Achieving Guaranteed Anonymity in GPS Traces via Uncertainty-Aware Path Cloaking

被引:66
作者
Hoh, Baik [1 ]
Gruteser, Marco [2 ]
Xiong, Hui [3 ]
Alrabady, Ansaf [4 ]
机构
[1] Nokia Res Ctr, Palo Alto, CA 94304 USA
[2] Rutgers State Univ, Technol Ctr New Jersey, Dept Elect & Comp Engn, WINLAB, N Brunswick, NJ 08902 USA
[3] Rutgers State Univ, Management Sci & Informat Syst Dept, Newark, NJ 07102 USA
[4] Gen Motors, Livonia, MI 48152 USA
关键词
Privacy; GPS; traffic monitoring; uncertainty; anonymity; cloaking;
D O I
10.1109/TMC.2010.62
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The integration of Global Positioning System (GPS) receivers and sensors into mobile devices has enabled collaborative sensing applications, which monitor the dynamics of environments through opportunistic collection of data from many users' devices. One example that motivates this paper is a probe-vehicle-based automotive traffic monitoring system, which estimates traffic congestion from GPS velocity measurements reported from many drivers. This paper considers the problem of achieving guaranteed anonymity in a locational data set that includes location traces from many users, while maintaining high data accuracy. We consider two methods to reidentify anonymous location traces, target tracking, and home identification, and observe that known privacy algorithms cannot achieve high application accuracy requirements or fail to provide privacy guarantees for drivers in low-density areas. To overcome these challenges, we derive a novel time-to-confusion criterion to characterize privacy in a locational data set and propose a disclosure control algorithm (called uncertainty-aware path cloaking algorithm) that selectively reveals GPS samples to limit the maximum time-to-confusion for all vehicles. Through trace-driven simulations using real GPS traces from 312 vehicles, we demonstrate that this algorithm effectively limits tracking risks, in particular, by eliminating tracking outliers. It also achieves significant data accuracy improvements compared to known algorithms. We then present two enhancements to the algorithm. First, it also addresses the home identification risk by reducing location information revealed at the start and end of trips. Second, it also considers heading information reported by users in the tracking model. This version can thus protect users who are moving in dense areas but in a different direction from the majority.
引用
收藏
页码:1089 / 1107
页数:19
相关论文
共 36 条
  • [1] Agrawal R., 2000, Privacy-preserving data mining, P439, DOI DOI 10.1145/342009.335438
  • [2] Allen M, 2008, 2008 INTERNATIONAL CONFERENCE ON INFORMATION PROCESSING IN SENSOR NETWORKS, PROCEEDINGS, P371, DOI 10.1109/IPSN.2008.45
  • [3] [Anonymous], P 2 INT C SEC PERV C
  • [4] [Anonymous], P 5 INT C PERV COMP
  • [5] [Anonymous], P ACM C COMP COMM SE
  • [6] [Anonymous], 1991, ELEMENTS INFORM THEO, DOI [DOI 10.1002/0471200611, 10.1002/0471200611]
  • [7] BARBARO M, 2010, FACE IS EXPOSED AOL
  • [8] BERESFORD A, 2004, P IEEE INT WORKSH PE
  • [9] CAYFORD R, 2003, P I TRANSP STUD 82 T, V1
  • [10] UNTRACEABLE ELECTRONIC MAIL, RETURN ADDRESSES, AND DIGITAL PSEUDONYMS
    CHAUM, DL
    [J]. COMMUNICATIONS OF THE ACM, 1981, 24 (02) : 84 - 88