Mosaic: Quantifying Privacy Leakage in Mobile Networks

被引:26
|
作者
Xia, Ning [1 ]
Song, Han Hee
Liao, Yong
Iliofotou, Marios
Nucci, Antonio
Zhang, Zhi-Li [2 ]
Kuzmanovic, Aleksandar [1 ]
机构
[1] Northwestern Univ, Evanston, IL 60208 USA
[2] Univ Minnesota, Minneapolis, MN 55455 USA
关键词
privacy; security; mobile network; user profile; online social network;
D O I
10.1145/2534169.2486008
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the proliferation of online social networking (OSN) and mobile devices, preserving user privacy has become a great challenge. While prior studies have directly focused on OSN services, we call attention to the privacy leakage in mobile network data. This concern is motivated by two factors. First, the prevalence of OSN usage leaves identifiable digital footprints that can be traced back to users in the real-world. Second, the association between users and their mobile devices makes it easier to associate traffic to its owners. These pose a serious threat to user privacy as they enable an adversary to attribute significant portions of data traffic including the ones with NO identity leaks to network users' true identities. To demonstrate its feasibility, we develop the Tessellation methodology. By applying Tessellation on traffic from a cellular service provider (CSP), we show that up to 50% of the traffic can be attributed to the names of users. In addition to revealing the user identity, the reconstructed profile, dubbed as "mosaic," associates personal information such as political views, browsing habits, and favorite apps to the users. We conclude by discussing approaches for preventing and mitigating the alarming leakage of sensitive user information.
引用
收藏
页码:279 / 290
页数:12
相关论文
共 50 条
  • [1] Systematically Quantifying IoT Privacy Leakage in Mobile Networks
    Hui, Shuodi
    Wang, Zhenhua
    Hou, Xueshi
    Wang, Xiao
    Wang, Huandong
    Li, Yong
    Jin, Depeng
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (09) : 7115 - 7125
  • [2] Quantifying Membership Privacy via Information Leakage
    Saeidian, Sara
    Cervia, Giulia
    Oechtering, Tobias J.
    Skoglund, Mikael
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 3096 - 3108
  • [3] Quantifying privacy leakage through answering database queries
    Hsu, TS
    Liau, CJ
    Wang, DW
    Chen, JKP
    INFORMATION SECURITY, PROCEEDINGS, 2002, 2433 : 162 - 176
  • [4] PRIVACY LEAKAGE IN HEALTH SOCIAL NETWORKS
    Al Faresi, Ahmed
    Alazzawe, Ahmed
    Alazzawe, Anis
    COMPUTATIONAL INTELLIGENCE, 2014, 30 (03) : 514 - 534
  • [5] On Address Privacy in Mobile Ad Hoc Networks
    Yanchao Zhang
    Kui Ren
    Mobile Networks and Applications, 2009, 14 : 188 - 197
  • [6] On Address Privacy in Mobile Ad Hoc Networks
    Zhang, Yanchao
    Ren, Kui
    MOBILE NETWORKS & APPLICATIONS, 2009, 14 (02) : 188 - 197
  • [7] Privacy leakage analysis in online social networks
    Li, Yan
    Li, Yingjiu
    Yan, Qiang
    Deng, Robert H.
    COMPUTERS & SECURITY, 2015, 49 : 239 - 254
  • [8] Poster: Privacy in Distributed Mobile Networks
    Chang, Xin
    Wang, Xingjun
    PROCEEDINGS OF THE 2024 THE 22ND ANNUAL INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS, APPLICATIONS AND SERVICES, MOBISYS 2024, 2024, : 720 - 721
  • [9] Personalization of Privacy in Mobile Social Networks
    Rosa, Tiago Antonio
    Zorzo, Sergio Donizetti
    ENTERPRISE INFORMATION SYSTEMS (ICEIS 2015), 2015, 241 : 555 - 573
  • [10] Privacy Issues in Mobile Social Networks
    Ajami, Racha
    Al Qirim, Nabeel
    Ramadan, Noha
    ANT 2012 AND MOBIWIS 2012, 2012, 10 : 672 - 679