[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3678717.3691211acmconferencesArticle/Chapter ViewAbstractPublication PagesgisConference Proceedingsconference-collections
research-article
Open access

Protecting Vehicle Location Privacy with Contextually-Driven Synthetic Location Generation

Published: 22 November 2024 Publication History

Abstract

Geo-obfuscation is a Location Privacy Protection Mechanism used in location-based services that allows users to report obfuscated locations instead of exact ones. A formal privacy criterion, geoindistinguishability (Geo-Ind), requires real locations to be hard to distinguish from nearby locations (by attackers) based on their obfuscated representations. However, Geo-Ind often fails to consider context, such as road networks and vehicle traffic conditions, making it less effective in protecting the location privacy of vehicles, of which the mobility are heavily influenced by these factors.
In this paper, we introduce VehiTrack, a new threat model to demonstrate the vulnerability of Geo-Ind in protecting vehicle location privacy from context-aware inference attacks. Our experiments demonstrate that VehiTrack can accurately determine exact vehicle locations from obfuscated data, reducing average inference errors by 61.20% with Laplacian noise and 47.35% with linear programming (LP) compared to traditional Bayesian attacks. By using contextual data like road networks and traffic flow, VehiTrack effectively eliminates a significant number of seemingly "impossible" locations during its search for the actual location of the vehicles. Based on these insights, we propose TransProtect, a new geo-obfuscation approach that limits obfuscation to realistic vehicle movement patterns, complicating attackers' ability to differentiate obfuscated from actual locations. Our results show that TransProtect increases VehiTrack's inference error by 57.75% with Laplacian noise and 27.21% with LP, significantly enhancing protection against these attacks.

References

[1]
L. Wang, D. Yang, X. Han, T. Wang, D. Zhang, and X. Ma. Location privacy-preserving task allocation for mobile crowdsensing with differential geoobfuscation. In Proc. of ACM WWW, pages 627--636, 2017.
[2]
C. Qiu, A. C. Squicciarini, C. Pang, N. Wang, and B. Wu. Location privacy protection in vehicle-based spatial crowdsourcing via geo-indistinguishability. IEEE Transactions on Mobile Computing, pages 1--1, 2020.
[3]
H. To, G. Ghinita, L. Fan, and C. Shahabi. Differentially private location protection for worker datasets in spatial crowdsourcing. IEEE Transactions on Mobile Computing, pages 934--949, 2017.
[4]
L. Yu, L. Liu, and C. Pu. Dynamic differential location privacy with personalized error bounds. In Proc. of IEEE NDSS, 2017.
[5]
M. E. Andrés, N. E. Bordenabe, K. Chatzikokolakis, and C. Palamidessi. Geoindistinguishability: Differential privacy for location-based systems. In Proc. of ACM CCS, pages 901--914, 2013.
[6]
N. E. Bordenabe, K. Chatzikokolakis, and C. Palamidessi. Optimal geoindistinguishable mechanisms for location privacy. In Proc. of ACM CCS, pages 251--262, 2014.
[7]
Chong Huang, Peter Kairouz, Xiao Chen, Lalitha Sankar, and Ram Rajagopal. Generative adversarial privacy, 2018.
[8]
L. Liao, D.J. Patterson, D. Fox, and H. Kautz. Learning and inferring transportation routines. Artificial Intelligence, 171(5):311 - 331, 2007.
[9]
F. Xu, Z. Tu, Y. Li, P. Zhang, X. Fu, and D. Jin. Trajectory recovery from ash: User privacy is not preserved in aggregated mobility data. In Proc. of ACM WWW, page 1241--1250, 2017.
[10]
Yang Cao, Masatoshi Yoshikawa, Yonghui Xiao, and Li Xiong. Quantifying differential privacy under temporal correlations. In Proc. of 2017 IEEE 33rd International Conference on Data Engineering (ICDE), pages 821--832, 2017.
[11]
T. Emrich, H. Kriegel, N. Mamoulis, M. Renz, and A. Zufle. Querying uncertain spatio-temporal data. In Proc. of IEEE ICDE, pages 354--365, 2012.
[12]
Q. Li, Y. Zheng, X. Xie, Y. Chen, W. Liu, and W. Ma. Mining user similarity based on location history. In Proc. of SIGSPATIAL, 2008.
[13]
Qasim Ali Arain, Imran Memon, Zhongliang Deng, Muhammad Hammad Memon, Farman Ali Mangi, and Asma Zubedi. Location monitoring approach: Multiple mix-zones with location privacy protection based on traffic flow over road networks. Multimedia Tools Appl., 77(5):5563--5607, mar 2018.
[14]
Y. Cao, Y. Xiao, L. Xiong, and L. Bai. Priste: From location privacy to spatiotemporal event privacy. In Proc. of IEEE ICDE, pages 1606--1609, 2019.
[15]
W. Li, H. Chen, W. Ku, and X. Qin. Scalable spatiotemporal crowdsourcing for smart cities based on particle filtering. In Proc. of ACM SIGSPATIAL, 2017.
[16]
G. Ghinita, M. L. Damiani, C. Silvestri, and E. Bertino. Preventing velocity-based linkage attacks in location-aware applications. In Proc. of ACM SIGSPATIAL, page 246--255, 2009.
[17]
Y. Xiao and L. Xiong. Protecting locations with differential privacy under temporal correlations. In Proc. of CCS, page 1298--1309, 2015.
[18]
C. Qiu, L. Yan, A. Squicciarini, J. Zhao, C. Xu, and P. Pappachan. Trafficadaptor: An adaptive obfuscation strategy for vehicle location privacy against vehicle traffic flow aware attacks. In Proc. of ACM SIGSPATIAL, 2022.
[19]
Shafiza Ariffin Kashinath, Salama A. Mostafa, Aida Mustapha, Hairulnizam Mahdin, David Lim, Moamin A. Mahmoud, Mazin Abed Mohammed, Bander Ali Saleh Al-Rimy, Mohd Farhan Md Fudzee, and Tan Jhon Yang. Review of data fusion methods for real-time and multi-sensor traffic flow analysis. IEEE Access, 9:51258--51276, 2021.
[20]
Tsuyoshi Idé, Takayuki Katsuki, Tetsuro Morimura, and Robert Morris. City-wide traffic flow estimation from a limited number of low-quality cameras. IEEE Transactions on Intelligent Transportation Systems, 18(4):950--959, 2017.
[21]
Zhen Liu, Ruoyu Wang, Nathalie Japkowicz, Yongming Cai, Deyu Tang, and Xianfa Cai. Mobile app traffic flow feature extraction and selection for improving classification robustness. Journal of Network and Computer Applications, 125:190--208, 2019.
[22]
Tianyang Lin, Yuxin Wang, Xiangyang Liu, and Xipeng Qiu. A survey of transformers, 2021.
[23]
Y. Chen, H. Zhang, W. Sun, and B. Zheng. Rntrajrec: Road network enhanced trajectory recovery with spatial-temporal transformer. In 2023 IEEE 39th International Conference on Data Engineering (ICDE), pages 829--842, Los Alamitos, CA, USA, apr 2023. IEEE Computer Society.
[24]
Aditya Grover and Jure Leskovec. node2vec: Scalable feature learning for networks. In Proceedings of the 22nd ACM SIGKDD international conference on Knowledge discovery and data mining, pages 855--864, 2016.
[25]
Thomas N. Kipf and Max Welling. Semi-supervised classification with graph convolutional networks. In International Conference on Learning Representations, 2017.
[26]
Lorenzo Bracciale, Marco Bonola, Pierpaolo Loreti, Giuseppe Bianchi, Raul Amici, and Antonello Rabuffi. CRAWDAD dataset roma/taxi (v. 2014-07-17). Downloaded from https://crawdad.org/roma/taxi/20140717, July 2014.
[27]
R. Shokri, G. Theodorakopoulos, C. Troncoso, J. Hubaux, and J. L. Boudec. Protecting location privacy: Optimal strategy against localization attacks. In Proc. of ACM CCS, pages 617--627, 2012.
[28]
C. Qiu, A. C. Squicciarini, Z. Li, C. Pang, and L. Yan. Time-efficient geoobfuscation to protect worker location privacy over road networks in spatial crowdsourcing. In Proc. of ACM CIKM, 2020.
[29]
Harsh Bhasin. Algorithms: Design and Analysis. Oxford Univ Press, 2015.
[30]
Zheng Zhao, Weihai Chen, Xingming Wu, Peter C. Y. Chen, and Jingmeng Liu. Lstm network: a deep learning approach for short-term traffic forecast. IET Intelligent Transport Systems, 11(2):68--75, 2017.
[31]
Li Yan, Haiying Shen, Zhuozhao Li, Ankur Sarker, John A. Stankovic, Chenxi Qiu, Juanjuan Zhao, and Chengzhong Xu. Employing opportunistic charging for electric taxicabs to reduce idle time. ACM IMWUT, 2(1):47:1--47:25, March 2018.
[32]
Zhiheng Huang, Wei Xu, and Kai Yu. Bidirectional lstm-crf models for sequence tagging, 2015.
[33]
Tomas Mikolov, Ilya Sutskever, Kai Chen, Greg S Corrado, and Jeff Dean. Distributed representations of words and phrases and their compositionality. In C.J. Burges, L. Bottou, M. Welling, Z. Ghahramani, and K.Q. Weinberger, editors, Advances in Neural Information Processing Systems, volume 26. Curran Associates, Inc., 2013.
[34]
San Francisco taxi trajectories. https://ieee-dataport.org/open-access/crawdad-epflmobility, 2023. Accessed in July 2023.
[35]
openstreetmap. https://www.openstreetmap.org/, 2020. Accessed: 2020-04-07.
[36]
PyTorch 2.1: automatic dynamic shape compilation, distributed checkpointing. https://pytorch.org/blog/pytorch-2-1/2023. Accessed in November 2023.
[37]
Li Yan, Haiying Shen, Juanjuan Zhao, Chengzhong Xu, Feng Luo, Chenxi Qiu, Zhe Zhang, and Shohaib Mahmud. Catcharger: Deploying in-motion wireless chargers in a metropolitan road network via categorization and clustering of vehicle traffic. IEEE Internet of Things Journal, 9(12):9525--9541, 2022.
[38]
A. Viterbi. Error bounds for convolutional codes and an asymptotically optimum decoding algorithm. IEEE Transactions on Information Theory, 13(2):260--269, 1967.
[39]
M. Gruteser and D. Grunwald. Anonymous usage of location-based services through spatial and temporal cloaking. In Proc. of ACM MobiSys, 2003.
[40]
L. Sweeney. Achieving k-anonymity privacy protection using generalization and suppression. Int. J. Uncertain. Fuzziness Knowl.-Based Syst., 10(5):571--588, 2002.
[41]
C. Qiu and A. C. Squicciarini. Location privacy protection in vehicle-based spatial crowdsourcing via geo-indistinguishability. In Proc. of IEEE ICDCS, pages 1061--1071, 2019.
[42]
Christian Arnold and Marcel Neunhoeffer. Really useful synthetic data - a framework to evaluate the quality of differentially private synthetic data, 2021.
[43]
Edward Choi, Siddharth Biswal, Bradley Malin, Jon Duke, Walter F. Stewart, and Jimeng Sun. Generating multi-label discrete patient records using generative adversarial networks, 2018.
[44]
Jörg Drechsler and Jerome P. Reiter. Sampling with synthesis: A new approach for releasing public use census microdata. Journal of the American Statistical Association, 105(492):1347--1357, 2010.
[45]
The open data institute. Accessed in June 2022.
[46]
Uk government-defence science and technology laboratory. Accessed in October 2022.
[47]
Lei Xu, Maria Skoularidou, Alfredo Cuesta-Infante, and Kalyan Veeramachaneni. Modeling tabular data using conditional gan, 2019.
[48]
Andrew Yale, Saloni Dash, Ritik Dutta, Isabelle M Guyon, Adrien Pavao, and Kristin P. Bennett. Privacy preserving synthetic health data. F1000Research, 8, 2019.
[49]
Krishna Teja Chitty-Venkata, Sparsh Mittal, Murali Emani, Venkatram Vishwanath, and Arun K. Somani. A survey of techniques for optimizing transformer inference. Journal of Systems Architecture, 144:102990, 2023.
[50]
Peng Xu, Xiatian Zhu, and David A. Clifton. Multimodal learning with transformers: A survey, 2023.

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
SIGSPATIAL '24: Proceedings of the 32nd ACM International Conference on Advances in Geographic Information Systems
October 2024
743 pages
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 22 November 2024

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Geo-Indistinguishability
  2. location privacy
  3. location-based service

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Funding Sources

Conference

SIGSPATIAL '24
Sponsor:

Acceptance Rates

SIGSPATIAL '24 Paper Acceptance Rate 37 of 122 submissions, 30%;
Overall Acceptance Rate 257 of 1,238 submissions, 21%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 48
    Total Downloads
  • Downloads (Last 12 months)48
  • Downloads (Last 6 weeks)48
Reflects downloads up to 25 Dec 2024

Other Metrics

Citations

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media