Skip to main content

Longitudinal Collection and Analysis of Mobile Phone Data with Local Differential Privacy

  • Conference paper
  • First Online:
Privacy and Identity Management (Privacy and Identity 2020)

Abstract

Longitudinal studies of human mobility could allow an understanding of human behavior on a vast scale. Mobile phone data call detail records (CDRs) have emerged as a prospective data source for such an important task. Nevertheless, there are significant risks when it comes to collecting this type of data, as human mobility has proven to be quite unique. Because CDRs are produced through the connection of mobile phones with mobile network operators’ (MNOs) antennas, it means that users cannot sanitize their data. Once MNOs intend to use such a data source for human mobility analysis, data protection authorities such as the CNIL (in France) recommends that data be sanitized on the fly instead of collecting raw data and publishing private output at the end of the analysis. Local differential privacy (LDP) mechanisms are currently applied during the process of data collection to preserve the privacy of users. In this paper, we propose an efficient privacy-preserving LDP-based methodology to collect and analyze multi-dimensional data longitudinally through mobile connections. In our proposal, rather than regarding users as unique IDs, we propose a generic scenario where one directly collects users’ sensitive data with LDP. The intuition behind this is collecting generic values, which can be generated by many users (e.g., gender), allowing a longitudinal study. As we show in the results, our methodology is very appropriate for this scenario, achieving accurate frequency estimation in a multi-dimensional setting while respecting some major recommendations of data protection authorities such as the GDPR and CNIL.

This work was supported by the Region of Bourgogne Franche-Comté CADRAN Project and by the EIPHI-BFC Graduate School (contract “ANR-17-EURE-0002”). The authors would also like to thank the Orange Application for Business team for their useful feedback and comments. Computations have been performed on the supercomputer facilities of “Mésocentre de Calcul de Franche-Comté”.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    https://github.com/hharcolezi/ldp-protocols-mobility-cdrs.

References

  1. Acs, G., Castelluccia, C.: A case study: privacy preserving release of spatio-temporal density in Paris. In: Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining - KDD. ACM Press (2014). https://doi.org/10.1145/2623330.2623361

  2. Alaggan, M., Cunche, M., Gambs, S.: Privacy-preserving wi-fi analytics. Proc. Priv. Enhancing Technol. 2018(2), 4–26 (2018). https://doi.org/10.1515/popets-2018-0010

    Article  Google Scholar 

  3. Alaggan, M., Gambs, S., Matwin, S., Tuhin, M.: Sanitization of call detail records via differentially-private bloom filters. In: Samarati, P. (ed.) DBSec 2015. LNCS, vol. 9149, pp. 223–230. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-20810-7_15

    Chapter  Google Scholar 

  4. Alvim, M., Chatzikokolakis, K., Palamidessi, C., Pazii, A.: Invited paper: Local differential privacy on metric spaces: Optimizing the trade-off with utility. In: 2018 IEEE 31st Computer Security Foundations Symposium (CSF). IEEE (Jul 2018). https://doi.org/10.1109/csf.2018.00026

  5. Arcolezi, H.H., Couchot, J.F., Baala, O., Contet, J.M., Bouna, B.A., Xiao, X.: Mobility modeling through mobile data: generating an optimized and open dataset respecting privacy. In: 2020 International Wireless Communications and Mobile Computing (IWCMC). IEEE (2020). https://doi.org/10.1109/iwcmc48107.2020.9148138

  6. Blondel, V.D., Decuyper, A., Krings, G.: A survey of results on mobile phone datasets analysis. EPJ Data Sci. 4(1), 1–55 (2015). https://doi.org/10.1140/epjds/s13688-015-0046-0

    Article  Google Scholar 

  7. Broder, A., Mitzenmacher, M.: Network applications of bloom filters: a survey. Internet Math. 1(4), 485–509 (2004). https://doi.org/10.1080/15427951.2004.10129096

    Article  MathSciNet  MATH  Google Scholar 

  8. CNIL: Commission nationale de l’informatique et des libertés (1978). https://www.cnil.fr/en/home. Accessed 10 May 2020

  9. Ding, B., Kulkarni, J., Yekhanin, S.: Collecting telemetry data privately. In: Guyon, I., Luxburg, U.V., Bengio, S., Wallach, H., Fergus, R., Vishwanathan, S., Garnett, R. (eds.) Advances in Neural Information Processing Systems, vol. 30, pp. 3571–3580. Curran Associates, Inc., (2017)

    Google Scholar 

  10. Dujardin, S., Jacques, D., Steele, J., Linard, C.: Mobile phone data for urban climate change adaptation: reviewing applications, opportunities and key challenges. Sustainability 12(4), 1501 (2020). https://doi.org/10.3390/su12041501

    Article  Google Scholar 

  11. Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1–12. Springer, Heidelberg (2006). https://doi.org/10.1007/11787006_1

    Chapter  Google Scholar 

  12. Dwork, C., Roth, A., et al.: The algorithmic foundations of differential privacy. Found. Trends® Theoretical Comput. Sci. 9(3–4), 211–407 (2014)

    Google Scholar 

  13. Erlingsson, U., Pihur, V., Korolova, A.: Rappor: randomized aggregatable privacy-preserving ordinal response. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. ACM, New York, NY, USA (2014)

    Google Scholar 

  14. European-Commission: 2018 reform of EU data protection rules (2018). https://gdpr-info.eu/. Accessed 10 Apr 2020

  15. Fernandes, N., Lefki, K., Palamidessi, C.: Utility-preserving privacy mechanisms for counting queries. In: Boreale, M., Corradini, F., Loreti, M., Pugliese, R. (eds.) Models, Languages, and Tools for Concurrent and Distributed Programming. LNCS, vol. 11665, pp. 487–495. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-21485-2_27

    Chapter  Google Scholar 

  16. Heerschap, N., Ortega, S., Priem, A., Offermans, M.: Innovation of tourism statistics through the use of new big data sources. In: 12th Global Forum on Tourism Statistics, vol. 716, Prague, CZ (2014)

    Google Scholar 

  17. Jacques, D.C.: Mobile phone metadata for development. arXiv preprint arXiv:1806.03086 (2018)

  18. Kairouz, P., Bonawitz, K., Ramage, D.: Discrete distribution estimation under local privacy. arXiv preprint arXiv:1602.07387 (2016)

  19. Kasiviswanathan, S.P., Lee, H.K., Nissim, K., Raskhodnikova, S., Smith, A.: What can we learn privately? In: 2008 49th Annual IEEE Symposium on Foundations of Computer Science. IEEE (2008). https://doi.org/10.1109/focs.2008.27

  20. Kishore, N., et al.: Flying, phones and flu: Anonymized call records suggest that keflavik international airport introduced pandemic H1N1 into iceland in 2009. Influenza Other Respir. Viruses 14(1), 37–45 (2019). https://doi.org/10.1111/irv.12690

    Article  Google Scholar 

  21. Lu, X., Bengtsson, L., Holme, P.: Predictability of population displacement after the 2010 Haiti earthquake. Proc. Nat. Acad. Sci. 109(29), 11576–11581 (2012). https://doi.org/10.1073/pnas.1203882109

    Article  Google Scholar 

  22. Mir, D.J., Isaacman, S., Caceres, R., Martonosi, M., Wright, R.N.: DP-WHERE: Differentially private modeling of human mobility. In: 2013 IEEE International Conference on Big Data. IEEE (2013). https://doi.org/10.1109/bigdata.2013.6691626

  23. de Montjoye, Y.A., et al.: On the privacy-conscientious use of mobile phone data. Sci. Data 5(1), 1–6 (2018). https://doi.org/10.1038/sdata.2018.286

  24. de Montjoye, Y.A., Hidalgo, C.A., Verleysen, M., Blondel, V.D.: Unique in the crowd: The privacy bounds of human mobility. Sci. Rep. 3(1), 1–5 (2013). https://doi.org/10.1038/srep01376

  25. Nguyên, T.T., Xiao, X., Yang, Y., Hui, S.C., Shin, H., Shin, J.: Collecting and analyzing data from smart device users with local differential privacy. arXiv abs/1606.05053 (2016)

    Google Scholar 

  26. Oliver, N., et al.: Mobile phone data for informing public health actions across the COVID-19 pandemic life cycle. Sci. Adv. 6(23), eabc0764 (2020). https://doi.org/10.1126/sciadv.abc0764

  27. Orange-Business-Services: Flux vision: real time statistics on mobility patterns (2013). https://www.orange-business.com/en/products/flux-vision. Accessed 1 July 2020

  28. Pollina, E., Busvine, D.: European mobile operators share data for coronavirus fight (2013). https://www.reuters.com/article/us-health-coronavirus-europe-telecoms-idUSKBN2152C2. Accessed 1 Dec 2020

  29. Rhoads, D., Serrano, I., Borge-Holthoefer, J., Solé-Ribalta, A.: Measuring and mitigating behavioural segregation using call detail records. EPJ Data Sci. 9(1), 1–17 (2020). https://doi.org/10.1140/epjds/s13688-020-00222-1

    Article  Google Scholar 

  30. Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertainty, Fuzziness Knowl.-Based Syst. 10(05), 557–570 (2002). https://doi.org/10.1142/s0218488502001648

    Article  MathSciNet  MATH  Google Scholar 

  31. Wang, C., Horby, P.W., Hayden, F.G., Gao, G.F.: A novel coronavirus outbreak of global health concern. The Lancet 395(10223), 470–473 (2020). https://doi.org/10.1016/s0140-6736(20)30185-9

    Article  Google Scholar 

  32. Wang, N., et al.: Collecting and analyzing multidimensional data with local differential privacy. In: 2019 IEEE 35th International Conference on Data Engineering (ICDE). IEEE (2019)

    Google Scholar 

  33. Wang, T., Blocki, J., Li, N., Jha, S.: Locally differentially private protocols for frequency estimation. In: 26th USENIX Security Symposium (USENIX Security 17), pp. 729–745. USENIX Association, Vancouver, BC (2017)

    Google Scholar 

  34. Wang, T., Li, N., Jha, S.: Locally differentially private frequent itemset mining. In: 2018 IEEE Symposium on Security and Privacy (SP). IEEE (2018). https://doi.org/10.1109/sp.2018.00035

  35. Warner, S.L.: Randomized response: a survey technique for eliminating evasive answer bias. J. Am. Stat. Assoc. 60(309), 63–69 (1965). https://doi.org/10.1080/01621459.1965.10480775

    Article  MATH  Google Scholar 

  36. Wesolowski, A., Buckee, C.O., Bengtsson, L., Wetter, E., Lu, X., Tatem, A.J.: Commentary: containing the ebola outbreak - the potential and challenge of mobile network data. PLoS Currents (2014). https://doi.org/10.1371/currents.outbreaks.0177e7fcf52217b8b634376e2f3efc5e

    Article  Google Scholar 

  37. Xiong, X., Liu, S., Li, D., Cai, Z., Niu, X.: A comprehensive survey on local differential privacy. Secur. Commun. Networks 2020, 1–29 (2020). https://doi.org/10.1155/2020/8829523

    Article  Google Scholar 

  38. Zang, H., Bolot, J.: Anonymization of location data does not work. In: Proceedings of the 17th Annual International Conference on Mobile Computing And Networking - MobiCom. ACM Press (2011). https://doi.org/10.1145/2030613.2030630

  39. Zhu, T., Li, G., Zhou, W., Yu, P.S.: Differential Privacy and Applications. AIS, vol. 69. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-62004-6

    Book  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Héber H. Arcolezi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 IFIP International Federation for Information Processing

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Arcolezi, H.H., Couchot, JF., Bouna, B.A., Xiao, X. (2021). Longitudinal Collection and Analysis of Mobile Phone Data with Local Differential Privacy. In: Friedewald, M., Schiffner, S., Krenn, S. (eds) Privacy and Identity Management. Privacy and Identity 2020. IFIP Advances in Information and Communication Technology, vol 619. Springer, Cham. https://doi.org/10.1007/978-3-030-72465-8_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-72465-8_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-72464-1

  • Online ISBN: 978-3-030-72465-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics