Deanonymizing mobility traces with co-location information

Mobility traces have been widely used in the design and evaluation of mobile networks. To mitigate the privacy threat of publishing mobility traces, the traces are often anonymized and obfuscated. However, even with anonymization and obfuscation techniques, traces can still be deanonymized by exploiting some side information such as users' co-location. With online social networks, mobile users increasingly report their co-locations with other users. For example, a user may report being with friends at a restaurant for lunch or dinner, and hence his friends' location information can be inferred. To find out whether co-location information can be exploited to identify a user and reveal his behavior from a set of mobility traces, we use a dataset from Twitter and Swarm to illustrate how an adversary can gather side information consisting of users' location and co-location. Based on the collected information, the adversary can run a simple yet effective location inference attack. We generalize this attack, formulate the identity inference problem, and develop inference attacks, under different observed side information, that deem effective in identifying the users. We perform comprehensive experimental analysis based on real datasets for taxi cabs and buses. The evaluation results show that co-location information can be used to significantly improve the accuracy of the identity inference attack.

[1]  David K. Y. Yau,et al.  Privacy vulnerability of published anonymous mobility traces , 2010, MobiCom.

[2]  Matthew Smith,et al.  SnapMe if you can: privacy threats of other peoples' geo-tagged media and what we can do about it , 2013, WiSec '13.

[3]  R. L. Stratonovich CONDITIONAL MARKOV PROCESSES , 1960 .

[4]  Qinghua Li,et al.  Achieving k-anonymity in privacy-aware location-based services , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[5]  Li Xiong,et al.  Protecting Locations with Differential Privacy under Temporal Correlations , 2014, CCS.

[6]  Pern Hui Chia,et al.  Interdependent Privacy: Let Me Share Your Data , 2013, Financial Cryptography.

[7]  Jean-Pierre Hubaux,et al.  Quantifying Interdependent Privacy Risks with Location Data , 2017, IEEE Transactions on Mobile Computing.

[8]  Henry A. Kautz,et al.  Finding your friends and following them to where you are , 2012, WSDM '12.

[9]  David Jurgens,et al.  That's What Friends Are For: Inferring Location in Online Social Media Platforms Based on Social Relationships , 2013, ICWSM.

[10]  Qinghua Li,et al.  Enhancing privacy through caching in location-based services , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).

[11]  Ashwin Machanavajjhala,et al.  No free lunch in data privacy , 2011, SIGMOD '11.

[12]  Michael Hicks,et al.  Deanonymizing mobility traces: using social network as a side-channel , 2012, CCS.

[13]  Joseph Ferreira,et al.  Activity-Based Human Mobility Patterns Inferred from Mobile Phone Data: A Case Study of Singapore , 2017, IEEE Transactions on Big Data.

[14]  Catuscia Palamidessi,et al.  Geo-indistinguishability: differential privacy for location-based systems , 2012, CCS.

[15]  Lorenzo Bracciale,et al.  CRAWDAD dataset roma/taxi (v.2014-07-17) , 2014 .

[16]  Prateek Mittal,et al.  Dependence Makes You Vulnberable: Differential Privacy Under Dependent Tuples , 2016, NDSS.

[17]  Chi-Yin Chow,et al.  Trajectory privacy in location-based services and data publication , 2011, SKDD.

[18]  Manolis Terrovitis,et al.  Privacy preservation in the dissemination of location data , 2011, SKDD.

[19]  Xiaomei Zhang,et al.  Efficient Data Forwarding in Mobile Social Networks with Diverse Connectivity Characteristics , 2014, 2014 IEEE 34th International Conference on Distributed Computing Systems.

[20]  Carmela Troncoso,et al.  Prolonging the Hide-and-Seek Game: Optimal Trajectory Privacy for Location-Based Services , 2014, WPES.

[21]  Pratap S. Prasad,et al.  Movement Prediction in Wireless Networks Using Mobility Traces , 2010, 2010 7th IEEE Consumer Communications and Networking Conference.

[22]  Qinghua Li,et al.  Forwarding Redundancy in Opportunistic Mobile Networks: Investigation, Elimination and Exploitation , 2015, IEEE Transactions on Mobile Computing.

[23]  Calton Pu,et al.  Dynamic Differential Location Privacy with Personalized Error Bounds , 2017, NDSS.