Title: CS 590S Class Paper Querying Private Data in MovingObject Environments
1CS 590S Class PaperQuerying Private Data in
Moving-Object Environments
- Reynold Cheng
- Department of Computer Science
- ckcheng_at_cs.purdue.edu
2Location-Based Services
Service Provider
3Non-Anonymous Applications
- When I enter the CS building, notify my project
groupmates - Tell me the information of my friends who are
closest to me - Send (identity, location) to service provider
4Linkability Location Privacy
- A persons identity has high linkability with
her current location - She may not want to reveal she is in that
location (a sensitive area like hospital) - Location privacy is lost
5Protecting Location Privacy
- Reduce linkability between identity and location
- By injecting spatial uncertainty
- Called location cloaking
6Location Cloaking
true location
region seen by service provider
7Location Cloaking Model
Location cloaking uncertainty region pdf
8Effectiveness of Cloaking
- Location privacy affected by
- Size of uncertainty region
- Fraction of sensitive areas covered by
uncertainty region - Information leak (entropy) of uncertainty pdf
9Location Cloaking Service Quality
- Cloaking protects location privacy
- More uncertainty, more privacy
- Service quality may drop
- Lowering spatial accuracy increases ambiguity
- Cloaking agent to handle these problems
10Cloaking Agent System Design
11Related Questions
- How to process cloaked locations?
- Can service quality be quantified?
- Case Study Moving Range Queries
- Return names of all people whom I know, within a
radius of r units from me
12Imprecise Moving Range Queries
Imprecise Moving Range Query
- Inexact answer (S2, 0.1, S3, 0.5, S4, 0.9)
- Quality Score measures answer ambiguity
- Details in paper
13Trajectory Tracing and Linkability
14Protecting Linkability
15Conclusions
- Location cloaking for location privacy
- A framework to relate privacy, cloaking and
service quality - Apply the framework to moving range queries
- Solve the problem of trajectory tracing attack by
patching and delaying
16References
- A. Beresford and F. Stajano. Location Privacy in
Pervasive Computing. IEEE Pervasive Computing,
2(1)46-55, 2003. - R. Cheng, D. Kalashnikov and S. Prabhakar.
Evaluating Probabilistic Queries over Imprecise
Data. In Proc. of ACM SIGMOD, June 2003. - M. Gruteser and D. Grunwald. Anonymous Usage of
Location-based Services through Spatial and
Temporal Cloaking. In Proc. of the 1st Intl.
Conf. on Mobile Systems, Applications and
Services, May 2003.