Inference Attacks on Location Tracks

Although the privacy threats and countermeasures associated with location data are well known, there has not been a thorough experiment to assess the effectiveness of either. We examine location data gathered from volunteer subjects to quantify how well four different algorithms can identify the subjects' home locations and then their identities using a freely available, programmable Web search engine. Our procedure can identify at least a small fraction of the subjects and a larger fraction of their home addresses. We then apply three different obscuration countermeasures designed to foil the privacy attacks: spatial cloaking, noise, and rounding. We show how much obscuration is necessary to maintain the privacy of all the subjects.

[1]  Massimo Barbaro,et al.  A Face Is Exposed for AOL Searcher No , 2006 .

[2]  George Danezis,et al.  How Much Is Location Privacy Worth? , 2005, WEIS.

[3]  David J. Scott,et al.  Spatial Security Policies for Mobile Agents in a Sentient Computing Environment , 2003, FASE.

[4]  Paul Dourish,et al.  UbiComp 2006: Ubiquitous Computing, 8th International Conference, UbiComp 2006, Orange County, CA, USA, September 17-21, 2006 , 2006, UbiComp.

[5]  Henry A. Kautz,et al.  Location-Based Activity Recognition using Relational Markov Networks , 2005, IJCAI.

[6]  Lars Kulik,et al.  Location privacy and location-aware computing , 2006 .

[7]  Hannes Federrath Designing Privacy Enhancing Technologies , 2001, Lecture Notes in Computer Science.

[8]  Jeff A. Bilmes,et al.  Recognizing Activities and Spatial Context Using Wearable Sensors , 2006, UAI.

[9]  Krzysztof Z. Gajos,et al.  Opportunity Knocks: A System to Provide Cognitive Assistance with Transportation Services , 2004, UbiComp.

[10]  Stefan Lorkowski,et al.  TOWARDS AREA-WIDE TRAFFIC MONITORING-APPLICATIONS DERIVED FROM PROBE VEHICLE DATA , 2004 .

[11]  Tara Matthews,et al.  Location disclosure to social relations: why, when, & what people want to share , 2005, CHI.

[12]  Eric Horvitz,et al.  Web-Enhanced GPS , 2005, LoCA.

[13]  Jun Rekimoto,et al.  UbiComp 2005: Ubiquitous Computing, 7th International Conference, UbiComp 2005, Tokyo, Japan, September 11-14, 2005, Proceedings , 2005, UbiComp.

[14]  Thad Starner,et al.  Using GPS to learn significant locations and predict movement across multiple users , 2003, Personal and Ubiquitous Computing.

[15]  Gaetano Borriello,et al.  Extracting places from traces of locations , 2004, MOCO.

[16]  Marco Gruteser,et al.  USENIX Association , 1992 .

[17]  Yehuda Lindell,et al.  Privacy Preserving Data Mining , 2002, Journal of Cryptology.

[18]  Andreas Pfitzmann,et al.  Anonymity, Unobservability, and Pseudonymity - A Proposal for Terminology , 2000, Workshop on Design Issues in Anonymity and Unobservability.

[19]  Pierangela Samarati,et al.  Location privacy in pervasive computing , 2008 .

[20]  Gregory D. Abowd,et al.  Control, Deception, and Communication: Evaluating the Deployment of a Location-Enhanced Messaging Service , 2005, UbiComp.

[21]  Eric Horvitz,et al.  Trip Router with Individualized Preferences (TRIP): Incorporating Personalization into Route Planning , 2006, AAAI.

[22]  Natalia Marmasse,et al.  Providing lightweight telepresence in mobile communication to enhance collaborative living , 2004 .

[23]  George Buchanan,et al.  An Evaluation of WebTwig - A Site Outliner for Handheld Web Access , 1999, HUC.

[24]  Chris Schmandt,et al.  Location-Aware Information Delivery with ComMotion , 2000, HUC.

[25]  Hui Xiong,et al.  Enhancing Security and Privacy in Traffic-Monitoring Systems , 2006, IEEE Pervasive Computing.

[26]  Eric Horvitz,et al.  Predestination: Inferring Destinations from Partial Trajectories , 2006, UbiComp.

[27]  Eija Kaasinen,et al.  User needs for location-aware mobile services , 2003, Personal and Ubiquitous Computing.

[28]  Marco Gruteser,et al.  Wireless Location Privacy Protection , 2003, Computer.

[29]  Sunny Consolvo,et al.  Learning and Recognizing the Places We Go , 2005, UbiComp.

[30]  Kentaro Toyama,et al.  Project Lachesis: Parsing and Modeling Location Histories , 2004, GIScience.

[31]  Perdita Stevens,et al.  Modelling Recursive Calls with UML State Diagrams , 2003, FASE.

[32]  Nigel Davies,et al.  UbiComp 2004: Ubiquitous Computing , 2004, Lecture Notes in Computer Science.

[33]  Bernt Schiele,et al.  Location- and Context-Awareness, Third International Symposium, LoCA 2007, Oberpfaffenhofen, Germany, September 20-21, 2007, Proceedings , 2007, LoCA.