Privacy vulnerability of published anonymous mobility traces

Chris Y. T. Ma, David K. Y. Yau, N. Yip, N. Rao
{"title":"Privacy vulnerability of published anonymous mobility traces","authors":"Chris Y. T. Ma, David K. Y. Yau, N. Yip, N. Rao","doi":"10.1145/1859995.1860017","DOIUrl":null,"url":null,"abstract":"Mobility traces of people and vehicles have been collected and published to assist the design and evaluation of mobilee networks, such as large-scale urban sensing networks. Although the published traces are often made anonymous in that the true identities of nodes are replaced by random identifiers, the privacy concern remains. This is because in real life, nodes are open to observations in public spaces, or they may voluntarily or inadvertently disclose partial knowledge of their whereabouts. Thus, snapshots of nodes' location information can be learned by interested third parties, e.g., directly through chance/engineered meetings between the nodes and their observers, or indirectly through casual conversations or other information sources about people. In this paper, we investigate how an adversary, when equipped with a small amount of the snapshot information termed as side information, can infer an extended view of the whereabouts of a victim node appearing in an anonymous trace. Our results quantify the loss of victim nodes' privacy as a function of the nodal mobility (captured in both real and synthetic traces), the inference strategies of adversaries, and any noise that may appear in the trace or the side information. Generally, our results indicate that the privacy concern is significant in that a relatively small amount of side information is sufficient for the adversary to infer the true identity (either uniquely or with high probability) of a victim in a set of anonymous traces.","PeriodicalId":229719,"journal":{"name":"Proceedings of the sixteenth annual international conference on Mobile computing and networking","volume":"3 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"213","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the sixteenth annual international conference on Mobile computing and networking","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/1859995.1860017","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 213

Abstract

Mobility traces of people and vehicles have been collected and published to assist the design and evaluation of mobilee networks, such as large-scale urban sensing networks. Although the published traces are often made anonymous in that the true identities of nodes are replaced by random identifiers, the privacy concern remains. This is because in real life, nodes are open to observations in public spaces, or they may voluntarily or inadvertently disclose partial knowledge of their whereabouts. Thus, snapshots of nodes' location information can be learned by interested third parties, e.g., directly through chance/engineered meetings between the nodes and their observers, or indirectly through casual conversations or other information sources about people. In this paper, we investigate how an adversary, when equipped with a small amount of the snapshot information termed as side information, can infer an extended view of the whereabouts of a victim node appearing in an anonymous trace. Our results quantify the loss of victim nodes' privacy as a function of the nodal mobility (captured in both real and synthetic traces), the inference strategies of adversaries, and any noise that may appear in the trace or the side information. Generally, our results indicate that the privacy concern is significant in that a relatively small amount of side information is sufficient for the adversary to infer the true identity (either uniquely or with high probability) of a victim in a set of anonymous traces.
发布的匿名移动痕迹的隐私漏洞
人们和车辆的移动轨迹已经被收集和发布,以帮助设计和评估移动网络,如大规模的城市传感网络。虽然发布的跟踪通常是匿名的,因为节点的真实身份被随机标识符取代,但隐私问题仍然存在。这是因为在现实生活中,节点在公共空间中是开放的,或者它们可能自愿或无意地透露其所在位置的部分信息。因此,感兴趣的第三方可以了解节点位置信息的快照,例如,直接通过节点与其观察者之间的偶然/设计会议,或间接通过随意对话或其他有关人员的信息源。在本文中,我们研究了攻击者如何在配备少量被称为侧信息的快照信息时,可以推断出匿名跟踪中出现的受害者节点的位置的扩展视图。我们的结果将受害节点的隐私损失量化为节点移动性的函数(在真实和合成轨迹中捕获),对手的推理策略以及可能出现在轨迹或侧信息中的任何噪声。一般来说,我们的结果表明,隐私问题很重要,因为相对少量的侧信息足以让攻击者在一组匿名痕迹中推断出受害者的真实身份(无论是唯一的还是高概率的)。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信