Spatio-temporal de-anonymization attack on geolocated data

被引:0
作者
Wang R. [1 ]
Xie W. [1 ]
Liao X. [1 ]
Feng S. [1 ]
Bai K. [2 ]
机构
[1] Industrial Cybersecurity Business Department, Institute of Security Research, China Academy of Information and Communications Technology, Beijing
[2] Laboratory of Trusted Computing and Information Assurance, Institute of Software, Chinese Academy of Sciences, Beijing
来源
Harbin Gongcheng Daxue Xuebao/Journal of Harbin Engineering University | 2021年 / 42卷 / 03期
关键词
De-anonymization; De-anonymization attack; Hidden Markov model; Location privacy; Markov model; Privacy; Spatio-temporal influence; User reidentification;
D O I
10.11990/jheu.201912060
中图分类号
学科分类号
摘要
De-anonymitzation technology based on the spatial attribute of the user's moving track does not make full use of the time attribute of the moving track, so the accuracy of re-recognition requires further improvement. In this paper, we first quantitatively analyze spatial and temporal attributes contained in the moving track, define a spatiotemporal-sensed user hidden Markov model to describe the user's moving behavior, and further present a spatiotemporal-sensed de-anonymization attack, defining two Spatio-temporal similarities for the attack model. The experiment was carried out on the dataset named GeoLife collected by the Microsoft Asia Research Institute. The experimental results show that the proposed STCS model improves reidentification accuracy significantly compared with previous STES models. Copyright ©2021 Journal of Harbin Engineering University.
引用
收藏
页码:400 / 406
页数:6
相关论文
共 28 条
[1]  
GAMBS S, KILLIJIAN M O, DEL PRADO CORTEZ M N., De-anonymization attack on geolocated data, Journal of computer and system sciences, 80, 8, pp. 1597-1614, (2013)
[2]  
KRUMM J., Inference attacks on location tracks, Proceedings of the 5th International Conference on Pervasive Computing, pp. 127-143, (2007)
[3]  
GONZALEZ M C, HIDALGO C A, BARABASI B., Understanding individual human mobility patterns, Nature, 453, 7196, pp. 779-782, (2008)
[4]  
SONG Chaoming, QU Zehui, BLUMM N, Et al., Limits of predictability in human mobility, Science, 327, 5968, pp. 1018-1021, (2010)
[5]  
JEDRZEJCZYK L, PRICE B A, BANDARA A K, Et al., I Know What You Did Last Summer: risks of location data leakage in mobile and social computing, Department of Computing Faculty of Mathematics, Computing and Technology the Open University, pp. 1744-1986, (2009)
[6]  
BETTINI C, WANG X S, JAJODIA S., Protecting privacy against location-based personal identification, Proceedings of the Second VLDB Workshop on Secure Data Management, 3674, pp. 185-199, (2005)
[7]  
GAMBS S, KILLIJIAN M O, DEL PRADO CORTEZ M N., Show me how you move and I will tell you who you are, Transactions on data privacy, 2, 4, pp. 103-126, (2010)
[8]  
MA C Y T, YAU D K Y, YIP N K, Et al., Privacy Vulnerability of published anonymous mobility traces, IEEE/ACM transactions on networking, 21, 3, pp. 720-733, (2013)
[9]  
SHOKRI R, THEODORAKOPOULOS G, LE BOUDEC J Y, Et al., Quantifying location privacy, Proceedings of 2011 IEEE Symposium on Security and Privacy, pp. 247-262, (2011)
[10]  
SRIVATSA M, HICKS M., Deanonymizing mobility traces: using social network as a side-channel, Proceedings of 2012 ACM Conference on Computer and Communications Security, pp. 628-637, (2012)