Protecting Against Inference Attacks on Co-location Data

被引:0
|
作者
Ahuja, Ritesh [1 ]
Ghinita, Gabriel [1 ]
Krishna, Nithin [1 ]
Shahabi, Cyrus [1 ]
机构
[1] Univ Southern Calif, Los Angeles, CA 90007 USA
来源
2019 28TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND NETWORKS (ICCCN) | 2019年
关键词
D O I
10.1109/icccn.2019.8847050
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The proliferation of location-centric applications results in massive amounts of individual location data that can benefit domains such as transportation, urban planning, etc. However, sensitive personal data can be derived from location datasets. In particular, co-location of users can disclose one's social connections, intimate partners, business associates, etc. We derive a powerful inference attack that makes extensive use of background knowledge in order to expose an individual's colocations. We also show that existing techniques for location protection, which do not focus specifically on co-locations, distort data excessively, resulting in sanitized datasets with poor utility. We propose three privacy mechanisms that are customized for co-locations, and provide various trade-offs in terms of user privacy and data utility. Our extensive experimental evaluation on a real geo-social network dataset shows that the proposed approaches achieve good data utility and do a good job of protecting against discovery of co-locations, even when confronted with a powerful adversary.
引用
收藏
页数:11
相关论文
共 50 条
  • [21] Continuous discovery of co-location contexts from Bluetooth data
    Thuong Nguyen
    Gupta, Sunil
    Venkatesh, Svetha
    Dinh Phung
    PERVASIVE AND MOBILE COMPUTING, 2015, 16 : 286 - 304
  • [22] Discovering co-location patterns in multivariate spatial flow data
    Cai, Jiannan
    Kwan, Mei-Po
    INTERNATIONAL JOURNAL OF GEOGRAPHICAL INFORMATION SCIENCE, 2022, 36 (04) : 720 - 748
  • [23] Spatial co-location rule mining research in continuous data
    Wang, Zhan-Quan
    Chen, Hai-Bo
    Yu, Hui-Qun
    PROCEEDINGS OF 2006 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2006, : 1362 - +
  • [24] Protecting databases from inference attacks
    Hinke, TH
    Delugach, HS
    Wolf, RP
    COMPUTERS & SECURITY, 1997, 16 (08) : 687 - 708
  • [25] Mining co-location patterns from distributed spatial data
    Maiti, Sandipan
    Subramanyam, R. B. V.
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2021, 33 (09) : 1064 - 1073
  • [26] Co-location Detection on the Cloud
    Inci, Mehmet Sinan
    Gulmezoglu, Berk
    Eisenbarth, Thomas
    Sunar, Berk
    CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN, COSADE 2016, 2016, 9689 : 19 - 34
  • [27] Virtual co-location: As if being there?
    Lukosch, Stephan G.
    2014 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS (PERCOM WORKSHOPS), 2014, : 531 - 531
  • [28] INTERSATELLITE TRACKING FOR CO-LOCATION
    BAETZ, O
    SOOP, EM
    SOPPA, U
    ESA JOURNAL-EUROPEAN SPACE AGENCY, 1994, 18 (02): : 139 - 146
  • [29] Agility Maneuvers to Mitigate Inference Attacks on Sensed Location Data
    Petracca, Giuseppe
    Marvel, Lisa M.
    Swami, Ananthram
    Jaeger, Trent
    MILCOM 2016 - 2016 IEEE MILITARY COMMUNICATIONS CONFERENCE, 2016, : 259 - 264
  • [30] The creative industries and co-location
    Conway, Clifford
    INTERNATIONAL JOURNAL OF ENTREPRENEURSHIP AND INNOVATION, 2005, 6 (03): : 210 - 210