) : 2021 - 2039
  • [26] Co-location of different technologies in the same site
    Martins, Goncalo A.
    Carvalho, Nuno B.
    Pires, Sergio
    Cabral, Pedro M.
    2008 WORKSHOP ON INTEGRATED NONLINEAR MICROWAVE AND MILLIMETRE- WAVE CIRCUITS (INMMIC), 2008, : 158 - +
  • [27] Co-location and Economic Growth in Clustered Areas
    Gaf-Deac, Ioan I.
    Ciutacu, Otilia Teodora
    ISSUES AND INNOVATIVE TRENDS IN SUSTAINABLE GROWTH - STRATEGY CHALLENGES FOR ECONOMIC AND SOCIAL POLICIES (ESPERA 2016), PT 2, 2018, : 213 - 221
  • [28] Redundancy Reduction for Prevalent Co-Location Patterns
    Wang, Lizhen
    Bao, Xuguang
    Zhou, Lihua
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2018, 30 (01) : 142 - 155
  • [29] ANALYSIS OF CO-LOCATION OF TELECOMMUNICATION INFRASTRUCTURE IN GHANA
    Arthur, Joseph Kweku
    2019 INTERNATIONAL CONFERENCE ON COMPUTING, COMPUTATIONAL MODELLING AND APPLICATIONS (ICCMA), 2019, : 72 - 80
  • [30] Mining regional co-location patterns with kNNG
    Qian, Feng
    Chiew, Kevin
    He, Qinming
    Huang, Hao
    JOURNAL OF INTELLIGENT INFORMATION SYSTEMS, 2014, 42 (03) : 485 - 505