A Heuristic Algorithm for Mobility-aware Location Obfuscation

Mobile users not only use on-demand location-based services increasingly (e.g., checking in on online social networks), but also other mobile applications that provide a service based on location traces of users (e.g., fitness tracking, health monitoring, etc.). This type of continuous tracking of user location introduces specific challenges to protection of location-privacy of mobile users. One of the challenges is ensuring the preservation of privacy levels of user location over time. Also, it is essential to build a location obfuscation area that results in high confusion for an adversary. In this paper, we address these challenges by proposing and evaluating a heuristic obfuscation algorithm that is mobility aware. Specifically, our heuristic algorithm reasons about a user's next location by taking into account user mobility history and direction of movement. Our experiments show that our approach outperforms a mobility-agnostic random obfuscation mechanism.

[1]  Philippe Golle,et al.  On the Anonymity of Home/Work Location Pairs , 2009, Pervasive.

[2]  Karl Aberer,et al.  User-side adaptive protection of location privacy in participatory sensing , 2013, GeoInformatica.

[3]  Carlo Ratti,et al.  Human mobility prediction based on individual and collective geographical preferences , 2010, 13th International IEEE Conference on Intelligent Transportation Systems.

[4]  Tracy Camp,et al.  A survey of mobility models for ad hoc network research , 2002, Wirel. Commun. Mob. Comput..

[5]  Elisa Bertino,et al.  Preventing velocity-based linkage attacks in location-aware applications , 2009, GIS.

[6]  Zygmunt J. Haas,et al.  Predictive distance-based mobility management for PCS networks , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).

[7]  Frank Dürr,et al.  A classification of location privacy attacks and approaches , 2012, Personal and Ubiquitous Computing.

[8]  Reza Shokri,et al.  A distortion-based metric for location privacy , 2009, WPES '09.

[9]  Suman Nath,et al.  MaskIt: privately releasing user context streams for personalized mobile applications , 2012, SIGMOD Conference.

[10]  Jianliang Xu,et al.  Privacy-Conscious Location-Based Queries in Mobile Environments , 2010, IEEE Transactions on Parallel and Distributed Systems.

[11]  John Krumm,et al.  A survey of computational location privacy , 2009, Personal and Ubiquitous Computing.

[12]  George Danezis,et al.  Quantifying Location Privacy: The Case of Sporadic Location Exposure , 2011, PETS.

[13]  Jean-Yves Le Boudec,et al.  Quantifying Location Privacy , 2011, 2011 IEEE Symposium on Security and Privacy.

[14]  John Krumm,et al.  Inference Attacks on Location Tracks , 2007, Pervasive.