ABSTRACT
In recent years, the rapid spread of smartphones has led to the increasing popularity of Location-Based Social Networks (LBSNs). Although a number of research studies and articles in the press have shown the dangers of exposing personal location data, the inherent nature of LBSNs encourages users to publish information about their current location (i.e., their check-ins). The same is true for the majority of the most popular social networking websites, which offer the possibility of associating the current location of users to their posts and photos. Moreover, some LBSNs, such as Foursquare, let users tag their friends in their check-ins, thus potentially releasing location information of individuals that have no control over the published data. This raises additional privacy concerns for the management of location information in LBSNs.
In this paper we propose and evaluate a series of techniques for the identification of users from their check-in data. More specifically, we first present two strategies according to which users are characterized by the spatio-temporal trajectory emerging from their check-ins over time and the frequency of visit to specific locations, respectively. In addition to these approaches, we also propose a hybrid strategy that is able to exploit both types of information. It is worth noting that these techniques can be applied to a more general class of problems where locations and social links of individuals are available in a given dataset. We evaluate our techniques by means of three real-world LBSNs datasets, demonstrating that a very limited amount of data points is sufficient to identify a user with a high degree of accuracy. For instance, we show that in some datasets we are able to classify more than 80% of the users correctly.
- D. Ashbrook and T. Starner. Using GPS to Learn Significant Locations and Predict Movement Across Multiple Users. Personal and Ubiquitous Computing, 7(5):275--286, 2003. Google ScholarDigital Library
- A. R. Beresford and F. Stajano. Location privacy in pervasive computing. IEEE Pervasive Computing, 2(1):46--55, 2003. Google ScholarDigital Library
- D. J. Berndt and J. Clifford. Using dynamic time warping to find patterns in time series. In Proceedings of the AAAI-94 Workshop on Knowledge Discovery in Databases, volume 10, pages 359--370. Seattle, WA, 1994.Google Scholar
- C. Bettini, X. S. Wang, and S. Jajodia. Protecting privacy against location-based personal identification. In Secure Data Management, pages 185--199. Springer, 2005. Google ScholarDigital Library
- J. Bohn, V. Coroam\ua, M. Langheinrich, F. Mattern, and M. Rohs. Social, economic, and ethical implications of ambient intelligence and ubiquitous computing. In Ambient Intelligence, pages 5--29. Springer, 2005.Google ScholarCross Ref
- E. Cho, S. A. Myers, and J. Leskovec. Friendship and mobility: User movement in location-based social networks. In Proceedings of SIGKDD'11, pages 1082--1090. ACM, 2011. Google ScholarDigital Library
- C.-Y. Chow and M. F. Mokbel. Trajectory privacy in location-based services and data publication. ACM SIGKDD Explorations Newsletter, 13(1):19--29, 2011. Google ScholarDigital Library
- T. M. Cover and J. A. Thomas. Elements of information theory. John Wiley & Sons, 2012.Google ScholarDigital Library
- Y.-A. de Montjoye, C. A. Hidalgo, M. Verleysen, and V. D. Blondel. Unique in the crowd: The privacy bounds of human mobility. Scientific Reports, 3, 2013.Google Scholar
- M.-P. Dubuisson and A. K. Jain. A Modified Hausdorff Distance for Object Matching. In Proceedings of ICPR'94, pages 566--568, 1994.Google ScholarCross Ref
- C. Dwork. Differential privacy: A survey of results. In Theory and Applications of Models of Computation, pages 1--19. Springer, 2008. Google ScholarDigital Library
- T. Eiter and H. Mannila. Computing Discrete Fréchet Distance. Technical report, Technische Universitat Wien, 1994.Google Scholar
- H. Gao, J. Tang, and H. Liu. Exploring social-historical ties on location-based social networks. In Proceedings of ICWSM'12, 2012.Google Scholar
- H. Gao, J. Tang, and H. Liu. gSCorr: modeling geo-social correlations for new check-ins on location-based social networks. In Proceedings of CIKM'12, pages 1582--1586. ACM, 2012. Google ScholarDigital Library
- J. F. Gómez-Lopera, J. Martínez-Aroza, A. M. Robles-Pérez, and R. Román-Roldán. An analysis of edge detection by using the jensen-shannon divergence. Journal of Mathematical Imaging and Vision, 13(1):35--56, 2000. Google ScholarDigital Library
- M. C. Gonzalez, C. A. Hidalgo, and A.-L. Barabasi. Understanding individual human mobility patterns. Nature, 453(7196):779--782, 2008.Google ScholarCross Ref
- M. Gruteser and D. Grunwald. Anonymous usage of location-based services through spatial and temporal cloaking. In Proceedings of MobiSys'03, pages 31--42. ACM, 2003. Google ScholarDigital Library
- K. Joseph, C. H. Tan, and K. M. Carley. Beyond Local, Categories and Friends: Clustering Foursquare Users with Latent Topics. In Proceedings of UbiComp'12, pages 919--926. ACM, 2012. Google ScholarDigital Library
- P. Kalnis, G. Ghinita, K. Mouratidis, and D. Papadias. Preventing location-based identity inference in anonymous spatial queries. IEEE Transactions on Knowledge and Data Engineering, 19(12):1719--1733, 2007. Google ScholarDigital Library
- J. Krumm. A survey of computational location privacy. Personal and Ubiquitous Computing, 13(6):391--399, 2009. Google ScholarDigital Library
- J. Lin. Divergence Measures based on the Shannon Entropy. IEEE Transactions on Information Theory, 37(1):145--151, 1991. Google ScholarDigital Library
- C. Y. T. Ma, D. K. Y. Yau, N. K. Yip, and N. S. Rao. Privacy vulnerability of published anonymous mobility traces. IEEE/ACM Transactions on Networking, 21(3):720--733, 2013. Google ScholarDigital Library
- E. Malmi, T. M. T. Do, and D. Gatica-Perez. From Foursquare to My Square: Learning Check-in Behavior from Multiple Sources. In Proceedings of ICWSM'13, 2013.Google Scholar
- C. D. Manning, P. Raghavan, and H. Schütze. Introduction to Information Retrieval. Cambridge University Press, 2008. Google ScholarDigital Library
- A. McCallum and K. Nigam. A comparison of event models for naive bayes text classification. In Proceeding of the AAAI-98 Workshop on Learning for Text Categorization, volume 752, pages 41--48, 1998.Google Scholar
- A. Narayanan and V. Shmatikov. Robust de-anonymization of large sparse datasets. In Proceedings of SP'08, pages 111--125. IEEE, 2008. Google ScholarDigital Library
- A. Noulas, S. Scellato, R. Lambiotte, M. Pontil, and C. Mascolo. A tale of many cities: Universal patterns in human urban mobility. PLOS ONE, 7(5):e37027, 2012.Google ScholarCross Ref
- T. Pontes, G. Magno, M. Vasconcelos, A. Gupta, J. Almeida, P. Kumaraguru, and V. Almeida. Beware of what you share: Inferring home location in social networks. In Proceedings of ICDM'12 Workshops, pages 571--578. IEEE, 2012. Google ScholarDigital Library
- T. Pontes, M. Vasconcelos, J. Almeida, P. Kumaraguru, and V. Almeida. We Know Where you Live: Privacy Characterization of Foursquare Behavior. In Proceedings of UbiComp'12, pages 898--905. ACM, 2012. Google ScholarDigital Library
- C. C. Robusto. The Cosine-Haversine formula. The American Mathematical Monthly, 64(1):38--40, 1957.Google ScholarCross Ref
- C. Ruiz Vicente, D. Freni, C. Bettini, and C. S. Jensen. Location-related privacy in geo-social networks. IEEE Internet Computing, 15(3):20--27, 2011. Google ScholarDigital Library
- J.-R. Sack and J. Urrutia. Handbook of Computational Geometry. North Holland, 1999. Google ScholarDigital Library
- L. Sweeney. k-anonymity: A model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 10(05):557--570, 2002. Google ScholarDigital Library
- M. A. Vasconcelos, S. Ricci, J. Almeida, F. Benevenuto, and V. Almeida. Tips, Dones and Todos: Uncovering User Profiles in Foursquare. In Proceedings of WSDM'12, pages 653--662. ACM, 2012. Google ScholarDigital Library
- Y. Zheng, Q. Li, Y. Chen, X. Xie, and W.-Y. Ma. Understanding Mobility based on GPS Data. In Proceedings of UbiComp'08, pages 312--321. ACM, 2008. Google ScholarDigital Library
Index Terms
- It's the way you check-in: identifying users in location-based social networks
Recommendations
Characterizing users' check-in activities using their scores in a location-based social network
Analysis of users' check-ins in location-based social networks (LBSNs, also called GeoSocial Networks), such as Foursquare and Yelp, is essential to understand users' mobility patterns and behaviors. However, most empirical results of users' mobility ...
Hidden location prediction using check-in patterns in location-based social networks
Check-in facility in a location-based social network (LBSN) enables people to share location information as well as real-life activities. Analysing these historical series of check-ins to predict the future locations to be visited has been very popular ...
Personalized POI recommendation based on check-in data and geographical-regional influence
ICMLSC '19: Proceedings of the 3rd International Conference on Machine Learning and Soft ComputingNowadays, many people like to share the places they visited to their friends in the location-based social networks (LBSNs). Therefore, LBSNs have accumulated large-scale user check-in data and the availability of these data enables many location-based ...
Comments