Preserving location privacy on the release of large-scale mobility data

Mobility models play an important role in wireless network simulation. While being widely used due to simplicity, synthetic models usually suffer from the inadequate semantics to characterize real-world movements. In contrast, traces are highly desirable for simulation since they are extracted from realistic movements. However, even releasing anonymized traces could potentially cause privacy exposure. To tackle this dilemma, our paper proposes a novel approach to produce mobility traces while still preserving location privacy. Our algorithm depends only on certain wireless relationships observed in a large-scale mobile dataset collected in campus, instead of using any of the actual location information for trace generation. We argue that wireless relationships rather than geo-locations are the critical aspects to preserve in mobility patterns. A set of metrics are applied to evaluate the performance of the proposed approach in terms of preserving the original wireless relationships in the output traces, demonstrating promising initial results.

[1]  Alex Pentland,et al.  Reality mining: sensing complex social systems , 2006, Personal and Ubiquitous Computing.

[2]  Michael Hicks,et al.  Deanonymizing mobility traces: using social network as a side-channel , 2012, CCS.

[3]  Gregory W. Wornell,et al.  Cooperative diversity in wireless networks: Efficient protocols and outage behavior , 2004, IEEE Transactions on Information Theory.

[4]  Tracy Camp,et al.  Trace-based mobility modeling for multi-hop wireless networks , 2011, Comput. Commun..

[5]  Yunhao Liu,et al.  Locating in fingerprint space: wireless indoor localization with little human intervention , 2012, Mobicom '12.

[6]  Christian Poellabauer,et al.  Lessons learned from the netsense smartphone study , 2013, HotPlanet '13.

[7]  Tanzima Hashem,et al.  Safeguarding Location Privacy in Wireless Ad-Hoc Networks , 2007, UbiComp.

[8]  Hui Xiong,et al.  Preserving privacy in gps traces via uncertainty-aware path cloaking , 2007, CCS '07.

[9]  Latanya Sweeney,et al.  Achieving k-Anonymity Privacy Protection Using Generalization and Suppression , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[10]  Hui Zang,et al.  Anonymization of location data does not work: a large-scale measurement study , 2011, MobiCom.

[11]  Tracy Camp,et al.  A survey of mobility models for ad hoc network research , 2002, Wirel. Commun. Mob. Comput..

[12]  Venkata N. Padmanabhan,et al.  Indoor localization without the pain , 2010, MobiCom.

[13]  Lars Kulik,et al.  A Formal Model of Obfuscation and Negotiation for Location Privacy , 2005, Pervasive.

[14]  Haiyun Luo,et al.  Zero-Configuration, Robust Indoor Localization: Theory and Experimentation , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[15]  W. Torgerson Multidimensional scaling: I. Theory and method , 1952 .

[16]  Alin Deutsch,et al.  Policy-aware sender anonymity in location based services , 2010, 2010 IEEE 26th International Conference on Data Engineering (ICDE 2010).

[17]  Chris McDonald,et al.  A Critique of Mobility Models for Wireless Network Simulation , 2007, 6th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007).

[18]  Anshul Rai,et al.  Zee: zero-effort crowdsourcing for indoor localization , 2012, Mobicom '12.