Protecting Locations with Differential Privacy under Temporal Correlations

被引:252
作者
Xiao, Yonghui [1 ]
Xiong, Li [1 ]
机构
[1] Emory Univ, Dept Math & Comp Sci, Atlanta, GA 30322 USA
来源
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY | 2015年
基金
美国国家科学基金会;
关键词
Location privacy; Location-based services; Differential privacy; Sensitivity hull; Planar isotropic mechanism;
D O I
10.1145/2810103.2813640
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Concerns on location privacy frequently arise with the rapid development of GPS enabled devices and location-based applications. While spatial transformation techniques such as location perturbation or generalization have been studied extensively, most techniques rely on syntactic privacy models without rigorous privacy guarantee. Many of them only consider static scenarios or perturb the location at single timestamps without considering temporal correlations of a moving user's locations, and hence are vulnerable to various inference attacks. While differential privacy has been accepted as a standard for privacy protection, applying differential privacy in location based applications presents new challenges, as the protection needs to be enforced on the fly for a single user and needs to incorporate temporal correlations between a user's locations. In this paper, we propose a systematic solution to preserve location privacy with rigorous privacy guarantee. First, we propose a new definition, "delta-location set" based differential privacy, to account for the temporal correlations in location data. Second, we show that the well known l(1)-norm sensitivity fails to capture the geometric sensitivity in multidimensional space and propose a new notion, sensitivity hull, based on which the error of differential privacy is bounded. Third, to obtain the optimal utility we present a planar isotropic mechanism (PIM) for location perturbation, which is the first mechanism achieving the lower bound of differential privacy. Experiments on real-world datasets also demonstrate that PIM significantly outperforms baseline approaches in data utility.
引用
收藏
页码:1298 / 1309
页数:12
相关论文
共 40 条
  • [1] [Anonymous], 2013, CCS '13
  • [2] [Anonymous], 2012, P 18 ACM SIGKDD INT, DOI DOI 10.1145/2339530.2339564
  • [3] [Anonymous], P 3 THEOR CRYPT C
  • [4] Apostolos G., 2003, Notes on isotropic convex bodies
  • [5] Location privacy in pervasive computing
    Beresford, AR
    Stajano, F
    [J]. IEEE PERVASIVE COMPUTING, 2003, 2 (01) : 46 - 55
  • [6] Bhaskara A., 2012, STOC '12
  • [7] Chatzikokolakis Konstantinos, 2013, Privacy Enhancing Technologies.13th International Symposium, PETS 2013. Proceedings: LNCS 7981, P82, DOI 10.1007/978-3-642-39077-7_5
  • [8] Cho Eunjoon, 2011, P 17 ACM SIGKDD INT, P1082
  • [9] Location-Based Services
    Dey, Anind
    Hightower, Jeffrey
    de lara, Eyal
    Davies, Nigel
    [J]. IEEE PERVASIVE COMPUTING, 2010, 9 (01) : 11 - 12
  • [10] Dwork C, 2006, LECT NOTES COMPUT SC, V4052, P1