Skip to main content

Quantifying Location Privacy: The Case of Sporadic Location Exposure

  • Conference paper
Privacy Enhancing Technologies (PETS 2011)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 6794))

Included in the following conference series:

Abstract

Mobile users expose their location to potentially untrusted entities by using location-based services. Based on the frequency of location exposure in these applications, we divide them into two main types: Continuous and Sporadic. These two location exposure types lead to different threats. For example, in the continuous case, the adversary can track users over time and space, whereas in the sporadic case, his focus is more on localizing users at certain points in time. We propose a systematic way to quantify users’ location privacy by modeling both the location-based applications and the location-privacy preserving mechanisms (LPPMs), and by considering a well-defined adversary model. This framework enables us to customize the LPPMs to the employed location-based application, in order to provide higher location privacy for the users. In this paper, we formalize localization attacks for the case of sporadic location exposure, using Bayesian inference for Hidden Markov Processes. We also quantify user location privacy with respect to the adversaries with two different forms of background knowledge: Those who only know the geographical distribution of users over the considered regions, and those who also know how users move between the regions (i.e., their mobility pattern). Using the Location-Privacy Meter tool, we examine the effectiveness of the following techniques in increasing the expected error of the adversary in the localization attack: Location obfuscation and fake location injection mechanisms for anonymous traces.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Location-Privacy Meter tool, (2011), http://people.epfl.ch/reza.shokri

  2. Beresford, A.R., Stajano, F.: Location privacy in pervasive computing. IEEE Pervasive Computing 2(1), 46–55 (2003)

    Article  Google Scholar 

  3. De Mulder, Y., Danezis, G., Batina, L., Preneel, B.: Identification via location-profiling in gsm networks. In: WPES 2008: Proceedings of the 7th ACM Workshop on Privacy in the Electronic Society, pp. 23–32. ACM Press, New York (2008)

    Chapter  Google Scholar 

  4. Duckham, M., Kulik, L.: A formal model of obfuscation and negotiation for location privacy. In: Gellersen, H.-W., Want, R., Schmidt, A. (eds.) PERVASIVE 2005. LNCS, vol. 3468, Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  5. Freudiger, J., Shokri, R., Hubaux, J.-P.: Evaluating the privacy risk of location-based services. In: Financial Cryptography and Data Security, FC (2011)

    Google Scholar 

  6. Gedik, B., Liu, L.: Protecting location privacy with personalized k-anonymity: Architecture and algorithms. IEEE Transactions on Mobile Computing 7(1), 1–18 (2008)

    Article  Google Scholar 

  7. Golle, P., Partridge, K.: On the anonymity of home/work location pairs. In: Pervasive 2009: Proceedings of the 7th International Conference on Pervasive Computing, pp. 390–397. Springer, Berlin (2009)

    Google Scholar 

  8. Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: MobiSys 2003: Proceedings of the 1st International Conference on Mobile Systems, Applications and Services, pp. 31–42. ACM Press, New York (2003)

    Chapter  Google Scholar 

  9. Hoh, B., Gruteser, M.: Protecting location privacy through path confusion. In: SECURECOMM 2005: Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, pp. 194–205. IEEE Computer Society Press, Washington (2005)

    Google Scholar 

  10. Hoh, B., Gruteser, M., Xiong, H., Alrabady, A.: Enhancing security and privacy in traffic-monitoring systems. IEEE Pervasive Computing 5(4), 38–46 (2006)

    Article  Google Scholar 

  11. Hoh, B., Gruteser, M., Xiong, H., Alrabady, A.: Preserving privacy in gps traces via uncertainty-aware path cloaking. In: CCS 2007: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 161–171. ACM Press, New York (2007)

    Chapter  Google Scholar 

  12. Krumm, J.: Inference attacks on location tracks. In: LaMarca, A., Langheinrich, M., Truong, K.N. (eds.) Pervasive 2007. LNCS, vol. 4480, pp. 127–143. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  13. Krumm, J.: A survey of computational location privacy. Personal Ubiquitous Comput. 13(6), 391–399 (2009)

    Article  Google Scholar 

  14. Ma, C.Y., Yau, D.K., Yip, N.K., Rao, N.S.: Privacy vulnerability of published anonymous mobility traces. In: Proceedings of the sixteenth annual international conference on Mobile computing and networking. MobiCom 2010, pp. 185–196. ACM Press, New York (2010)

    Chapter  Google Scholar 

  15. Piorkowski, M., Sarafijanovic-Djukic, N., Grossglauser, M.: CRAWDAD data set epfl/mobility (v. 2009-02-24) (February 2009), http://crawdad.cs.dartmouth.edu/epfl/mobility

  16. Rabiner, L.: A tutorial on hidden Markov models and selected applications in speech recognition. Proceedings of the IEEE 77(2), 257–286 (1989)

    Article  Google Scholar 

  17. Shokri, R., Freudiger, J., Hubaux, J.-P.: A unified framework for location privacy. Technical Report EPFL-REPORT-148708, EPFL, Switzerland (2010)

    Google Scholar 

  18. Shokri, R., Freudiger, J., Jadliwala, M., Hubaux, J.-P.: A distortion-based metric for location privacy. In: WPES 2009: Proceedings of the 8th ACM workshop on Privacy in the electronic society, pp. 21–30. ACM Press, New York (2009)

    Chapter  Google Scholar 

  19. Shokri, R., Theodorakopoulos, G., Boudec, J.-Y.L., Hubaux, J.-P.: Quantifying location privacy. In: IEEE Symposium on Security and Privacy, Oakland, CA, USA (2011)

    Google Scholar 

  20. Shokri, R., Troncoso, C., Diaz, C., Freudiger, J., Hubaux, J.-P.: Unraveling an old cloak: k-anonymity for location privacy. In: Proceedings of the 9th Annual ACM Workshop on Privacy in the Electronic Society. WPES 2010, pp. 115–118. ACM Press, New York (2010)

    Chapter  Google Scholar 

  21. Troncoso, C., Gierlichs, B., Preneel, B., Verbauwhede, I.: Perfect matching disclosure attacks. In: Borisov, N., Goldberg, I. (eds.) PETS 2008. LNCS, vol. 5134, pp. 2–23. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Shokri, R., Theodorakopoulos, G., Danezis, G., Hubaux, JP., Le Boudec, JY. (2011). Quantifying Location Privacy: The Case of Sporadic Location Exposure. In: Fischer-HĂĽbner, S., Hopper, N. (eds) Privacy Enhancing Technologies. PETS 2011. Lecture Notes in Computer Science, vol 6794. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22263-4_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-22263-4_4

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-22262-7

  • Online ISBN: 978-3-642-22263-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics