Title: PRIV
1PRIVÉ Anonymous Location-Based Queries in
Distributed Mobile Systems
Gabriel Ghinita1 Panos Kalnis1
Spiros Skiadopoulos2
- 1 National University of Singapore
- ghinitag,kalnis_at_comp.nus.edu.sg
- 2 University of Peloponnese, Greece
- spiros_at_uop.gr
2Location-Based Services (LBS)
- LBS users
- Mobile devices with GPS capabilities
- Spatial database queries
- Queries
- NN and Range Queries
- Location server is
- NOT trusted
Find closest hospital to my present location
3Problem Statement
- Queries may disclose sensitive information
- Query through anonymous web surfing service
- But user location may disclose identity
- Triangulation of device signal
- Publicly available databases
- Physical surveillance
- How to preserve query source anonymity?
- Even when exact user locations are known
4Solution Overview
- Anonymizing Spatial Region (ASR)
- Identification probability 1/K
- Minimize overhead
- Reduce ASR extent
- Fast ASR assembly time
- Support user mobility
5Central Anonymizer Architecture
- Intermediate tier between users and LBS
Bottleneck and single point of attack/failure
6PRIVÉ Architecture
7K-Anonymity
Age ZipCode Disease
42 25000 Ulcer
46 35000 Pneumonia
50 20000 Flu
54 40000 Gastritis
48 50000 Dyspepsia
56 55000 Bronchitis
Name Age ZipCode
Andy 42 25000
Bill 46 35000
Ken 50 20000
Nash 54 40000
Mike 48 50000
Sam 56 55000
(a) Microdata
(b) Voting Registration List (public)
L. Sweeney. k-Anonymity A Model for Protecting
Privacy. Int. J. of Uncertainty, Fuzziness and
Knowledge-Based Systems, 10(5)557-570, 2002.
8K-Anonymity
Age ZipCode Disease
42-46 25000-35000 Ulcer
42-46 25000-35000 Pneumonia
50-54 20000-40000 Flu
50-54 20000-40000 Gastritis
48-56 50000-55000 Dyspepsia
48-56 50000-55000 Bronchitis
Name Age ZipCode
Andy 42 25000
Bill 46 35000
Ken 50 20000
Nash 54 40000
Mike 48 50000
Sam 56 55000
- 2-anonymous microdata
(b) Voting Registration List (public)
L. Sweeney. k-Anonymity A Model for Protecting
Privacy. Int. J. of Uncertainty, Fuzziness and
Knowledge-Based Systems, 10(5)557-570, 2002.
9Relational and Spatial Anonymity
Age
Zip
20k
25k
30k
35k
40k
45k
50k
55k
10Existing Cloaking Solutions
11Redundant Queries
- Send K-1 redundant queries
- Gives away exact location of users
- Potentially high overhead
12CloakP2P Chow06
- Find K-1 NN of query source
- Source likely to be closest to ASR center
- Vulnerable to center-of-ASR attack
NOT SECURE !!!
uq
5-ASR
Chow06 Chow et al, A Peer-to-Peer Spatial
Cloaking Algorithm for Anonymous Location-based
Services, ACM GIS 06
13QuadASRGru03, Mok06
- Quad-tree based
- Fails to preserve anonymity for outliers
- Unnecessarily large ASR size
u2
A1
u1
u3
- If any of u1, u2, u3 queries, ASR is A1
NOT SECURE !!!
u4
A2
- u4s identity is disclosed
Gru03 - Gruteser et al, Anonymous Usage of
Location-Based Services Through Spatial and
Temporal Cloaking, MobiSys 2003 Mok06 Mokbel
et al, The New Casper Query Processing for
Location Services without Compromising Privacy,
VLDB 2006
14Secure LocationAnonymization
15Reciprocity
- Consider querying user uq and ASR Aq
- Let ASq set of users enclosed by Aq
- Aq has the reciprocity property iff
- AS K
- ? ui,uj ? AS, ui ? ASj ? uj ? ASi
16hilbASR
- Based on Hilbert space-filling curve
- index users by Hilbert value of location
- partition Hilbert sequence into K-buckets
Start
End
17Advantages of hilbASR
- Guarantees source privacy
- K-ASRs have the reciprocity property
- Reduced ASR size
- Hilbert ordering preserves locality well
- K-ASR includes exactly K users (in most cases)
- Efficient ASR assembly and user relocation
- Balanced, annotated index tree
- User relocation, ASR assembly in O(log users)
18hilbASR with Annotated Index
K6 Example
19PRIVÉ
20PRIVÉ Characteristics
- P2P overlay network
- Resembles annotated B-tree
- Hierarchical clustering architecture
- Bounded cluster size ?,3?)
S relocates to 60
21Relocation
22PRIVÉ Protocol
- Users self-organize into clusters
- Bounded cluster size ?,3?)
- Cluster head handles operations
- State replicated at each cluster peer
- Operations
- Join/Departure
- Similar to B-tree insert/delete
- Relocation
- Handled bottom-up, restrict propagation
- K-request
- Decentralized implementation of hilbASR
23Operation Complexity
Operation Latency Communication Cost
Join/Departure log?N log?N ?
Relocation log?N log?N ?
K-request log?N log?K log?N K/?
24Load Balancing
- Hierarchical architecture
- Inherent imbalance in peer load
- Cluster head rotation mechanism
- Rotation triggered by load
- Communication cost predominant
25Fault Tolerance
- Soft-state mechanism
- Cluster membership periodically updated
- Recovery facilitated by state replication
- Leader election protocol
- In case of cluster head failure
26Experimental Evaluation
27Experimental Setup
- San Francisco Bay Area road network
- Network-based Generator of Moving Objects
- Up to 10000 users
- Velocities from 18 to 68 km/h
- Uniform and skewed query distributions
- Anonymity degree K in the range 10, 160
T. Brinkhoff. A Framework for Generating
Network-Based Moving Objects. Geoinformatica, 6(2)
153180, 2002.
28Anonymity Strength (center-of-ASR)
29ASR Size
30Query Efficiency
31Relocation Efficiency
32Load Balancing
0 20 40 60 80 100
Node Fraction
33Conclusions
- LBS Privacy an important concern
- Existing solutions have no privacy guarantees
- Centralized approach has limitations
- Poor scalability, legal issues
- Contribution
- Anonymization with privacy guarantees
- hilbASR
- Extension to decentralized systems
- Improved scalability and availability
- No single point-of-attack/failure
34Ongoing Future Work
- Relational DB
- Employ space mapping techniques to achieve
k-anonymity and l-diversity - We outperform existing state-of-the art
- Space/Data Partitioning and Clustering
- Spatial anonymity
- Address anonymization of trajectories
- As opposed to point locations
35Ongoing Future Work
- Address anonymization of trajectories
- As opposed to point locations
- Infrastructure-less scenario
36Bibliography on LBS Privacy
- http//anonym.comp.nus.edu.sg
37Bibliography
- Chow06 Mokbel et al, A Peer-to-Peer Spatial
Cloaking Algorithm for Anonymous Location-based
Services, ACM GIS 06 - Gru03 - Gruteser et al, Anonymous Usage of
Location-Based Services Through Spatial and
Temporal Cloaking, MobiSys 2003 - Ged05 Gedik et al, Location Privacy in Mobile
Systems A Personalized Anonymization Model,
ICDCS 2005 - Mok06 Mokbel et al, The New Casper Query
Processing for Location Services without
Compromising Privacy, VLDB 2006
38MobiHide
- Randomized ASR assembly technique
- Also uses Hilbert ordering
- ASR chosen as random K-user sequence
- Advantages
- No global knowledge required
- Flat index structure (Chord DHT)
- Disadvantages
- No privacy guarantees for skewed query
distributions - but still strong anonymity in practice