skip to main content
10.1145/2660460.2660485acmconferencesArticle/Chapter ViewAbstractPublication PagescosnConference Proceedingsconference-collections
research-article

It's the way you check-in: identifying users in location-based social networks

Published:01 October 2014Publication History

ABSTRACT

In recent years, the rapid spread of smartphones has led to the increasing popularity of Location-Based Social Networks (LBSNs). Although a number of research studies and articles in the press have shown the dangers of exposing personal location data, the inherent nature of LBSNs encourages users to publish information about their current location (i.e., their check-ins). The same is true for the majority of the most popular social networking websites, which offer the possibility of associating the current location of users to their posts and photos. Moreover, some LBSNs, such as Foursquare, let users tag their friends in their check-ins, thus potentially releasing location information of individuals that have no control over the published data. This raises additional privacy concerns for the management of location information in LBSNs.

In this paper we propose and evaluate a series of techniques for the identification of users from their check-in data. More specifically, we first present two strategies according to which users are characterized by the spatio-temporal trajectory emerging from their check-ins over time and the frequency of visit to specific locations, respectively. In addition to these approaches, we also propose a hybrid strategy that is able to exploit both types of information. It is worth noting that these techniques can be applied to a more general class of problems where locations and social links of individuals are available in a given dataset. We evaluate our techniques by means of three real-world LBSNs datasets, demonstrating that a very limited amount of data points is sufficient to identify a user with a high degree of accuracy. For instance, we show that in some datasets we are able to classify more than 80% of the users correctly.

References

  1. D. Ashbrook and T. Starner. Using GPS to Learn Significant Locations and Predict Movement Across Multiple Users. Personal and Ubiquitous Computing, 7(5):275--286, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. A. R. Beresford and F. Stajano. Location privacy in pervasive computing. IEEE Pervasive Computing, 2(1):46--55, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. D. J. Berndt and J. Clifford. Using dynamic time warping to find patterns in time series. In Proceedings of the AAAI-94 Workshop on Knowledge Discovery in Databases, volume 10, pages 359--370. Seattle, WA, 1994.Google ScholarGoogle Scholar
  4. C. Bettini, X. S. Wang, and S. Jajodia. Protecting privacy against location-based personal identification. In Secure Data Management, pages 185--199. Springer, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. J. Bohn, V. Coroam\ua, M. Langheinrich, F. Mattern, and M. Rohs. Social, economic, and ethical implications of ambient intelligence and ubiquitous computing. In Ambient Intelligence, pages 5--29. Springer, 2005.Google ScholarGoogle ScholarCross RefCross Ref
  6. E. Cho, S. A. Myers, and J. Leskovec. Friendship and mobility: User movement in location-based social networks. In Proceedings of SIGKDD'11, pages 1082--1090. ACM, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. C.-Y. Chow and M. F. Mokbel. Trajectory privacy in location-based services and data publication. ACM SIGKDD Explorations Newsletter, 13(1):19--29, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. T. M. Cover and J. A. Thomas. Elements of information theory. John Wiley & Sons, 2012.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Y.-A. de Montjoye, C. A. Hidalgo, M. Verleysen, and V. D. Blondel. Unique in the crowd: The privacy bounds of human mobility. Scientific Reports, 3, 2013.Google ScholarGoogle Scholar
  10. M.-P. Dubuisson and A. K. Jain. A Modified Hausdorff Distance for Object Matching. In Proceedings of ICPR'94, pages 566--568, 1994.Google ScholarGoogle ScholarCross RefCross Ref
  11. C. Dwork. Differential privacy: A survey of results. In Theory and Applications of Models of Computation, pages 1--19. Springer, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. T. Eiter and H. Mannila. Computing Discrete Fréchet Distance. Technical report, Technische Universitat Wien, 1994.Google ScholarGoogle Scholar
  13. H. Gao, J. Tang, and H. Liu. Exploring social-historical ties on location-based social networks. In Proceedings of ICWSM'12, 2012.Google ScholarGoogle Scholar
  14. H. Gao, J. Tang, and H. Liu. gSCorr: modeling geo-social correlations for new check-ins on location-based social networks. In Proceedings of CIKM'12, pages 1582--1586. ACM, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. J. F. Gómez-Lopera, J. Martínez-Aroza, A. M. Robles-Pérez, and R. Román-Roldán. An analysis of edge detection by using the jensen-shannon divergence. Journal of Mathematical Imaging and Vision, 13(1):35--56, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. M. C. Gonzalez, C. A. Hidalgo, and A.-L. Barabasi. Understanding individual human mobility patterns. Nature, 453(7196):779--782, 2008.Google ScholarGoogle ScholarCross RefCross Ref
  17. M. Gruteser and D. Grunwald. Anonymous usage of location-based services through spatial and temporal cloaking. In Proceedings of MobiSys'03, pages 31--42. ACM, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. K. Joseph, C. H. Tan, and K. M. Carley. Beyond Local, Categories and Friends: Clustering Foursquare Users with Latent Topics. In Proceedings of UbiComp'12, pages 919--926. ACM, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. P. Kalnis, G. Ghinita, K. Mouratidis, and D. Papadias. Preventing location-based identity inference in anonymous spatial queries. IEEE Transactions on Knowledge and Data Engineering, 19(12):1719--1733, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. J. Krumm. A survey of computational location privacy. Personal and Ubiquitous Computing, 13(6):391--399, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. J. Lin. Divergence Measures based on the Shannon Entropy. IEEE Transactions on Information Theory, 37(1):145--151, 1991. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. C. Y. T. Ma, D. K. Y. Yau, N. K. Yip, and N. S. Rao. Privacy vulnerability of published anonymous mobility traces. IEEE/ACM Transactions on Networking, 21(3):720--733, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. E. Malmi, T. M. T. Do, and D. Gatica-Perez. From Foursquare to My Square: Learning Check-in Behavior from Multiple Sources. In Proceedings of ICWSM'13, 2013.Google ScholarGoogle Scholar
  24. C. D. Manning, P. Raghavan, and H. Schütze. Introduction to Information Retrieval. Cambridge University Press, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. A. McCallum and K. Nigam. A comparison of event models for naive bayes text classification. In Proceeding of the AAAI-98 Workshop on Learning for Text Categorization, volume 752, pages 41--48, 1998.Google ScholarGoogle Scholar
  26. A. Narayanan and V. Shmatikov. Robust de-anonymization of large sparse datasets. In Proceedings of SP'08, pages 111--125. IEEE, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. A. Noulas, S. Scellato, R. Lambiotte, M. Pontil, and C. Mascolo. A tale of many cities: Universal patterns in human urban mobility. PLOS ONE, 7(5):e37027, 2012.Google ScholarGoogle ScholarCross RefCross Ref
  28. T. Pontes, G. Magno, M. Vasconcelos, A. Gupta, J. Almeida, P. Kumaraguru, and V. Almeida. Beware of what you share: Inferring home location in social networks. In Proceedings of ICDM'12 Workshops, pages 571--578. IEEE, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. T. Pontes, M. Vasconcelos, J. Almeida, P. Kumaraguru, and V. Almeida. We Know Where you Live: Privacy Characterization of Foursquare Behavior. In Proceedings of UbiComp'12, pages 898--905. ACM, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. C. C. Robusto. The Cosine-Haversine formula. The American Mathematical Monthly, 64(1):38--40, 1957.Google ScholarGoogle ScholarCross RefCross Ref
  31. C. Ruiz Vicente, D. Freni, C. Bettini, and C. S. Jensen. Location-related privacy in geo-social networks. IEEE Internet Computing, 15(3):20--27, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. J.-R. Sack and J. Urrutia. Handbook of Computational Geometry. North Holland, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. L. Sweeney. k-anonymity: A model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 10(05):557--570, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. M. A. Vasconcelos, S. Ricci, J. Almeida, F. Benevenuto, and V. Almeida. Tips, Dones and Todos: Uncovering User Profiles in Foursquare. In Proceedings of WSDM'12, pages 653--662. ACM, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Y. Zheng, Q. Li, Y. Chen, X. Xie, and W.-Y. Ma. Understanding Mobility based on GPS Data. In Proceedings of UbiComp'08, pages 312--321. ACM, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. It's the way you check-in: identifying users in location-based social networks

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        COSN '14: Proceedings of the second ACM conference on Online social networks
        October 2014
        288 pages
        ISBN:9781450331982
        DOI:10.1145/2660460

        Copyright © 2014 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 1 October 2014

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        COSN '14 Paper Acceptance Rate25of87submissions,29%Overall Acceptance Rate69of307submissions,22%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader