Location Privacy Protection Strategies: A Comprehensive Overview

 
Protecting Location Privacy:
Optimal Strategy against Localization Attacks
 
Reza Shokri
, 
George Theodorakopoulos, Carmela Troncoso,
Jean-Pierre Hubaux, Jean-Yves Le Boudec
 
EPFL
Cardiff University
K. U. Leuven
 
19
th
 ACM Conference on Computer and Communications Security (CCS), October 2012
 
Location-based Services
 
Sharing Location
with 
Friends
 
Sharing Location
with 
Businesses
 
Uploading location, tagging
documents, photos, messages, …
 
Asking for near-by services,
finding near-by friends, …
 
2
 
Example: Facebook Location-Tagging
 
Source: WHERE 2012, Josh Williams, "New Lines on the Horizon“, Justin Moore, "Ignite - Facebook's Data"
 
>600M mobile users
 
3
 
Check-ins at Facebook, one-day
 
Source: Where 2012, Josh Williams, "New Lines on the Horizon“, Justin Moore, "Ignite - Facebook's Data"
 
4
The contextual information attached to a trace tells much
about our habits, interests, activities, and relationships
A location trace is not only a set of
positions on a map
 
Threat
 
5
Location-Privacy Protection Mechanisms
 
Anonymization
 
(removing the user’s identity)
It has been shown inadequate, as a single defense
The traces can be de-anonymized, given an
adversary with some knowledge on the users
Obfuscation
 
(reporting a fake location)
Service Quality?
Users share their locations to receive some
services back. Obfuscation degrades the service
quality in favor of location privacy
6
Designing a Protection Mechanism
 
Challenges
Respect users’ required service quality
User-based protection
Real-time protection
Common Pitfall
Ignor adversary knowledge
Adversary can invert the obfuscation mechanism
Disregard optimal attack
Given a protection mechanism, attacker designs an attack to
minimize his estimation error in his inference attack
7
 
Our Objective:
Design Optimal Protection Strategy
 
 
A defense mechanism that
anticipates
 the attacks that can happen against it,
and 
maximizes
 the users’ location privacy against
the most effective attack,
and respects the users’ 
service quality 
constraint.
 
8
 
Outline
 
Assumptions
 
Model
User’s Profile
Protection Mechanism
Inference Attack
 
Problem Statement
 
Solution: Optimal strategy for user and adversary
 
Evaluation
 
 
9
Assumptions
 
LBS: Sporadic Location Exposure
Location check-in, search for nearby services, …
Adversary: Service provider
Or any entity who eavesdrops on the users’ LBS accesses
Attack: Localization
What is the user’s location when accessing LBS?
Protection: User-centric obfuscation mechanism
So, we focus on a single user
Privacy Metric:
Adversary’s expected error in estimating the user’s true
location, given the user’s profile and her observed location
10
 
Adversary Knowledge:
User’s “
Location Access Profile”
 
11
 
Data source: Location traces collected by 
Nokia
 Lausanne (
Lausanne Data Collection Campaign
)
Location Obfuscation Mechanism
 
Consequence: “
Service Quality Loss
12
Location Inference Attack
 
Estimation Error: “
Location Privacy
13
Problem Statement
14
 
Zero-sum Bayesian Stackelberg Game
 
     
User
                                                                
Adversary
 (leader)                                                              (follower)
 
Game
15
Optimal Strategy for the User
16
 
Optimal Strategy for the Adversary
 
Note: This is the dual of the previous optimization problem
 
17
Evaluation: Obfuscation Function
18
Output Visualization 
of
Obfuscation Mechanisms
 
Optimal Obfuscation
 
Basic Obfuscation
(k = 7)
19
Evaluation: Localization Attack
 
Optimal attack against optimal obfuscation
Given the service quality constraint
Bayesian attack against any obfuscation
 
Optimal attack against any obfuscation
Regardless of any service quality constraint
20
 
Optimal vs. non-Optimal
 
Service quality threshold is set to the service quality loss incurred by basic obfuscation.
 
21
 
k
=1
 
k
=30
 
Conclusion
 
(Location) Privacy is an undisputable issue, with more
people uploading their location more regularly
Privacy (similar to any security property) is adversarial-
dependent. Disregarding adversary’s strategy and
knowledge limits the privacy protection
Our game theoretic analysis helps solving optimal
attack and optimal defense simultaneously
Given the service quality constraint
Our methodology can be applied in other privacy
domains
 
22
 
 
 
23
 
 
 
24
 
Optimal Attack & Optimal Defense
 
25
 
Service quality threshold is set to the service quality loss incurred by basic obfuscation.
 
“Optimal Strategies”
Tradeoff between Privacy and Service Quality
 
26
Slide Note
Embed
Share

This study delves into optimal strategies to safeguard location privacy against localization attacks in the realm of location-based services. Discussing the shortcomings of anonymization and obfuscation as standalone defenses, it explores the challenges and pitfalls in designing effective protection mechanisms while considering user service quality and real-time protection needs. The research emphasizes the importance of acknowledging adversary knowledge and optimizing defenses to thwart inference attacks seeking to minimize estimation errors.

  • Location Privacy
  • Localization Attacks
  • Protection Mechanisms
  • Anonymization
  • Obfuscation

Uploaded on Sep 06, 2024 | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. Download presentation by click this link. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

E N D

Presentation Transcript


  1. Protecting Location Privacy: Optimal Strategy against Localization Attacks Reza Shokri, George Theodorakopoulos, Carmela Troncoso, Jean-Pierre Hubaux, Jean-Yves Le Boudec EPFL Cardiff University K. U. Leuven 19th ACM Conference on Computer and Communications Security (CCS), October 2012

  2. Location-based Services Sharing Location with Businesses Sharing Location with Friends Asking for near-by services, finding near-by friends, Uploading location, tagging documents, photos, messages, 2

  3. Example: Facebook Location-Tagging >600M mobile users Source: WHERE 2012, Josh Williams, "New Lines on the Horizon , Justin Moore, "Ignite - Facebook's Data" 3

  4. Check-ins at Facebook, one-day Source: Where 2012, Josh Williams, "New Lines on the Horizon , Justin Moore, "Ignite - Facebook's Data" 4

  5. Threat A location trace is not only a set of positions on a map The contextual information attached to a trace tells much about our habits, interests, activities, and relationships 5

  6. Location-Privacy Protection Mechanisms Anonymization(removing the user s identity) It has been shown inadequate, as a single defense The traces can be de-anonymized, given an adversary with some knowledge on the users Obfuscation(reporting a fake location) Service Quality? Users share their locations to receive some services back. Obfuscation degrades the service quality in favor of location privacy 6

  7. Designing a Protection Mechanism Challenges Respect users required service quality User-based protection Real-time protection Common Pitfall Ignor adversary knowledge Adversary can invert the obfuscation mechanism Disregard optimal attack Given a protection mechanism, attacker designs an attack to minimize his estimation error in his inference attack 7

  8. Our Objective: Design Optimal Protection Strategy A defense mechanism that anticipates the attacks that can happen against it, and maximizes the users location privacy against the most effective attack, and respects the users service quality constraint. 8

  9. Outline Assumptions Model User s Profile Protection Mechanism Inference Attack Problem Statement Solution: Optimal strategy for user and adversary Evaluation 9

  10. Assumptions LBS: Sporadic Location Exposure Location check-in, search for nearby services, Adversary: Service provider Or any entity who eavesdrops on the users LBS accesses Attack: Localization What is the user s location when accessing LBS? Protection: User-centric obfuscation mechanism So, we focus on a single user Privacy Metric: Adversary s expected error in estimating the user s true location, given the user s profile and her observed location 10

  11. Adversary Knowledge: User s Location Access Profile Probability of being at location ? when accessing the LBS 11 Data source: Location traces collected by Nokia Lausanne (Lausanne Data Collection Campaign)

  12. Location Obfuscation Mechanism Probability of replacing location ? with pseudolocation ? Consequence: Service Quality Loss quality loss due to replacing ? with ? 12

  13. Location Inference Attack Probability of estimating ?as the user s actual location, if ? is observed Estimation Error: Location Privacy Privacy gain due to estimating ? as ? 13

  14. Problem Statement Given, the user s profile known to adversary Find obfuscation function that Maximizes privacy, according to distortion Respects a maximum tolerable service quality loss Adversary observes ? , and finds optimal to minimize the user s privacy who uses 14

  15. Zero-sum Bayesian Stackelberg Game Game User accesses LBS from location ? ~ ? ? known to adversary UserAdversary (leader) (follower) LBS message ? ? ? user gain / adversary loss Chooses ? to minimize it Chooses ? to maximize it 15

  16. Optimal Strategy for the User User s unconditional expected privacy (averaged over all ? ) User s conditional expected privacy given ? Posterior probability, given observed pseudolocation ? User maximizes it by choosing the optimal obfuscation ? Adversary chooses ? to minimize user s privacy Respect service quality constraint Proper probability distribution 16

  17. Optimal Strategy for the Adversary Minimizing the user s maximum privacy under the service quality constraint Proper probability distribution Shadow price of the service quality constraint . (exchange rate between service quality and privacy) Note: This is the dual of the previous optimization problem 17

  18. Evaluation: Obfuscation Function Optimal Solve the linear optimization problem (using Matlab LP solver) Basic Hide location ? among the k-1 nearest locations (with positive ? probability) 18

  19. Output Visualization of Obfuscation Mechanisms Optimal Obfuscation Basic Obfuscation (k = 7) 19

  20. Evaluation: Localization Attack Optimal attack against optimal obfuscation Given the service quality constraint Bayesian attack against any obfuscation Optimal attack against any obfuscation Regardless of any service quality constraint 20

  21. Optimal vs. non-Optimal k=1 k=30 Service quality threshold is set to the service quality loss incurred by basic obfuscation. 21

  22. Conclusion (Location) Privacy is an undisputable issue, with more people uploading their location more regularly Privacy (similar to any security property) is adversarial- dependent. Disregarding adversary s strategy and knowledge limits the privacy protection Our game theoretic analysis helps solving optimal attack and optimal defense simultaneously Given the service quality constraint Our methodology can be applied in other privacy domains 22

  23. 23

  24. 24

  25. Optimal Attack & Optimal Defense Service quality threshold is set to the service quality loss incurred by basic obfuscation. 25

  26. Optimal Strategies Tradeoff between Privacy and Service Quality 26

Related


More Related Content

giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#