TY - GEN
T1 - Protecting against inference attacks on co-location data
AU - Ahuja, Ritesh
AU - Ghinita, Gabriel
AU - Krishna, Nithin
AU - Shahabi, Cyrus
N1 - Publisher Copyright:
© 2019 IEEE.
PY - 2019/7
Y1 - 2019/7
N2 - The proliferation of location-centric applications results in massive amounts of individual location data that can benefit domains such as transportation, urban planning, etc. However, sensitive personal data can be derived from location datasets. In particular, co-location of users can disclose one's social connections, intimate partners, business associates, etc. We derive a powerful inference attack that makes extensive use of background knowledge in order to expose an individual's co-locations. We also show that existing techniques for location protection, which do not focus specifically on co-locations, distort data excessively, resulting in sanitized datasets with poor utility. We propose three privacy mechanisms that are customized for co-locations, and provide various trade-offs in terms of user privacy and data utility. Our extensive experimental evaluation on a real geo-social network dataset shows that the proposed approaches achieve good data utility and do a good job of protecting against discovery of co-locations, even when confronted with a powerful adversary.
AB - The proliferation of location-centric applications results in massive amounts of individual location data that can benefit domains such as transportation, urban planning, etc. However, sensitive personal data can be derived from location datasets. In particular, co-location of users can disclose one's social connections, intimate partners, business associates, etc. We derive a powerful inference attack that makes extensive use of background knowledge in order to expose an individual's co-locations. We also show that existing techniques for location protection, which do not focus specifically on co-locations, distort data excessively, resulting in sanitized datasets with poor utility. We propose three privacy mechanisms that are customized for co-locations, and provide various trade-offs in terms of user privacy and data utility. Our extensive experimental evaluation on a real geo-social network dataset shows that the proposed approaches achieve good data utility and do a good job of protecting against discovery of co-locations, even when confronted with a powerful adversary.
UR - http://www.scopus.com/inward/record.url?scp=85073161249&partnerID=8YFLogxK
U2 - 10.1109/ICCCN.2019.8847050
DO - 10.1109/ICCCN.2019.8847050
M3 - Conference contribution
AN - SCOPUS:85073161249
T3 - Proceedings - International Conference on Computer Communications and Networks, ICCCN
BT - ICCCN 2019 - 28th International Conference on Computer Communications and Networks
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 28th International Conference on Computer Communications and Networks, ICCCN 2019
Y2 - 29 July 2019 through 1 August 2019
ER -