Protecting against Inference Attacks on Co-Location Data

The proliferation of location-centric applications results in massive amounts of individual location data that can benefit domains such as transportation, urban planning, etc. However, sensitive personal data can be derived from location datasets. In particular, co-location of users can disclose one's social connections, intimate partners, business associates, etc. We derive a powerful inference attack that makes extensive use of background knowledge in order to expose an individual's co-locations. We also show that existing techniques for location protection, which do not focus specifically on co-locations, distort data excessively, resulting in sanitized datasets with poor utility. We propose three privacy mechanisms that are customized for co-locations, and provide various trade-offs in terms of user privacy and data utility. Our extensive experimental evaluation on a real geo-social network dataset shows that the proposed approaches achieve good data utility and do a good job of protecting against discovery of co-locations, even when confronted with a powerful adversary.

[1]  Dan Xu,et al.  Find you from your friends: Graph-based residence location prediction for users in social media , 2014, 2014 IEEE International Conference on Multimedia and Expo (ICME).

[2]  Catuscia Palamidessi,et al.  Geo-indistinguishability: differential privacy for location-based systems , 2012, CCS.

[3]  Emiliano De Cristofaro,et al.  What Does The Crowd Say About You? Evaluating Aggregation-based Location Privacy , 2017, Proc. Priv. Enhancing Technol..

[4]  Gisele L. Pappa,et al.  Inferring the Location of Twitter Messages Based on User Relationships , 2011, Trans. GIS.

[5]  Cyrus Shahabi,et al.  Spatial influence - measuring followship in the real world , 2016, 2016 IEEE 32nd International Conference on Data Engineering (ICDE).

[6]  Yang Zhang,et al.  walk2friends: Inferring Social Links from Mobility Profiles , 2017, CCS.

[7]  Sabrina De Capitani di Vimercati,et al.  An Obfuscation-Based Approach for Protecting Location Privacy , 2011, IEEE Transactions on Dependable and Secure Computing.

[8]  Moni Naor,et al.  Our Data, Ourselves: Privacy Via Distributed Noise Generation , 2006, EUROCRYPT.

[9]  Carmela Troncoso,et al.  Is Geo-Indistinguishability What You Are Looking for? , 2017, WPES@CCS.

[10]  Li Xiong,et al.  Protecting Locations with Differential Privacy under Temporal Correlations , 2014, CCS.

[11]  Fredson Kuti-George,et al.  Contact Tracing during an Outbreak of Ebola Virus Disease in the Western Area Districts of Sierra Leone: Lessons for Future Ebola Outbreak Response , 2016, Front. Public Health.

[12]  Farnoush Banaei Kashani,et al.  Efficient Reachability Query Evaluation in Large Spatiotemporal Contact Datasets , 2012, Proc. VLDB Endow..

[13]  Jure Leskovec,et al.  node2vec: Scalable Feature Learning for Networks , 2016, KDD.

[14]  Albert-László Barabási,et al.  Limits of Predictability in Human Mobility , 2010, Science.

[15]  Yan Liu,et al.  EBM: an entropy-based model to infer social strength from spatiotemporal data , 2013, SIGMOD '13.

[16]  David Lazer,et al.  Inferring friendship network structure by using mobile phone data , 2009, Proceedings of the National Academy of Sciences.

[17]  Marco Gruteser,et al.  USENIX Association , 1992 .

[18]  Catuscia Palamidessi,et al.  Efficient Utility Improvement for Location Privacy , 2017, Proc. Priv. Enhancing Technol..

[19]  Danna Zhou,et al.  d. , 1934, Microbial pathogenesis.

[20]  Dan Cosley,et al.  Inferring social ties from geographic coincidences , 2010, Proceedings of the National Academy of Sciences.

[21]  Aniket Kittur,et al.  Bridging the gap between physical location and online social networks , 2010, UbiComp.

[22]  Jure Leskovec,et al.  Friendship and mobility: user movement in location-based social networks , 2011, KDD.

[23]  John Krumm,et al.  Inference Attacks on Location Tracks , 2007, Pervasive.

[24]  Bhavani Thuraisingham,et al.  Proceedings of the 2017 on Workshop on Privacy in the Electronic Society , 2017, WPES@CCS.

[25]  George Danezis,et al.  Quantifying Location Privacy: The Case of Sporadic Location Exposure , 2011, PETS.

[26]  Yufei Tao,et al.  Reverse kNN Search in Arbitrary Dimensionality , 2004, VLDB.

[27]  Jean-Yves Le Boudec,et al.  Quantifying Location Privacy , 2011, 2011 IEEE Symposium on Security and Privacy.

[28]  Kyriakos Mouratidis,et al.  Preventing Location-Based Identity Inference in Anonymous Spatial Queries , 2007, IEEE Transactions on Knowledge and Data Engineering.

[30]  Kyriakos Mouratidis,et al.  Conceptual partitioning: an efficient method for continuous nearest neighbor monitoring , 2005, SIGMOD '05.