Quantifying the Effect of Co-location Information on Location Privacy
Mobile users increasingly report their co-locations with other users, in addition to revealing their locations to online services. For instance, they tag the names of the friends they are with, in the messages and in the pictures they post on social networking websites. Combined with (possibly obfuscated) location information, such co-locations can be used to improve the inference of the users’ locations, thus further threatening their location privacy: as co-location information is taken into account, not only a user’s reported locations and mobility patterns can be used to localize her, but also those of her friends (and the friends of their friends and so on). In this paper, we study this problem by quantifying the effect of co-location information on location privacy, with respect to an adversary such as a social network operator that has access to such information. We formalize the problem and derive an optimal inference algorithm that incorporates such co-location information, yet at the cost of high complexity. We propose two polynomial-time approximate inference algorithms and we extensively evaluate their performance on a real dataset. Our experimental results show that, even in the case where the adversary considers co-locations with only a single friend of the targeted user, the location privacy of the user is decreased by up to 75% in a typical setting. Even in the case where a user does not disclose any location information, her privacy can decrease by up to 16% due to the information reported by other users.
KeywordsLocation privacy co-location statistical inference social networks
Unable to display preview. Download preview PDF.
- 2.How the NSA is tracking people right now (2013), http://apps.washingtonpost.com/g/page/national/how-the-nsa-is-tracking-people-right-now/634/ (last visited: February 2014)
- 3.Crandall, D.J., Backstrom, L., Cosley, D., Suri, S., Huttenlocher, D., Kleinberg, J.: Inferring social ties from geographic coincidences. Proc. of the National Academy of Sciences (PNAS), 1–6 (2010)Google Scholar
- 5.De Mulder, Y., Danezis, G., Batina, L., Preneel, B.: Identification via location-profiling in GSM networks. In: WPES 2008: Proc. of the 7th ACM Workshop on Privacy in the Electronic Society, pp. 23–32 (2008)Google Scholar
- 6.Dey, R., Tang, C., Ross, K., Saxena, N.: Estimating age privacy leakage in online social networks. In: INFOCOM 2012: Proc. of the 31st Annual IEEE Int’l Conf. on Computer Communications, pp. 2836–2840 (2012)Google Scholar
- 8.Ghinita, G., Damiani, M.L., Silvestri, C., Bertino, E.: Preventing velocity-based linkage attacks in location-aware applications. In: GIS 2009: Proc. of the 17th ACM Int’l Symp. on Advances in Geographic Information Systems, pp. 246–255 (2009)Google Scholar
- 11.Henne, B., Szongott, C., Smith, M.: Snapme if you can: Privacy threats of other peoples’ geo-tagged media and what we can do about it. In: WiSec 2013: Proc. of the 6th ACM Conf. on Security and Privacy in Wireless and Mobile Networks, pp. 95–106 (2013)Google Scholar
- 14.Humbert, M., Ayday, E., Hubaux, J.P., Telenti, A.: Addressing the concerns of the lacks family: Quantification of kin genomic privacy. In: CCS 2013: Proc. of the 20th ACM Conf. on Computer and Communications Security, pp. 1141–1152 (2013)Google Scholar
- 17.Mislove, A., Viswanath, B., Gummadi, K.P., Druschel, P.: You are who you know: Inferring user profiles in online social networks. In: WSDM 2010: Proc. of the 3rd ACM Int’l Conf. on Web Search and Data Mining, pp. 251–260 (2010)Google Scholar
- 18.Narayanan, A., Shmatikov, V.: De-anonymizing social networks. In: S&P 2009: Proc. of the 30th IEEE Symp. on Security and Privacy, pp. 173–187 (2009)Google Scholar
- 20.Shokri, R., Theodorakopoulos, G., Le Boudec, J.Y., Hubaux, J.P.: Quantifying location privacy. In: S&P 2011: Proc. of the 32nd IEEE Symp. on Security and Privacy, pp. 247–262 (2011)Google Scholar
- 21.Srivatsa, M., Hicks, M.: Deanonymizing mobility traces: Using social network as a side-channel. In: CCS 2012: Proc. of the 19th ACM Conf. on Computer and Communications Security, pp. 628–637 (2012)Google Scholar
- 24.Zheng, Y., Liu, L., Wang, L., Xie, X.: Learning transportation mode from raw GPS data for geographic applications on the web. In: WWW 2008: Proc. of the 17th ACM Int’l Conf. on World Wide Web, pp. 247–256 (2008)Google Scholar