Privacy-preserving high-quality map generation with participatory sensing

Accurate maps are increasingly important with the growth of smart phones and the development of location-based services. Several crowdsourcing based map generation protocols have been proposed that rely on volunteers to provide their traces. Being creative, however, those methods pose a significant threat to user privacy as the traces can easily imply user behavior patterns. On the flip side, crowdsourcing-based map generation method does need individual locations. To address the issue, we present a systematic participatory-sensing-based high-quality map generation scheme, PMG, that meets the privacy demand of individual users. In this approach, individual users merely need to upload unorganized sparse location points so as to reduce the risk of exposing privacy, while the server generates accurate maps with unorganized points, instead of user traces. Experiments show that our solution is able to generate high-quality maps for a real environment that is robust to noisy data. The difference between the ground-truth map and the produced map is <; 10m, even when the collected locations are about 32m apart after clustering for the purpose of removing noise.

[1]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[2]  Peter Steenkiste,et al.  Protecting Access to People Location Information , 2003, SPC.

[3]  Taeho Jung,et al.  Search me if you can: Privacy-preserving location query service , 2012, 2013 Proceedings IEEE INFOCOM.

[4]  Dominique Attali R-regular Shape Reconstruction from Unorganized Points , 1998, Comput. Geom..

[5]  Guobin Shen,et al.  Walkie-Markie: Indoor Pathway Mapping Made Easy , 2013, NSDI.

[6]  Yunhao Liu,et al.  Accurate Indoor Localization Using Acoustic Direction Finding via Smart Phones , 2013, ArXiv.

[7]  Desheng Zhang,et al.  Acc: generic on-demand accelerations for neighbor discovery in mobile applications , 2012, SenSys '12.

[8]  Kazuo Murota,et al.  A fast Voronoi-diagram algorithm with applications to geographical optimization problems , 1984 .

[9]  Frank Stajano,et al.  Location Privacy in Pervasive Computing , 2003, IEEE Pervasive Comput..

[10]  Yin Wang,et al.  CrowdAtlas: self-updating maps for cloud and personal use , 2013, MobiSys '13.

[11]  Wenliang Du,et al.  Secure multi-party computation problems and their applications: a review and open problems , 2001, NSPW '01.

[12]  Samir Khuller,et al.  The Budgeted Maximum Coverage Problem , 1999, Inf. Process. Lett..

[13]  Suman Nath,et al.  MaskIt: privately releasing user context streams for personalized mobile applications , 2012, SIGMOD Conference.

[14]  Xiang-Yang Li,et al.  Privacy preserving cloud data access with multi-authorities , 2012, 2013 Proceedings IEEE INFOCOM.

[15]  Qin Zhang,et al.  Applying Filtering Techniques to Improve GPS Positioning Accuracy , 2001 .

[16]  Dominique Attali,et al.  r-regular shape reconstruction from unorganized points , 1997, SCG '97.

[17]  David Eppstein,et al.  The Crust and the beta-Skeleton: Combinatorial Curve Reconstruction , 1998, Graph. Model. Image Process..

[18]  L. Figueiredo,et al.  Computational morphology of curves , 1994, The Visual Computer.

[19]  Remco C. Veltkamp,et al.  The gamma-neighborhood Graph , 1992, Comput. Geom..

[20]  Yunhao Liu,et al.  Localization of Wireless Sensor Networks in the Wild: Pursuit of Ranging Quality , 2013, IEEE/ACM Transactions on Networking.

[21]  D. Kirkpatrick,et al.  A Framework for Computational Morphology , 1985 .

[22]  Nigel Davies,et al.  Preserving Privacy in Environments with Location-Based Applications , 2003, IEEE Pervasive Comput..

[23]  Tetsuji Satoh,et al.  An anonymous communication technique using dummies for location-based services , 2005, ICPS '05. Proceedings. International Conference on Pervasive Services, 2005..

[24]  Xiang-Yang Li,et al.  SmartLoc: push the limit of the inertial sensor based metropolitan localization using smartphone , 2013, MobiCom.

[25]  Chandrajit L. Bajaj,et al.  Sampling and reconstructing manifolds using alpha-shapes , 1997, CCCG.

[26]  Patrick Weber,et al.  OpenStreetMap: User-Generated Street Maps , 2008, IEEE Pervasive Computing.

[27]  Xiang-Yang Li,et al.  You're driving and texting: detecting drivers using personal smart phones by leveraging inertial sensors , 2013, MobiCom.

[28]  Jiung-yao Huang,et al.  Improve GPS positioning accuracy with context awareness , 2008, 2008 First IEEE International Conference on Ubi-Media Computing.

[29]  Frank Stajano,et al.  Mix zones: user privacy in location-aware services , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.

[30]  Malcolm Hall,et al.  ProtectMyPrivacy: detecting and mitigating privacy leaks on iOS devices using crowdsourcing , 2013, MobiSys '13.

[31]  D. Mavriplis An advancing front Delaunay triangulation algorithm designed for robustness , 1993 .