skip to main content
10.1145/2808138.2808150acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
short-paper

The Same-Origin Attack against Location Privacy

Published:12 October 2015Publication History

ABSTRACT

A plethora of applications benefit from location context, but a person's whereabouts can be linked to her personal sensitive information. Hence, protection mechanisms have been proposed that add systematic noise to a user's location before sending it out of the user's device. We describe the same-origin attack, to which a group of such mechanisms are vulnerable, we evaluate it against two mechanisms (spatial cloaking and geo-indistinguishability), and we propose our own mechanism, inspired by the maximum entropy principle. We find that spatial cloaking is much worse than the other two, and the maximum-entropy mechanism performs slightly better than geo-indistinguishability. Designing an optimal mechanism remains an open problem.

References

  1. M. E. Andrés, N. E. Bordenabe, K. Chatzikokolakis, and C. Palamidessi. Geo-indistinguishability: Differential privacy for location-based systems. In CCS 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. K. Chatzikokolakis, M. E. Andrés, N. E. Bordenabe, and C. Palamidessi. Broadening the scope of differential privacy using metrics. In PETS 2013.Google ScholarGoogle Scholar
  3. K. Chatzikokolakis, C. Palamidessi, and M. Stronati. A predictive differentially-private mechanism for mobility traces. In PETS 2014.Google ScholarGoogle Scholar
  4. T. Cover, and J. Thomas. Elements of Information Theory. John Wiley and Sons, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. C. Dwork. Differential privacy. In LNCS 4052, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. K. Fawaz, and K. Shin. Location privacy protection for smartphone users. In CCS 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. R. Shokri, G. Theodorakopoulos, J.-Y. Le Boudec, and J.-P. Hubaux. Quantifying location privacy. In SP 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. R. Shokri, G. Theodorakopoulos, C. Troncoso, J.-P. Hubaux, and J.-Y. Le Boudec. Protecting location privacy: optimal strategy against localization attacks. In CCS 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. G. Theodorakopoulos, R. Shokri, C. Troncoso, J.-P. Hubaux, and J.-Y. Le Boudec. Prolonging the hide-and-seek game: Optimal trajectory privacy for location-based services. In WPES 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. The Same-Origin Attack against Location Privacy

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            WPES '15: Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society
            October 2015
            142 pages
            ISBN:9781450338202
            DOI:10.1145/2808138

            Copyright © 2015 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 12 October 2015

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • short-paper

            Acceptance Rates

            WPES '15 Paper Acceptance Rate11of32submissions,34%Overall Acceptance Rate106of355submissions,30%

            Upcoming Conference

            CCS '24
            ACM SIGSAC Conference on Computer and Communications Security
            October 14 - 18, 2024
            Salt Lake City , UT , USA

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader