地理定位司机:网约车服务中敏感数据泄露的研究

Qingchuan Zhao, Chaoshun Zuo, Giancarlo Pellegrino, Zhiqiang Lin
{"title":"地理定位司机:网约车服务中敏感数据泄露的研究","authors":"Qingchuan Zhao, Chaoshun Zuo, Giancarlo Pellegrino, Zhiqiang Lin","doi":"10.14722/ndss.2019.23052","DOIUrl":null,"url":null,"abstract":"Increasingly, mobile application-based ride-hailing \nservices have become a very popular means of transportation. \nDue to the handling of business logic, these services also contain \na wealth of privacy-sensitive information such as GPS locations, \ncar plates, driver licenses, and payment data. Unlike many of \nthe mobile applications in which there is only one type of users, \nride-hailing services face two types of users: riders and drivers. \nWhile most of the efforts had focused on the rider’s privacy, \nunfortunately, we notice little has been done to protect drivers. \nTo raise the awareness of the privacy issues with drivers, in \nthis paper we perform the first systematic study of the drivers’ \nsensitive data leakage in ride-hailing services. More specifically, \nwe select 20 popular ride-hailing apps including Uber and Lyft \nand focus on one particular feature, namely the nearby cars \nfeature. Surprisingly, our experimental results show that largescale \ndata harvesting of drivers is possible for all of the ridehailing \nservices we studied. In particular, attackers can determine \nwith high-precision the driver’s privacy-sensitive information \nincluding mostly visited address (e.g., home) and daily driving behaviors. \nMeanwhile, attackers can also infer sensitive information \nabout the business operations and performances of ride-hailing \nservices such as the number of rides, utilization of cars, and \npresence on the territory. In addition to presenting the attacks, \nwe also shed light on the countermeasures the service providers \ncould take to protect the driver’s sensitive information.","PeriodicalId":20444,"journal":{"name":"Proceedings 2019 Network and Distributed System Security Symposium","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"29","resultStr":"{\"title\":\"Geo-locating Drivers: A Study of Sensitive Data Leakage in Ride-Hailing Services\",\"authors\":\"Qingchuan Zhao, Chaoshun Zuo, Giancarlo Pellegrino, Zhiqiang Lin\",\"doi\":\"10.14722/ndss.2019.23052\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Increasingly, mobile application-based ride-hailing \\nservices have become a very popular means of transportation. \\nDue to the handling of business logic, these services also contain \\na wealth of privacy-sensitive information such as GPS locations, \\ncar plates, driver licenses, and payment data. Unlike many of \\nthe mobile applications in which there is only one type of users, \\nride-hailing services face two types of users: riders and drivers. \\nWhile most of the efforts had focused on the rider’s privacy, \\nunfortunately, we notice little has been done to protect drivers. \\nTo raise the awareness of the privacy issues with drivers, in \\nthis paper we perform the first systematic study of the drivers’ \\nsensitive data leakage in ride-hailing services. More specifically, \\nwe select 20 popular ride-hailing apps including Uber and Lyft \\nand focus on one particular feature, namely the nearby cars \\nfeature. Surprisingly, our experimental results show that largescale \\ndata harvesting of drivers is possible for all of the ridehailing \\nservices we studied. In particular, attackers can determine \\nwith high-precision the driver’s privacy-sensitive information \\nincluding mostly visited address (e.g., home) and daily driving behaviors. \\nMeanwhile, attackers can also infer sensitive information \\nabout the business operations and performances of ride-hailing \\nservices such as the number of rides, utilization of cars, and \\npresence on the territory. In addition to presenting the attacks, \\nwe also shed light on the countermeasures the service providers \\ncould take to protect the driver’s sensitive information.\",\"PeriodicalId\":20444,\"journal\":{\"name\":\"Proceedings 2019 Network and Distributed System Security Symposium\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-02-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"29\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings 2019 Network and Distributed System Security Symposium\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.14722/ndss.2019.23052\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings 2019 Network and Distributed System Security Symposium","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.14722/ndss.2019.23052","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 29

摘要

基于移动应用的网约车服务日益成为一种非常受欢迎的交通工具。由于处理业务逻辑,这些服务还包含大量隐私敏感信息,如GPS位置、车牌、驾驶执照和支付数据。与许多只有一类用户的移动应用程序不同,网约车服务面临两类用户:乘客和司机。虽然大部分的努力都集中在乘客的隐私上,但不幸的是,我们注意到在保护司机方面做得很少。为了提高司机对隐私问题的认识,本文首次对网约车服务中司机敏感数据的泄露进行了系统研究。更具体地说,我们选择了包括优步和Lyft在内的20个流行的叫车应用,并专注于一个特定的功能,即附近的汽车功能。令人惊讶的是,我们的实验结果表明,在我们研究的所有网约车服务中,大规模收集司机数据是可能的。特别是,攻击者可以高精度地确定司机的隐私敏感信息,包括最常访问的地址(如家)和日常驾驶行为。同时,攻击者还可以推断出网约车服务的业务运营和性能的敏感信息,如乘坐次数、车辆使用情况、在该区域的存在情况等。除了介绍攻击之外,我们还介绍了服务提供商可以采取的对策,以保护驾驶员的敏感信息。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Geo-locating Drivers: A Study of Sensitive Data Leakage in Ride-Hailing Services
Increasingly, mobile application-based ride-hailing services have become a very popular means of transportation. Due to the handling of business logic, these services also contain a wealth of privacy-sensitive information such as GPS locations, car plates, driver licenses, and payment data. Unlike many of the mobile applications in which there is only one type of users, ride-hailing services face two types of users: riders and drivers. While most of the efforts had focused on the rider’s privacy, unfortunately, we notice little has been done to protect drivers. To raise the awareness of the privacy issues with drivers, in this paper we perform the first systematic study of the drivers’ sensitive data leakage in ride-hailing services. More specifically, we select 20 popular ride-hailing apps including Uber and Lyft and focus on one particular feature, namely the nearby cars feature. Surprisingly, our experimental results show that largescale data harvesting of drivers is possible for all of the ridehailing services we studied. In particular, attackers can determine with high-precision the driver’s privacy-sensitive information including mostly visited address (e.g., home) and daily driving behaviors. Meanwhile, attackers can also infer sensitive information about the business operations and performances of ride-hailing services such as the number of rides, utilization of cars, and presence on the territory. In addition to presenting the attacks, we also shed light on the countermeasures the service providers could take to protect the driver’s sensitive information.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信