Mosaic: Quantifying Privacy Leakage in Mobile Networks

被引:26
|
作者
Xia, Ning [1 ]
Song, Han Hee
Liao, Yong
Iliofotou, Marios
Nucci, Antonio
Zhang, Zhi-Li [2 ]
Kuzmanovic, Aleksandar [1 ]
机构
[1] Northwestern Univ, Evanston, IL 60208 USA
[2] Univ Minnesota, Minneapolis, MN 55455 USA
关键词
privacy; security; mobile network; user profile; online social network;
D O I
10.1145/2534169.2486008
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the proliferation of online social networking (OSN) and mobile devices, preserving user privacy has become a great challenge. While prior studies have directly focused on OSN services, we call attention to the privacy leakage in mobile network data. This concern is motivated by two factors. First, the prevalence of OSN usage leaves identifiable digital footprints that can be traced back to users in the real-world. Second, the association between users and their mobile devices makes it easier to associate traffic to its owners. These pose a serious threat to user privacy as they enable an adversary to attribute significant portions of data traffic including the ones with NO identity leaks to network users' true identities. To demonstrate its feasibility, we develop the Tessellation methodology. By applying Tessellation on traffic from a cellular service provider (CSP), we show that up to 50% of the traffic can be attributed to the names of users. In addition to revealing the user identity, the reconstructed profile, dubbed as "mosaic," associates personal information such as political views, browsing habits, and favorite apps to the users. We conclude by discussing approaches for preventing and mitigating the alarming leakage of sensitive user information.
引用
收藏
页码:279 / 290
页数:12
相关论文
共 50 条
  • [41] An Automated Approach for Privacy Leakage Identification in IoT Apps
    Nazzal, Bara'
    Alalfi, Manar H.
    IEEE ACCESS, 2022, 10 : 80727 - 80747
  • [42] On the Privacy Leakage of Coded Caching
    Wang, Yu
    Abouzeid, Alhussein A.
    ICC 2020 - 2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2020,
  • [43] Privacy Leakage in Wireless Charging
    Liu, Jianwei
    Zou, Xiang
    Zhao, Leqi
    Tao, Yusheng
    Hu, Sideng
    Han, Jinsong
    Ren, Kui
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (02) : 501 - 514
  • [44] Quantifying privacy in multiagent planning
    van der Krogt, Roman
    MULTIAGENT AND GRID SYSTEMS, 2009, 5 (04) : 451 - 469
  • [45] Botnet detection and information leakage mitigation with differential privacy under generative adversarial networks
    Feizi, Sanaz
    Ghaffari, Hamidreza
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2025, 28 (02):
  • [46] Preserving Mobile-Sink-Location Privacy in Wireless Sensor Networks
    Yao, Jianbo
    2010 2ND INTERNATIONAL WORKSHOP ON DATABASE TECHNOLOGY AND APPLICATIONS PROCEEDINGS (DBTA), 2010,
  • [47] Mobile Usage Patterns and Privacy Implications
    Mitchell, Michael
    Patidar, Ratnesh
    Saini, Manik
    Singh, Parteek
    Wang, An-I
    Reiher, Peter
    2015 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATION WORKSHOPS (PERCOM WORKSHOPS), 2015, : 457 - 462
  • [48] Security and Privacy in Mobile Cloud Computing
    Suo, Hui
    Liu, Zhuohua
    Wan, Jiafu
    Zhou, Keliang
    2013 9TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2013, : 655 - 659
  • [49] Token Based Privacy Preserving and Authentication Technique for Wireless Mobile Networks
    Fatahpour, Saman
    2018 4TH INTERNATIONAL CONFERENCE ON WEB RESEARCH (ICWR), 2018, : 155 - 161
  • [50] Fast Handover with Privacy Preserving Authentication Protocol for Mobile WiMAX Networks
    Abouhogail, Reham Abdellatif
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (05): : 361 - 375