Two de-anonymization attacks on real-world location data based on a hidden Markov model

S. N. Eshun, P. Palmieri
{"title":"Two de-anonymization attacks on real-world location data based on a hidden Markov model","authors":"S. N. Eshun, P. Palmieri","doi":"10.1109/eurospw55150.2022.00062","DOIUrl":null,"url":null,"abstract":"The increasing demand for smart context-aware services and the widespread use of location-based services (LBS) have resulted in the proliferation of mobile devices equipped with geolocation sensors (including GPS, geomagnetic field sensor, accelerometer, proximity sensor, et cetera). As a result, service providers and telecommunications companies can collect massive mobility datasets, often for millions of subscribers. To provide a degree of privacy, dataset owners normally replace personal identifiers such as name, address, and social security number (SSN) with pseudorandom identifiers prior to publication or sale. However, it has been repeatedly shown how sensitive information can be easily extracted or inferred from individuals' mobility data even when personal identifiers are removed. Knowledge of the extent to which location data can be de-anonymized is therefore crucial, in order to design appropriate privacy mechanisms that can prevent re-identification. In this paper, we propose and implement two novel and highly effective de-anonymization techniques: the Forward, and the KL algorithms. Our work utilizes a hidden Markov model (which incorporates spatio-temporal trajectories) in a novel way to generate user mobility profiles for target users. Using a real-world reference dataset containing mobility trajectories from the city of Shanghai (GeoLife, a reference dataset also used in previous studies), we evaluate the robustness of the proposed attack techniques. The results show that our attack techniques successfully re-identify up to 85% anonymized users. This significantly exceeds current comparable de-anonymization techniques, which have a success rate of 40% to 45%.","PeriodicalId":275840,"journal":{"name":"2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/eurospw55150.2022.00062","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The increasing demand for smart context-aware services and the widespread use of location-based services (LBS) have resulted in the proliferation of mobile devices equipped with geolocation sensors (including GPS, geomagnetic field sensor, accelerometer, proximity sensor, et cetera). As a result, service providers and telecommunications companies can collect massive mobility datasets, often for millions of subscribers. To provide a degree of privacy, dataset owners normally replace personal identifiers such as name, address, and social security number (SSN) with pseudorandom identifiers prior to publication or sale. However, it has been repeatedly shown how sensitive information can be easily extracted or inferred from individuals' mobility data even when personal identifiers are removed. Knowledge of the extent to which location data can be de-anonymized is therefore crucial, in order to design appropriate privacy mechanisms that can prevent re-identification. In this paper, we propose and implement two novel and highly effective de-anonymization techniques: the Forward, and the KL algorithms. Our work utilizes a hidden Markov model (which incorporates spatio-temporal trajectories) in a novel way to generate user mobility profiles for target users. Using a real-world reference dataset containing mobility trajectories from the city of Shanghai (GeoLife, a reference dataset also used in previous studies), we evaluate the robustness of the proposed attack techniques. The results show that our attack techniques successfully re-identify up to 85% anonymized users. This significantly exceeds current comparable de-anonymization techniques, which have a success rate of 40% to 45%.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
两种基于隐马尔可夫模型的真实世界位置数据去匿名化攻击
对智能上下文感知服务的需求不断增长,以及基于位置的服务(LBS)的广泛使用,导致了配备地理定位传感器(包括GPS、地磁场传感器、加速度计、接近传感器等)的移动设备的激增。因此,服务提供商和电信公司可以收集大量的移动数据集,通常涉及数百万用户。为了提供一定程度的隐私,数据集所有者通常在发布或出售之前用伪随机标识符替换个人标识符,如姓名、地址和社会安全号码(SSN)。然而,事实一再证明,即使删除了个人标识符,也可以很容易地从个人的移动数据中提取或推断出敏感信息。因此,了解位置数据可以去匿名化的程度是至关重要的,以便设计适当的隐私机制,防止重新识别。在本文中,我们提出并实现了两种新颖且高效的去匿名化技术:Forward和KL算法。我们的工作利用隐马尔可夫模型(包含时空轨迹)以一种新颖的方式为目标用户生成用户移动性概况。使用包含上海市移动轨迹的真实参考数据集(GeoLife,也用于先前研究的参考数据集),我们评估了所提出的攻击技术的鲁棒性。结果表明,我们的攻击技术成功地重新识别了高达85%的匿名用户。这大大超过了目前同类的去匿名化技术,后者的成功率为40%到45%。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Reliability of IP Geolocation Services for Assessing the Compliance of International Data Transfers GNPassGAN: Improved Generative Adversarial Networks For Trawling Offline Password Guessing Towards an Operations-Aware Experimentation Methodology Two de-anonymization attacks on real-world location data based on a hidden Markov model Reviewing Estimates of Cybercrime Victimisation and Cyber Risk Likelihood
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1