Affiliation:
1. CNRS, Inria and LIX , École Polytechnique , France
2. Inria, France and Faculty of Computers and Informatics , Suez Canal University , Egypt
3. Inria and LIX , École Polytechnique , France
Abstract
Abstract
The continuously increasing use of location-based services poses an important threat to the privacy of users. A natural defense is to employ an obfuscation mechanism, such as those providing geo-indistinguishability, a framework for obtaining formal privacy guarantees that has become popular in recent years.
Ideally, one would like to employ an optimal obfuscation mechanism, providing the best utility among those satisfying the required privacy level. In theory optimal mechanisms can be constructed via linear programming. In practice, however, this is only feasible for a radically small number of locations. As a consequence, all known applications of geo-indistinguishability simply use noise drawn from a planar Laplace distribution.
In this work, we study methods for substantially improving the utility of location obfuscation, while maintaining practical applicability as a main goal. We provide such solutions for both infinite (continuous or discrete) as well as large but finite domains of locations, using a Bayesian remapping procedure as a key ingredient. We evaluate our techniques in two real world complete datasets, without any restriction on the evaluation area, and show important utility improvements with respect to the standard planar Laplace approach.
Reference44 articles.
1. [1] K. Orland, “Stalker Victims Should Check For GPS.” The Associated Press, 2003. http://www.cbsnews.com/news/stalker-victims-should-check-for-gps/.
2. [2] J. Brownlee, “This Creepy App Isn’t Just Stalking Women Without Their Knowledge, It’s A Wake-Up Call About Facebook Privacy (Update),” 2012. http://www.cultofmac.com/157641/.
3. [3] J. Simerman, “FasTrak to courthouse.” East Bay Times, 2007. http://www.eastbaytimes.com/2007/06/05/fastrak-to-courthouse/.
4. [4] D. Ashbrook and T. Starner, “Using gps to learn significant locations and predict movement across multiple users,” Personal and Ubiquitous Computing, vol. 7, no. 5, pp. 275–286, 2003.10.1007/s00779-003-0240-0
5. [5] R. Shokri, G. Theodorakopoulos, C. Troncoso, J.-P. Hubaux, and J.-Y. L. Boudec, “Protecting location privacy: optimal strategy against localization attacks,” in Proc. of CCS, pp. 617–627, ACM, 2012.
Cited by
35 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献