The De-anonymization Method Based on User Spatio-Temporal Mobility Trace
Abstract
Nowadays user mobility traces are more and more likely to de-anonymize users in addition to other types of data. Among them, model-based approaches usually provide more accurate de-anonymize than that of feature-locations-based approaches. More recently, Hidden Markov Model (HMM) based approaches are proposed to find out the mobility pattern of user mobility traces. However, in the key step of the hidden state definition, existing models rely on the fixed classification of time, space or number, which can hardly suit for all various users. In this paper, we propose a user de-anonymization method based on HMM. Different from current approaches, the method utilizes a novel density-based HMM, which uses the density-based clustering to obtain hidden states of HMM from three-dimensional (time, latitude and longitude) spatio-temporal data, and provide much better performance. Furthermore, we also propose a frequent spatio-temporal cube filter (FSTC-Filter) which significantly reduces the number of candidate models and thus improves the efficiency.
Keywords
De-anonymization Density-based HMM Frequent spatio-temporal cube Mobility traceNotes
Acknowledgement
This work is supported by the National Natural Science Foundation of China (No. U1636216, No. 61232005, No. 61402456)
References
- 1.Ayhan, S., Samet, H.: Aircraft trajectory prediction made easy with predictive analytics. In: Proceedings of the 22nd International Conference on Knowledge Discovery and Data Mining (2016)Google Scholar
- 2.De Montjoye, Y.-A., Hidalgo, C.A., Verleysen, M., Blondel, V.D.: Unique in the crowd: the privacy bounds of human mobility. Sci. Rep. 3, 1376 (2013)CrossRefGoogle Scholar
- 3.Freudiger, J., Shokri, R., Hubaux, J.-P.: Evaluating the privacy risk of location-based services. In: Danezis, G. (ed.) FC 2011. LNCS, vol. 7035, pp. 31–46. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-27576-0_3CrossRefGoogle Scholar
- 4.Gambs, S., Killijian, M.-O., del Prado Cortez, M.N.: De-anonymization attack on geolocated data. J. Comput. Syst. Sci. 80(8), 1597–1614 (2014)MathSciNetCrossRefGoogle Scholar
- 5.Gonzalez, M.C., Hidalgo, C.A., Barabasi, A.-L.: Understanding individual human mobility patterns. Nature 453(7196), 779–782 (2008)CrossRefGoogle Scholar
- 6.Lin, M., Cao, H., Zheng, V., Chang, K.C., Krishnaswamy, S.: Mobile user verification/identification using statistical mobility profile. In: 2015 International Conference on Big Data and Smart Computing (BigComp), pp. 15–18. IEEE (2015)Google Scholar
- 7.Lin, M., Cao, H., Zheng, V., Chang, K.C.-C., Krishnaswamy, S.: Mobility profiling for user verification with anonymized location data. In: Twenty-Fourth International Joint Conference on Artificial Intelligence (2015)Google Scholar
- 8.Naini, F.M., Unnikrishnan, J., Thiran, P., Vetterli, M.: Where you are is who you are: user identification by matching statistics. IEEE Trans. Inf. Forensics Secur. 11(2), 358–372 (2016)CrossRefGoogle Scholar
- 9.Narayanan, A., Shi, E., Rubinstein, B.I.P.: Link prediction by de-anonymization: how we won the kaggle social network challenge. In: The 2011 International Joint Conference on Neural Networks (IJCNN), pp. 1825–1834. IEEE (2011)Google Scholar
- 10.Narayanan, A., Shmatikov, V.: Robust de-anonymization of large sparse datasets. In: IEEE Symposium on Security and Privacy, SP 2008, pp. 111–125. IEEE (2008)Google Scholar
- 11.Narayanan, A., Shmatikov, V.: De-anonymizing social networks. In: 2009 30th IEEE Symposium on Security and Privacy, pp. 173–187. IEEE (2009)Google Scholar
- 12.Pan, J., Rao, V., Agarwal, P., Gelfand, A.: Markov-modulated marked Poisson processes for check-in data. In: International Conference on Machine Learning, pp. 2244–2253 (2016)Google Scholar
- 13.Wang, R., Zhang, M., Feng, D., Fu, Y., Chen, Z.: A de-anonymization attack on geo-located data considering spatio-temporal influences. In: Qing, S., Okamoto, E., Kim, K., Liu, D. (eds.) ICICS 2015. LNCS, vol. 9543, pp. 478–484. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-29814-6_41CrossRefGoogle Scholar
- 14.Wang, Y., Yuan, N.J., Lian, D., Xu, L., Xie, X., Chen, E., Rui, Y.: Regularity and conformity: location prediction using heterogeneous mobility data. In: Proceedings of the 21th ACM SIGFKDD International Conference on Knowledge Discovery and Data Mining, pp. 1275–1284. ACM (2015)Google Scholar
- 15.Xue, A.Y., Zhang, R., Zheng, Y., Xie, X., Huang, J., Xu, Z.: Destination prediction by sub-trajectory synthesis and privacy protection against such prediction. In: 2013 IEEE 29th International Conference on Data Engineering (ICDE), pp. 254–265. IEEE (2013)Google Scholar
- 16.Yuan, Q., Cong, G., Ma, Z., Sun, A., Thalmann, N.M.: Time-aware point-of-interest recommendation. In: Proceedings of the 36th International ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 363–372. ACM (2013)Google Scholar
- 17.Zang, H., Bolot, J.: Anonymization of location data does not work: a large-scale measurement study. In: Proceedings of the 17th Annual International Conference on Mobile Computing and Networking, pp. 145–156. ACM (2011)Google Scholar
- 18.Zhang, C., Zhang, K., Yuan, Q., Zhang, L., Hanratty, T., Han, J.: Gmove: group-level mobility modeling using geo-tagged social media. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1305–1314. ACM (2016)Google Scholar
- 19.Zheng, Y., Zhang, L., Xie, X., Ma, W.-Y.: Mining interesting locations and travel sequences from GPS trajectories. In: Proceedings of the 18th International Conference on World Wide Web, pp. 791–800. ACM (2009)Google Scholar
- 20.Zhou, C., Frankowski, D., Ludford, P., Shekhar, S., Terveen, L.: Discovering personally meaningful places: an interactive clustering approach. ACM Trans. Inf. Syst. (TOIS) 25(3), 12 (2007)CrossRefGoogle Scholar