[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.5555/1758156.1758167guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Inference attacks on location tracks

Published: 13 May 2007 Publication History

Abstract

Although the privacy threats and countermeasures associated with location data are well known, there has not been a thorough experiment to assess the effectiveness of either. We examine location data gathered from volunteer subjects to quantify how well four different algorithms can identify the subjects' home locations and then their identities using a freely available, programmable Web search engine. Our procedure can identify at least a small fraction of the subjects and a larger fraction of their home addresses. We then apply three different obscuration countermeasures designed to foil the privacy attacks: spatial cloaking, noise, and rounding. We show how much obscuration is necessary to maintain the privacy of all the subjects.

References

[1]
Agrawal, R. and R. Srikant. Privacy-Preserving Data Mining. in ACM SIGMOD Conference on Management of Data. 2000. Dallas, TX, USA: ACM Press.
[2]
Ashbrook, D. and T. Starner, Using GPS to Learn Significant Locations and Predict Movement across Multiple Users. Personal and Ubiquitous Computing, 2003. 7(5): p. 275-286.
[3]
Barbaro, M. and T.Z. Jr., A Face Is Exposed for AOL Searcher No. 4417749, in New York Times. 2006: New York, NY USA.
[4]
Beresford, A.R. and F. Stajano, Location Privacy in Pervasive Computing, in IEEE Pervasive Computing. 2003. p. 46-55.
[5]
Consolvo, S., et al. Location Disclosure to Social Relations: Why, When, & What People Want to Share. in CHI '05: Proceedings of the SIGCHI Conference on Human factors in Computing Systems. 2005. New York, NY.
[6]
Danezis, G., S. Lewis, and R. Anderson. How Much is Location Privacy Worth? in Fourth Workshop on the Economics of Information Security. 2005. Harvard University.
[7]
Duckham, M. and L. Kulik, Location Privacy and Location-Aware Computing, in Dynamic & Mobile GIS: Investigating Change in Space and Time, J. Drummond, et al., Editors. 2006, CRC Press: Boca Raton, FL.
[8]
Gendar, A. and A. Lisberg, How Cell Phone Helped Cops Nail Key Murder Suspect, in Daily News. 2006: New York.
[9]
Gruteser, M. and D. Grunwald. Anonymous Usage of Location-Based Services through Spatial and Temporal Cloaking. in of First ACM/USENIX International Conference on Mobile Systems, Applications, and Services (MobiSys 2003). 2003. San Francisco, CA USA.
[10]
Hariharan, R., J. Krumm, and E. Horvitz. Web-Enhanced GPS. in First International Workshop on Location- and Context-Awareness (LoCA 2005). 2005. Oberpfaffenhofen, Germany: Springer.
[11]
Hariharan, R. and K. Toyama. Project Lachesis: Parsing and Modeling Location Histories. in Third International Conference on GIScience. 2004. Adelphi, MD.
[12]
Hightower, J., et al. Learning and Recognizing the Places We Go. in UbiComp 2005: Ubiquitous Computing. 2005.
[13]
Hoh, B., et al., Enhancing Security and Privacy in Traffic-Monitoring Systems, in IEEE Pervasive Computing. 2006. p. 38-46.
[14]
http://www.microsoft.com/downloads/details.aspx?FamilyId=C271309B-02DE-42A7-B23EE19F68667197& displaylang=en.
[15]
http://www.openstreetmap.org/.
[16]
Iachello, G., et al. Control, Deception, and Communication: Evaluating the Deployment of a Location-Enhanced Messaging Service. in UbiComp 2005: Ubiquitous Computing. 2005. Tokyo, Japan.
[17]
Kaasinen, E., User Needs for Location-Aware Mobile Services. Personal and Ubiquitous Computing, 2003. 7(1): p. 70-79.
[18]
Kang, J.H., et al. Extracting Places from Traces of Locations. in 2nd ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots (WMASH'04),. 2004.
[19]
Krumm, J. and E. Horvitz. Predestination:Inferring Destinations from Partial Trajectories. in Eighth International Conference on Ubiquitous Computing (UbiComp 2006). 2006. Orange County, CA USA.
[20]
Letchner, J., J. Krumm, and E. Horvitz. Trip Router with Individualized Preferences (TRIP): Incorporating Personalization into Route Planning. in Eighteenth Conference on Innovative Applications of Artificial Intelligence (IAAI-06). 2006. Cambridge, MA USA.
[21]
Liao, L., D. Fox, and H.A. Kautz. Location-Based Activity Recognition using Relational Markov Networks. in Nineteenth International Joint Conference on Artificial Intelligence (IJCAI 2005). 2005. Edinburgh, Scotland.
[22]
Lorkowski, S., et al. Towards Area-Wide Traffic Monitoring-Applications Derived from Probe Vehicle Data. in 8th International Conference on Applications of Advanced Technologies in Transportation Engineering. 2004. Beijing, China.
[23]
Marmasse, N., Providing Lightweight Telepresence in Mobile Communication to Enhance Collaborative Living, in Program in Media Arts and Sciences, School of Architecture and Planning. 2004, MIT: Cambridge, MA, USA. p. 124.
[24]
Marmasse, N. and C. Schmandt. Location-Aware Information Delivery with comMotion. in HUC 2K: 2nd International Symposium on Handheld and Ubiquitous Computing. 2000. Bristol, UK: Springer.
[25]
Orland, K., Stalker Victims Should Check For GPS. 2003, Associated Press on CBS News at http://www.cbsnews.com/stories/2003/02/06/tech/main539596.shtml.
[26]
Patterson, D.J., et al. Opportunity Knocks: A System to Provide Cognitive Assistance with Transportation Services. in UbiComp 2004: Ubiquitous Computing. 2004. Nottingham, UK: Springer.
[27]
Pfitzmann, A. and M. Kohntopp, Anonymity, Unobservability and Pseudonymity -- A Proposal for Terminology, in Designing Privacy Enhancing Technologies, H. Federath, Editor. 2001, Springer-Verlag. p. 1-9.
[28]
Schilit, B., J. Hong, and M. Gruteser, Wireless Location Privacy Protection, in IEEE Computer. 2003. p. 135-137.
[29]
Scott, D., A. Beresford, and A. Mycroft. Spatial Security Policies for Mobile Agents in a Sentient Computing Environment. in 6th Fundamental Approaches to Software Engineering (FASE). 2003. Warsaw, Poland: Springer-Verlag.
[30]
Subramanya, A., et al. Recognizing Activities and Spatial Context Using Wearable Sensors. in 21st Conference on Uncertainty in Artificial Intelligence (UAI06). 2006. Cambridge, MA.

Cited By

View all
  • (2024)Learning Location From Shared Elevation Profiles in Fitness Apps: A Privacy PerspectiveIEEE Transactions on Mobile Computing10.1109/TMC.2022.321814823:1(581-596)Online publication date: 1-Jan-2024
  • (2023)Detecting and Measuring Aggressive Location Harvesting in Mobile Apps via Data-flow Path EmbeddingProceedings of the ACM on Measurement and Analysis of Computing Systems10.1145/35794477:1(1-27)Online publication date: 2-Mar-2023
  • (2023)Sensing Care Through Design: A Speculative Role-play Approach to "Living with" Sensor-supported Care NetworksProceedings of the 2023 ACM Designing Interactive Systems Conference10.1145/3563657.3596066(1660-1675)Online publication date: 10-Jul-2023
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
PERVASIVE'07: Proceedings of the 5th international conference on Pervasive computing
May 2007
369 pages
ISBN:9783540720362
  • Editors:
  • Anthony LaMarca,
  • Marc Langheinrich,
  • Khai N. Truong

Sponsors

  • SMART Technologies Inc.
  • FX Palo Alto Laboratory, Inc.: FX Palo Alto Laboratory, Inc.
  • Nokia
  • Google Inc.
  • Intel: Intel

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 13 May 2007

Author Tags

  1. inference attack
  2. location
  3. location tracks
  4. privacy

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 16 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Learning Location From Shared Elevation Profiles in Fitness Apps: A Privacy PerspectiveIEEE Transactions on Mobile Computing10.1109/TMC.2022.321814823:1(581-596)Online publication date: 1-Jan-2024
  • (2023)Detecting and Measuring Aggressive Location Harvesting in Mobile Apps via Data-flow Path EmbeddingProceedings of the ACM on Measurement and Analysis of Computing Systems10.1145/35794477:1(1-27)Online publication date: 2-Mar-2023
  • (2023)Sensing Care Through Design: A Speculative Role-play Approach to "Living with" Sensor-supported Care NetworksProceedings of the 2023 ACM Designing Interactive Systems Conference10.1145/3563657.3596066(1660-1675)Online publication date: 10-Jul-2023
  • (2021)An Improved Dummy Generation Approach for Enhancing User Location PrivacyDatabase Systems for Advanced Applications10.1007/978-3-030-73200-4_33(487-495)Online publication date: 11-Apr-2021
  • (2019)On (the lack of) location privacy in crowdsourcing applicationsProceedings of the 28th USENIX Conference on Security Symposium10.5555/3361338.3361467(1859-1876)Online publication date: 14-Aug-2019
  • (2019)A billion open interfaces for eve and malloryProceedings of the 28th USENIX Conference on Security Symposium10.5555/3361338.3361342(37-54)Online publication date: 14-Aug-2019
  • (2019)pRideProceedings of the International Symposium on Quality of Service10.1145/3326285.3329062(1-10)Online publication date: 24-Jun-2019
  • (2019)Fixing Mislabeling by Human Annotators Leveraging Conflict Resolution and Prior KnowledgeProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/33144193:1(1-23)Online publication date: 29-Mar-2019
  • (2019)FOUGERE: User-Centric Location Privacy in Mobile Crowdsourcing AppsDistributed Applications and Interoperable Systems10.1007/978-3-030-22496-7_8(116-132)Online publication date: 17-Jun-2019
  • (2018)Method of trajectory privacy protection based on restraining trajectory in LBSInternational Journal of Information and Communication Technology10.1504/IJICT.2018.09432113:3(329-339)Online publication date: 1-Jan-2018
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media