Mosaic: Quantifying Privacy Leakage in Mobile Networks

被引:26
|
作者
Xia, Ning [1 ]
Song, Han Hee
Liao, Yong
Iliofotou, Marios
Nucci, Antonio
Zhang, Zhi-Li [2 ]
Kuzmanovic, Aleksandar [1 ]
机构
[1] Northwestern Univ, Evanston, IL 60208 USA
[2] Univ Minnesota, Minneapolis, MN 55455 USA
关键词
privacy; security; mobile network; user profile; online social network;
D O I
10.1145/2534169.2486008
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the proliferation of online social networking (OSN) and mobile devices, preserving user privacy has become a great challenge. While prior studies have directly focused on OSN services, we call attention to the privacy leakage in mobile network data. This concern is motivated by two factors. First, the prevalence of OSN usage leaves identifiable digital footprints that can be traced back to users in the real-world. Second, the association between users and their mobile devices makes it easier to associate traffic to its owners. These pose a serious threat to user privacy as they enable an adversary to attribute significant portions of data traffic including the ones with NO identity leaks to network users' true identities. To demonstrate its feasibility, we develop the Tessellation methodology. By applying Tessellation on traffic from a cellular service provider (CSP), we show that up to 50% of the traffic can be attributed to the names of users. In addition to revealing the user identity, the reconstructed profile, dubbed as "mosaic," associates personal information such as political views, browsing habits, and favorite apps to the users. We conclude by discussing approaches for preventing and mitigating the alarming leakage of sensitive user information.
引用
收藏
页码:279 / 290
页数:12
相关论文
共 50 条
  • [21] Quantifying trust in mobile ad-hoc networks
    Virendra, M
    Jadliwala, M
    Chandrasekaran, M
    Upadhyaya, S
    2005 International Conference on Integration of Knowledge Intensive Multi-Agent Systems: KIMAS'05: MODELING, EXPLORATION, AND ENGINEERING, 2005, : 65 - 70
  • [22] Scalable and Privacy Preserving Routing in Mobile Social Networks
    Liu, Cong
    Xiao, Mingjun
    Zhao, Yaxiong
    2018 IEEE 15TH INTERNATIONAL CONFERENCE ON MOBILE AD HOC AND SENSOR SYSTEMS (MASS), 2018, : 559 - 564
  • [23] Reclaiming Location Privacy in Mobile Telephony Networks-Effects and Consequences for Providers and Subscribers
    Rechert, Klaus
    Meier, Konrad
    Zahoransky, Richard
    Wehrle, Dennis
    von Suchodoletz, Dirk
    Greschbach, Benjamin
    Wohlgemuth, Sven
    Echizen, Isao
    IEEE SYSTEMS JOURNAL, 2013, 7 (02): : 211 - 222
  • [24] SPAWN: a secure privacy-preserving architecture in wireless mobile ad hoc networks
    Muthumanickam Gunasekaran
    Kandhasamy Premalatha
    EURASIP Journal on Wireless Communications and Networking, 2013
  • [25] A secure enhanced privacy-preserving key agreement protocol for wireless mobile networks
    Odelu, Vanga
    Zeadally, Sherali
    Das, Ashok Kumar
    Wazid, Mohammad
    He, Debiao
    TELECOMMUNICATION SYSTEMS, 2018, 69 (04) : 431 - 445
  • [26] Privacy-Based Deployments: The Role of DevPrivOps in 6G Mobile Networks
    Silva, Catarina
    Cunha, Vitor A.
    Barraca, Joao P.
    Salvador, Paulo
    IEEE COMMUNICATIONS MAGAZINE, 2024, 62 (06) : 66 - 72
  • [27] A secure enhanced privacy-preserving key agreement protocol for wireless mobile networks
    Vanga Odelu
    Sherali Zeadally
    Ashok Kumar Das
    Mohammad Wazid
    Debiao He
    Telecommunication Systems, 2018, 69 : 431 - 445
  • [28] SPAWN: a secure privacy-preserving architecture in wireless mobile ad hoc networks
    Gunasekaran, Muthumanickam
    Premalatha, Kandhasamy
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2013,
  • [29] Quantifying Security and Privacy in Internet of Things Solutions
    Alsubaei, Faisal
    Abuhussein, Abdullah
    Shiva, Sajjan
    NOMS 2018 - 2018 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, 2018,
  • [30] Privacy Preserving Techniques for Location Based Services in Mobile Networks
    Liu, Xinxin
    Li, Xiaolin
    2012 IEEE 26TH INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM WORKSHOPS & PHD FORUM (IPDPSW), 2012, : 2474 - 2477