[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/2525314.2525323acmconferencesArticle/Chapter ViewAbstractPublication PagesgisConference Proceedingsconference-collections
research-article

Haze: privacy-preserving real-time traffic statistics

Published: 05 November 2013 Publication History

Abstract

We consider mobile applications that let users learn traffic conditions based on reports from other users. However, the providers of these mobile services have access to such sensitive information as timestamped locations and movements of its users. In this paper, we introduce the model and general approach of Haze, a system for traffic-update applications that supports the creation of traffic statistics from user reports while protecting the privacy of the users. We also present preliminary experiments that indicate potential for a practical deployment of Haze.

References

[1]
R. Assam, M. Hassani, and T. Seidl. Differential private trajectory protection of moving objects. In ACM SIGSPATIAL Workshop on GeoStreaming, IWGS, pages 68--77, 2012.
[2]
T. Bhattacharya, L. Kulik, and J. Bailey. Extracting significant places from mobile user GPS trajectories: a bearing change based approach. In ACM Conf. on Advances in Geographic Information Systems, SIGSPATIAL, pages 398--401, 2012.
[3]
J. W. S. Brown, O. Ohrimenko, and R. Tamassia. Haze: Privacy-preserving real-time traffic statistics. CoRR, abs/1309.3515, 2013.
[4]
M. Burkhart, M. Strasser, D. Many, and X. Dimitropoulos. SEPIA: privacy-preserving aggregation of multi-domain network events and statistics. In USENIX Conf. on Security, 2010.
[5]
B. Carbunar, M. Rahman, J. Ballesteros, and N. Rishe. Eat the cake and have it too: Privacy preserving location aggregates in geosocial networks. CoRR, abs/1304.3513, 2013.
[6]
A. M. Davis, D. Chmelev, and M. R. Clarkson. Civitas: Implementation of a threshold cryptosystem. Computing and Information Science Technical Report, Cornell U., 2008. http://hdl.handle.net/1813/11661.
[7]
C. Dwork, F. McSherry, K. Nissim, and A. Smith. Calibrating noise to sensitivity in private data analysis. In Theory of Cryptography, TCC, pages 265--284, 2006.
[8]
V. V. Elango, S. Khoeini, Y. Xu, and R. Guensler. Longitudinal GPS travel data and breach of privacy via enhanced spatial and demographic analysis. In Transportation Research Board 92nd Annual Meeting, 2013.
[9]
L. Fan, L. Xiong, and V. Sunderam. Differentially private multi-dimensional time series release for traffic monitoring. In 27th Annual IFIP WG 11.3 Conference, DBSec, pages 33--48, 2013.
[10]
TAPASCologne Project. Accessed in June, 2013.
[11]
J. Krumm. Inference attacks on location tracks. In Int. Conf. on Pervasive Computing, PERVASIVE, pages 127--143, 2007.
[12]
A. Monreale, W. Wang, F. Pratesi, S. Rinzivillo, D. Pedreschi, G. Andrienko, and N. Andrienko. Privacy-preserving distributed movement data aggregation. In Geographic Information Science at the Heart of Europe, AGILE, pages 225--245, 2013.
[13]
R. A. Popa, A. J. Blumberg, H. Balakrishnan, and F. H. Li. Privacy and accountability for location-based aggregate statistics. In ACM Conf. on Computer and Communications Security, CCS, pages 653--666, 2011.
[14]
V. Rastogi and S. Nath. Differentially private aggregation of distributed time-series with transformation and encryption. In ACM Conf. on Management of Data, SIGMOD, pages 735--746, 2010.
[15]
E. Shi, T.-H. H. Chan, E. G. Rieffel, R. Chow, and D. Song. Privacy-preserving aggregation of time-series data. In Symp. on Network and Distributed System Security, NDSS, 2011.

Cited By

View all
  • (2020)R2DP: A Universal and Automated Approach to Optimizing the Randomization Mechanisms of Differential Privacy for Utility Metrics with No Known Optimal DistributionsProceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security10.1145/3372297.3417259(677-696)Online publication date: 30-Oct-2020
  • (2020)LocMIA: Membership Inference Attacks against Aggregated Location DataIEEE Internet of Things Journal10.1109/JIOT.2020.3001172(1-1)Online publication date: 2020
  • (2020)TrafficChain: A Blockchain-Based Secure and Privacy-Preserving Traffic MapIEEE Access10.1109/ACCESS.2020.29802988(60598-60612)Online publication date: 2020
  • Show More Cited By

Index Terms

  1. Haze: privacy-preserving real-time traffic statistics

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      SIGSPATIAL'13: Proceedings of the 21st ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems
      November 2013
      598 pages
      ISBN:9781450325219
      DOI:10.1145/2525314
      Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

      Sponsors

      In-Cooperation

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 05 November 2013

      Check for updates

      Author Tags

      1. privacy
      2. private aggregation
      3. traffic statistics

      Qualifiers

      • Research-article

      Funding Sources

      Conference

      SIGSPATIAL'13
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 257 of 1,238 submissions, 21%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)3
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 05 Jan 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2020)R2DP: A Universal and Automated Approach to Optimizing the Randomization Mechanisms of Differential Privacy for Utility Metrics with No Known Optimal DistributionsProceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security10.1145/3372297.3417259(677-696)Online publication date: 30-Oct-2020
      • (2020)LocMIA: Membership Inference Attacks against Aggregated Location DataIEEE Internet of Things Journal10.1109/JIOT.2020.3001172(1-1)Online publication date: 2020
      • (2020)TrafficChain: A Blockchain-Based Secure and Privacy-Preserving Traffic MapIEEE Access10.1109/ACCESS.2020.29802988(60598-60612)Online publication date: 2020
      • (2020)A Decentralized Weighted Vote Traffic Congestion Detection Framework for ITSSecurity and Privacy in Digital Economy10.1007/978-981-15-9129-7_18(249-262)Online publication date: 22-Oct-2020
      • (2020)Location-Based Games as Interfaces for Collecting User DataTrends and Innovations in Information Systems and Technologies10.1007/978-3-030-45691-7_59(631-642)Online publication date: 8-Jun-2020
      • (2019)Mobile participatory sensing with strong privacy guarantees using secure probesGeoInformatica10.1007/s10707-019-00389-4Online publication date: 20-Dec-2019
      • (2018)Volunteers in the Smart City: Comparison of Contribution Strategies on Human-Centered MeasuresSensors10.3390/s1811370718:11(3707)Online publication date: 31-Oct-2018
      • (2018)Privacy-preserving Wi-Fi AnalyticsProceedings on Privacy Enhancing Technologies10.1515/popets-2018-00102018:2(4-26)Online publication date: 1-Apr-2018
      • (2018)Ghost RidersIEEE/ACM Transactions on Networking10.1109/TNET.2018.281807326:3(1123-1136)Online publication date: 1-Jun-2018
      • (2018)Protecting Location Privacy for Task Allocation in Ad Hoc Mobile Cloud ComputingIEEE Transactions on Emerging Topics in Computing10.1109/TETC.2015.24900216:1(110-121)Online publication date: Jan-2018
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media