ABSTRACT
Motivated by a probe-vehicle based automotive traffic monitoring system, this paper considers the problem of guaranteed anonymity in a dataset of location traces while maintaining high data accuracy. We find through analysis of a set of GPS traces from 233 vehicles that known privacy algorithms cannot meet accuracy requirements or fail to provide privacy guarantees for drivers in low-density areas. To overcome these challenges, we develop a novel time-to-confusion criterion to characterize privacy in a location dataset and propose an uncertainty-aware path cloaking algorithm that hides location samples in a dataset to provide a time-to-confusion guarantee for all vehicles. We show that this approach effectively guarantees worst case tracking bounds, while achieving significant data accuracy improvements.
- TeleNav. http://www.telenav.net/, 2004.Google Scholar
- Inrix. http://www.inrix.com/, 2006.Google Scholar
- Intellione. http://www.intellione.com/, 2006.Google Scholar
- D. Agrawal and C. C. Aggarwal. On the design and quantification of privacy preserving data mining algorithms. In Symposium on Principles of Database Systems, 2001. Google ScholarDigital Library
- R. Agrawal and R. Srikant. Privacy-preserving data mining. In Proc. of the ACM SIGMOD Conference on Management of Data, pages 439--450. ACM Press, May 2000. Google ScholarDigital Library
- A. Beresford and F. Stajano. Location privacy in pervasive computing. IEEE Pervasive Computing, 2(1):46--55, 2003. Google ScholarDigital Library
- A. Beresford and F. Stajano. Mix zones: User privacy in location-aware services. In IEEE PerSec, 2004. Google ScholarDigital Library
- C. Bettini, X. SeanWang, and S. Jajodia. Protecting privacy against location-based personal identification. In 2nd VLDB Workshop SDM, 2005. Google ScholarDigital Library
- R. Cayford and T. Johnson. Operational parameters affecting use of anonymous cell phone tracking for generating traffic information. Institute of transportation studies for the 82th TRB Annual Meeting, 1(3):03--3865, Jan 2003.Google Scholar
- D. Chaum. Untraceable electronic, mail return addresses, and digital pseudonyms. Communications of the ACM, 1981. Google ScholarDigital Library
- A. Civilis and S. Pakalnis. Techniques for efficient road-network-based tracking of moving objects. IEEE TKDE, 17(5):698--712, 2005. Senior Member-Christian S. Jensen. Google ScholarDigital Library
- T. M. Cover and J. A. Thomas. Elements of information theory. Wiley-Interscience, New York, NY, USA, 1991. Google ScholarDigital Library
- L. Cranor, M. Langheinrich, M. Marchiori, and J. Reagle. The platform for privacy preferences 1.0 (p3p1.0) specification. W3C Recommendation, Apr. 2002.Google Scholar
- X. Dai, M. Ferman, and R. Roesser. A simulation evaluation of a real-time traffic information system using probe vehicles. In Proceedings of the IEEE Intelligent Transportation Systems, pages 475--480, 2003.Google Scholar
- J. Deng, R. Han, and S. Mishra. Countermeasures against traffic analysis attacks in wireless sensor networks. In Proceedings of the IEEE/Create-Net SecureComm, Athens, Greece, September 2005. Google ScholarDigital Library
- C. Diaz, S. Seys, J. Claessens, and B. Preneel. Towards measuring anonymity. In 2nd Workshop on Privacy Enhancing Technologies, 2002. Google ScholarDigital Library
- R. Dingledine, N. Mathewson, and P. F. Syverson. Tor: The second-generation onion router. In USENIX Security Symposium, pages 303--320, 2004. Google ScholarDigital Library
- A. Escudero-Pascual, T. Holleboom, and S. Fischer-Hubner. Privacy of location data in mobile networks. In Proceedings of the 7th Nordic Workshop on Secure IT Systems (Nordsec 2002), 2002.Google Scholar
- H. Federrath, A. Jerichow, and A. Pfitzmann. Mixes in mobile communication systems: Location management with privacy. In Proceedings of the First International Workshop on Information Hiding, pages 121--135, London, UK, 1996. Springer-Verlag. Google ScholarDigital Library
- M. Ferman, D. Blumenfeld, and X. Dai. A simple analytical model of a probe-based traffic information system. In Proceedings of the IEEE Intelligent Transportation Systems, pages 263--268, 2003.Google ScholarCross Ref
- A. Gal and V. Atluri. An authorization model for temporal data. In Proceedings of the 7th ACM CCS, pages 144--153, New York, NY, USA, 2000. ACM Press. Google ScholarDigital Library
- B. Gedik and L. Liu. Location privacy in mobile systems: A personalized anonymization model. In Proceedings of the 25th IEEE ICDCS 2005, pages 620--629, Washington, DC, USA, 2005. Google ScholarDigital Library
- D. Goldschlag, M. Reed, and P. Syverson. Onion routing for anonymous and private internet connections. Communications of the ACM (USA), 42(2):39--41, 1999. Google ScholarDigital Library
- M. Gruteser and D. Grunwald. Anonymous usage of location-based services through spatial and temporal cloaking. In Proceedings of the ACM MobiSys, 2003. Google ScholarDigital Library
- M. Gruteser and D. Grunwald. Enhancing location privacy in wireless lan through disposable interface identifiers: a quantitative analysis. In Proceedings of the 1st ACM WMASH, pages 46--55. ACM Press, 2003. Google ScholarDigital Library
- M. Gruteser and B. Hoh. On the anonymity of periodic location samples. In Proceedings of the Second International Conference on Security in Pervasive Computing, 2005. Google ScholarDigital Library
- B. Hoh and M. Gruteser. Protecting location privacy through path confusion. In Proceedings of IEEE/Create-Net SecureComm, Athens, Greece, September 2005. Google ScholarDigital Library
- B. Hoh, M. Gruteser, H. Xiong, and A. Alrabady. Enhancing security and privacy in traffic-monitoring systems. IEEE Pervasive Computing, 5(4):38--46, 2006. Google ScholarDigital Library
- Y.-C. Hu and H. J. Wang. Location privacy in wireless networks. In Proceedings of the ACM SIGCOMM Asia Workshop 2005, April 2005.Google Scholar
- B. Hull, V. Bychkovsky, Y. Zhang, K. Chen, M. Goraczko, A. K. Miu, E. Shih, H. Balakrishnan, and S. Madden. CarTel: A Distributed Mobile Sensor Computing System. In 4th ACM SenSys, Boulder, CO, November 2006. Google ScholarDigital Library
- T. Jiang, H. Wang, and Y.-C. Hu. Preserving location privacy in wireless lans. In Proceedings of the 5th ACM MobiSys, New York, NY, USA, 2007. ACM Press. Google ScholarDigital Library
- P. Kamat, Y. Zhang, W. Trappe, and C. Ozturk. Enhancing source-location privacy in sensor network routing. In Proceedings of the 25th IEEE ICDCS '05, pages 599--608, Washington, DC, USA, 2005. Google ScholarDigital Library
- H. Kargupta, S. Datta, Q. Wang, and K. Sivakumar. Random data perturbation techniques and privacy preserving data mining. In IEEE ICDM. IEEE Press, 2003.Google Scholar
- J. Krumm. Inference attacks on location tracks. In Proceedings of the Pervasive 2007, May 2007. Google ScholarDigital Library
- J. Krumm and E. Horvitz. Predestination: Inferring destinations from partial trajectories. In Ubicomp, pages 243--260, 2006. Google ScholarDigital Library
- M. Li, K. Sampigethaya, L. Huang, and R. Poovendran. Swing & swap: user-centric approaches towards maximizing location privacy. In Proceedings of the 5th ACM WPES '06, pages 19--28, New York, NY, USA, 2006. ACM Press. Google ScholarDigital Library
- M. F. Mokbel, C.-Y. Chow, and W. G. Aref. The new casper: query processing for location services without compromising privacy. In Proceedings of the 32nd VLDB '2006, pages 763--774. VLDB Endowment, 2006. Google ScholarDigital Library
- P. Samarati and L. Sweeney. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. In Proceedings of IEEE Symposium on Research in Security and Privacy, 1998.Google Scholar
- K. Sampigethaya, L. Huang, M. Li, R. Poovendran, K. Matsuura, and K. Sezaki. Caravan: Providing location privacy for vanet. In 3rd workshop on Embedded Security in Cars (ESCAR 2005), 2005.Google Scholar
- A. Serjantov and G. Danezis. Towards an information theoretic metric for anonymity. In 2nd Workshop on Privacy Enhancing Technologies, 2002. Google ScholarDigital Library
- E. Snekkenes. Concepts for personal location privacy policies. In EC '01: Proceedings of the 3rd ACM conference on Electronic Commerce, pages 48--57, New York, NY, USA, 2001. ACM Press. Google ScholarDigital Library
- L. Sweeney. Achieving k-Anonymity Privacy Protection Using Generalization and Suppression. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, 10(5):571--588, 2002. Google ScholarDigital Library
- K. P. Tang, P. Keyani, J. Fogarty, and J. I. Hong. Putting people in their place: an anonymous and privacy-sensitive approach to collecting sensed data in location-based applications. In Proceedings of CHI '06, pages 93--102, 2006. Google ScholarDigital Library
- J. M. Wozencraft and I. M. Jacobs. Principles of Communications Engineering. John Wiley & Sons Inc, 1966.Google Scholar
- M. Youssef, V. Atluri, and N. R. Adam. Preserving mobile customer privacy: an access control system for moving objects and customer profiles. In Proceedings of the 6th MDM '05, pages 67--76, New York, NY, USA, 2005. ACM Press. Google ScholarDigital Library
Index Terms
- Preserving privacy in gps traces via uncertainty-aware path cloaking
Recommendations
Virtual trip lines for distributed privacy-preserving traffic monitoring
MobiSys '08: Proceedings of the 6th international conference on Mobile systems, applications, and servicesAutomotive traffic monitoring using probe vehicles with Global Positioning System receivers promises significant improvements in cost, coverage, and accuracy. Current approaches, however, raise privacy concerns because they require participants to ...
Achieving Guaranteed Anonymity in GPS Traces via Uncertainty-Aware Path Cloaking
The integration of Global Positioning System (GPS) receivers and sensors into mobile devices has enabled collaborative sensing applications, which monitor the dynamics of environments through opportunistic collection of data from many users' devices. ...
Enhancing Privacy and Accuracy in Probe Vehicle-Based Traffic Monitoring via Virtual Trip Lines
Traffic monitoring using probe vehicles with GPS receivers promises significant improvements in cost, coverage, and accuracy over dedicated infrastructure systems. Current approaches, however, raise privacy concerns because they require participants to ...
Comments