Skip to main content

2016 | OriginalPaper | Buchkapitel

A De-anonymization Attack on Geo-Located Data Considering Spatio-temporal Influences

verfasst von : Rong Wang, Min Zhang, Dengguo Feng, Yanyan Fu, Zhenyu Chen

Erschienen in: Information and Communications Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

With the wide use of smart phones, a large amount of GPS data are collected, while risks of privacy disclosure are also increasing. The de-anonymization attack is a typical attack which can infer the owner of an anonymous set of mobility traces. However, most existing works only consider spatial influences without considering temporal influences sufficiently. In this paper, we define a User Hidden Markov Model (UHMM) considering spatio-temporal influences, and exploit this model to launch the de-anonymization attack. Moreover, we conduct a set of experiments on a real-world dataset. The results show our approach is more accurate than other methods.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Gonzalez, M.C., Hidalgo, C.A., Barabasi, A.L.: Understanding individual human mobility patterns. Nature. 453, 779–782 (2008)CrossRef Gonzalez, M.C., Hidalgo, C.A., Barabasi, A.L.: Understanding individual human mobility patterns. Nature. 453, 779–782 (2008)CrossRef
2.
3.
Zurück zum Zitat Gambs, S., Killijian, M.O., del Prado Cortez, M.N.: De-anonymization attack on geolocated data. J. Comput. Syst. Sci. 80, 1597–1614 (2014)MathSciNetCrossRef Gambs, S., Killijian, M.O., del Prado Cortez, M.N.: De-anonymization attack on geolocated data. J. Comput. Syst. Sci. 80, 1597–1614 (2014)MathSciNetCrossRef
4.
Zurück zum Zitat Gambs, S., Killijian, M.O., del Prado Cortez, M.N.: Show me how you move and i will tell you who you are. In: 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS, pp. 34–41. ACM, California (2010) Gambs, S., Killijian, M.O., del Prado Cortez, M.N.: Show me how you move and i will tell you who you are. In: 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS, pp. 34–41. ACM, California (2010)
5.
Zurück zum Zitat Bettini, Claudio, Wang, XSean, Jajodia, Sushil: Protecting privacy against location-based personal identification. In: Jonker, Willem, Petković, Milan (eds.) SDM 2005. LNCS, vol. 3674, pp. 185–199. Springer, Heidelberg (2005)CrossRef Bettini, Claudio, Wang, XSean, Jajodia, Sushil: Protecting privacy against location-based personal identification. In: Jonker, Willem, Petković, Milan (eds.) SDM 2005. LNCS, vol. 3674, pp. 185–199. Springer, Heidelberg (2005)CrossRef
6.
Zurück zum Zitat Viterbi, A.J.: Error bounds for convolutional codes and an asymptotically optimum decoding algorithm. IEEE Trans. Inf. Theor. 13, 260–C269 (1967)CrossRef Viterbi, A.J.: Error bounds for convolutional codes and an asymptotically optimum decoding algorithm. IEEE Trans. Inf. Theor. 13, 260–C269 (1967)CrossRef
7.
Zurück zum Zitat Zang, H., Bolot, J.: Anonymization of location data does not work: a large-scale measurement study. In: 17th Annual International Conference on Mobile Computing and Networking, pp. 145–156. ACM, Las Vegas (2011) Zang, H., Bolot, J.: Anonymization of location data does not work: a large-scale measurement study. In: 17th Annual International Conference on Mobile Computing and Networking, pp. 145–156. ACM, Las Vegas (2011)
8.
Zurück zum Zitat Freudiger, Julien, Shokri, Reza, Hubaux, Jean-Pierre: Evaluating the privacy risk of location-based services. In: Danezis, George (ed.) FC 2011. LNCS, vol. 7035, pp. 31–46. Springer, Heidelberg (2012)CrossRef Freudiger, Julien, Shokri, Reza, Hubaux, Jean-Pierre: Evaluating the privacy risk of location-based services. In: Danezis, George (ed.) FC 2011. LNCS, vol. 7035, pp. 31–46. Springer, Heidelberg (2012)CrossRef
9.
Zurück zum Zitat De Montjoye, Y.A., Hidalgo, C.A., Verleysen, M.: Unique in the Crowd: the privacy bounds of human mobility. Scientific reports, 3 (2013) De Montjoye, Y.A., Hidalgo, C.A., Verleysen, M.: Unique in the Crowd: the privacy bounds of human mobility. Scientific reports, 3 (2013)
10.
Zurück zum Zitat De Mulder, Y., Danezis, G., Batina, L.: Identification via location-profiling in GSM networks. In: 7th ACM Workshop on Privacy in the Electronic Society, pp. 23–32. ACM, Alexandria (2008) De Mulder, Y., Danezis, G., Batina, L.: Identification via location-profiling in GSM networks. In: 7th ACM Workshop on Privacy in the Electronic Society, pp. 23–32. ACM, Alexandria (2008)
11.
Zurück zum Zitat Narayanan, A., Shmatikov, V.: Robust de-anonymization of large sparse datasets. In: the IEEE Symposium on Security and Privacy, pp. 111–125. IEEE, Washington, DC (2008) Narayanan, A., Shmatikov, V.: Robust de-anonymization of large sparse datasets. In: the IEEE Symposium on Security and Privacy, pp. 111–125. IEEE, Washington, DC (2008)
12.
Zurück zum Zitat Srivatsa, M., Hicks, M.: Deanonymizing mobility traces: using social network as a side-channel. In: the 2012 ACM conference on Computer and communications security, pp. 628–637. ACM, New York (2012) Srivatsa, M., Hicks, M.: Deanonymizing mobility traces: using social network as a side-channel. In: the 2012 ACM conference on Computer and communications security, pp. 628–637. ACM, New York (2012)
13.
Zurück zum Zitat Xiao, X., Zheng, Y., Luo, Q.: Finding similar users using category-based location history. In: 18th SIGSPATIAL International Conference on Advances in Geographic Information Systems, pp. 442–445. ACM, California (2010) Xiao, X., Zheng, Y., Luo, Q.: Finding similar users using category-based location history. In: 18th SIGSPATIAL International Conference on Advances in Geographic Information Systems, pp. 442–445. ACM, California (2010)
14.
Zurück zum Zitat Zheng, Y., Li, Q., Chen, Y.: Understanding mobility based on GPS data. In: 10th International Conference on Ubiquitous Computing, pp. 312–321. ACM, Korea (2008) Zheng, Y., Li, Q., Chen, Y.: Understanding mobility based on GPS data. In: 10th International Conference on Ubiquitous Computing, pp. 312–321. ACM, Korea (2008)
15.
Zurück zum Zitat Eagle, N., Pentland, A.: Reality mining: sensing complex social systems. Pers. Ubiquitous Comput. 10, 255–268 (2006)CrossRef Eagle, N., Pentland, A.: Reality mining: sensing complex social systems. Pers. Ubiquitous Comput. 10, 255–268 (2006)CrossRef
Metadaten
Titel
A De-anonymization Attack on Geo-Located Data Considering Spatio-temporal Influences
verfasst von
Rong Wang
Min Zhang
Dengguo Feng
Yanyan Fu
Zhenyu Chen
Copyright-Jahr
2016
Verlag
Springer International Publishing
DOI
https://doi.org/10.1007/978-3-319-29814-6_41

Premium Partner