Recent studies show that ubiquitous smartphone data, e.g., the universal cell tower IDs, WiFi access points, etc., can be used to effectively recover individuals' mobility. However, recording and releasing the data containing such information without anonymization can hurt individuals' location privacy. Therefore, many anonymization methods have been used to sanitize these datasets before they are shared to the research community. In this paper, we demonstrate the idea of statistical mobile user profiling and identification based on anonymized datasets. Our insight is that, the mobility patterns inferred from different individuals' data are identifiable by using the statistical profiles constructed from the patterns. Experimental results show that, the proposed method achieves a promising identification accuracy of 96% on average based on randomly chosen two users' data, which makes our framework feasible for the application of inferring the fraud usage of the smartphones. Also, extensive experiments are conducted on the more challenging cases, showing a 59.5% identification accuracy for a total of 50 users based on 636 weekly data segments and a 56.1% accuracy for a total of 63 users based on 786 weekly data segments for two separate datasets. As the first work of such kind, our result suggests good possibility of developing location-based services or applications on the ubiquitous location anonymized datasets.
[1]
George Danezis,et al.
GENERAL TERMS
,
2003
.
[2]
Frank Stajano,et al.
Location Privacy in Pervasive Computing
,
2003,
IEEE Pervasive Comput..
[3]
Wen-Jing Hsu,et al.
Mining GPS data for mobility patterns: A survey
,
2014,
Pervasive Mob. Comput..
[4]
Alastair R. Beresford,et al.
Device Analyzer: Understanding Smartphone Usage
,
2013,
MobiQuitous.
[5]
Toni Giorgino,et al.
Computing and Visualizing Dynamic Time Warping Alignments in R: The dtw Package
,
2009
.
[6]
I. Jolliffe.
Principal Component Analysis
,
2002
.
[7]
Ramakrishnan Srikant,et al.
Mining sequential patterns
,
1995,
Proceedings of the Eleventh International Conference on Data Engineering.
[8]
Junyuan Xie,et al.
On the feasibility of user de-anonymization from shared mobile sensor data
,
2012,
PhoneSense '12.
[9]
César A. Hidalgo,et al.
Unique in the Crowd: The privacy bounds of human mobility
,
2013,
Scientific Reports.
[10]
Sébastien Gambs,et al.
De-anonymization attack on geolocated datasets
,
2012
.
[11]
Murat Ali Bayir,et al.
Discovering spatiotemporal mobility profiles of cellphone users
,
2009,
2009 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks & Workshops.