Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Sparse Mobile Crowdsensing With Differential and Distortion Location Privacy

Published: 01 January 2020 Publication History

Abstract

Sparse Mobile Crowdsensing (MCS) has become a compelling approach to acquire and infer urban-scale sensing data. However, participants risk their location privacy when reporting data with their actual sensing positions. To address this issue, we propose a novel location obfuscation mechanism combining <inline-formula> <tex-math notation="LaTeX">$\epsilon $ </tex-math></inline-formula> <italic>-differential-privacy</italic> and <inline-formula> <tex-math notation="LaTeX">$\delta $ </tex-math></inline-formula> <italic>-distortion-privacy</italic> in Sparse MCS. More specifically, differential privacy bounds adversaries&#x2019; relative information gain regardless of their prior knowledge, while distortion privacy ensures that the expected inference error is larger than a threshold under an assumption of adversaries&#x2019; prior knowledge. To reduce the data quality loss incurred by location obfuscation, we design a differential-and-distortion privacy-preserving framework with three components. First, we learn a <italic>data adjustment</italic> function to fit the original sensing data to the obfuscated location. Second, we apply a linear program to select an <italic>optimal location obfuscation</italic> function. The linear program aims to minimize the uncertainty in data adjustment under the constraints of <inline-formula> <tex-math notation="LaTeX">$\epsilon $ </tex-math></inline-formula>-differential-privacy, <inline-formula> <tex-math notation="LaTeX">$\delta $ </tex-math></inline-formula>-distortion-privacy, and evenly-distributed obfuscation. We also design an <italic>approximated</italic> method to reduce the required computation resources. Third, we propose an <italic>uncertainty-aware inference</italic> algorithm to improve the inference accuracy for the obfuscated data. Evaluations with real environment and traffic datasets show that our optimal method reduces the data quality loss by up to 42&#x0025; compared to the state-of-the-art methods with the same level of privacy protection; the approximated method incurs &#x003C; 3&#x0025; additional quality loss than the optimal method, but only needs &#x003C; 1&#x0025; of the computation time.

References

[1]
R. Ganti, F. Ye, and H. Lei, “Mobile crowdsensing: Current state and future challenges,” IEEE Commun. Mag., vol. 49, no., pp. 32–39, Nov. 2011.
[2]
D. Zhang, L. Wang, H. Xiong, and B. Guo, “4W1H in mobile crowd sensing,” IEEE Commun. Mag., vol. 52, no. 8, pp. 42–48, Aug. 2014.
[3]
B. Guoet al., “Mobile crowd sensing and computing: The review of an emerging human-powered sensing paradigm,” ACM Comput. Surv., vol. 48, no. 1, pp. 1–31, Aug. 2015.
[4]
R. K. Rana, C. T. Chou, S. S. Kanhere, N. Bulusu, and W. Hu, “Ear-phone: An end-to-end participatory urban noise mapping system,” in Proc. 9th ACM/IEEE Int. Conf. Inf. Process. Sensor Netw. (IPSN), Apr. 2010, pp. 105–116.
[5]
D. Hasenfratz, O. Saukh, S. Sturzenegger, and L. Thiele, “Participatory air pollution monitoring using smartphones,” in Proc. Int. Workshop Mobile Sens. (IPSN), Apr. 2012, pp. 1–5.
[6]
Y. Zhu, Z. Li, H. Zhu, M. Li, and Q. Zhang, “A compressive sensing approach to urban traffic estimation with probe vehicles,” IEEE Trans. Mobile Comput., vol. 12, no. 11, pp. 2289–2302, Nov. 2013.
[7]
H. Xiong, D. Zhang, L. Wang, and H. Chaouchi, “EMC3: Energy-efficient data transfer in mobile crowdsensing under full coverage constraint,” IEEE Trans. Mobile Comput., vol. 14, no. 7, pp. 1355–1368, Jul. 2015.
[8]
H. Xiong, D. Zhang, G. Chen, L. Wang, V. Gauthier, and L. E. Barnes, “ICrowd: Near-optimal task allocation for piggyback crowdsensing,” IEEE Trans. Mobile Comput., vol. 15, no. 8, pp. 2010–2022, Aug. 2016.
[9]
L. Wang, D. Zhang, Y. Wang, C. Chen, X. Han, and A. M’hamed, “Sparse mobile crowdsensing: Challenges and opportunities,” IEEE Commun. Mag., vol. 54, no. 7, pp. 161–167, Jul. 2016.
[10]
L. Wanget al., “SPACE-TA: Cost-effective task allocation exploiting intradata and interdata correlations in sparse crowdsensing,” ACM Trans. Intell. Syst. Technol., vol. 9, no. 2, pp. 1–28, Oct. 2017.
[11]
J. E. Dobson and P. F. Fisher, “Geoslavery,” IEEE Technol. Soc. Mag., vol. 22, no. 1, pp. 47–52, 2003.
[12]
J. Krumm, “A survey of computational location privacy,” Pers. Ubiquitous Comput., vol. 13, no. 6, pp. 391–399, Oct. 2008.
[13]
M. Duckham and L. Kulik, “A formal model of obfuscation and negotiation for location privacy,” in Pervasive Computing. Berlin, Germany: Springer, 2005, pp. 152–170.
[14]
M. E. Andrés, N. E. Bordenabe, K. Chatzikokolakis, and C. Palamidessi, “Geo-indistinguishability: Differential privacy for location-based systems,” in Proc. CCS, 2013, pp. 901–914.
[15]
C. Dwork, “Differential privacy,” in Proc. ICALP, 2006, pp. 1–12.
[16]
F. McSherry and K. Talwar, “Mechanism design via differential privacy,” in Proc. 48th Annu. IEEE Symp. Found. Comput. Sci. (FOCS), Oct. 2007, pp. 94–103.
[17]
N. E. Bordenabe, K. Chatzikokolakis, and C. Palamidessi, “Optimal geo-indistinguishable mechanisms for location privacy,” in Proc. ACM SIGSAC Conf. Comput. Commun. Secur. (CCS), 2014, pp. 251–262.
[18]
R. Shokri, G. Theodorakopoulos, J.-Y. Le Boudec, and J.-P. Hubaux, “Quantifying location privacy,” in Proc. IEEE Symp. Secur. Privacy, May 2011, pp. 247–262.
[19]
R. Shokri, “Privacy games: Optimal user-centric data obfuscation,” Proc. Privacy Enhancing Technol., vol. 2015, no. 2, pp. 299–315, Jun. 2015.
[20]
D. Yang, D. Zhang, Z. Yu, and Z. Yu, “Fine-grained preference-aware location search leveraging crowdsourced digital footprints from LBSNs,” in Proc. ACM Int. Joint Conf. Pervas. Ubiquitous Comput. (UbiComp), 2013, pp. 479–488.
[21]
L. Wang, D. Zhang, D. Yang, B. Y. Lim, and X. Ma, “Differential location privacy for sparse mobile crowdsensing,” in Proc. IEEE 16th Int. Conf. Data Mining (ICDM), Dec. 2016, pp. 1257–1262.
[22]
L. Xu, X. Hao, N. D. Lane, X. Liu, and T. Moscibroda, “More with less: Lowering user burden in mobile crowdsourcing through compressive sensing,” in Proc. UbiComp, Sep. 2015, pp. 659–670.
[23]
L. Wanget al., “CCS-TA: Quality-guaranteed online task allocation in compressive crowdsensing,” in Proc. UbiComp, 2015, pp. 683–694.
[24]
E. J. Candès and B. Recht, “Exact matrix completion via convex optimization,” Found. Comput. Math., vol. 9, no. 6, pp. 717–772, 2009.
[25]
D. Kondrashov and M. Ghil, “Spatio-temporal filling of missing points in geophysical data sets,” Nonlinear Processes Geophys., vol. 13, no. 2, pp. 151–159, May 2006.
[26]
T. Schneider, “Analysis of incomplete climate data: Estimation of mean values and covariance matrices and imputation of missing values,” J. Climate, vol. 14, no. 5, pp. 853–871, Mar. 2001.
[27]
L. Konget al., “Data loss and reconstruction in wireless sensor networks,” IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 11, pp. 2818–2828, Nov. 2014.
[28]
B. Bamba, L. Liu, P. Pesti, and T. Wang, “Supporting anonymous location queries in mobile environments with privacygrid,” in Proc. 17th Int. Conf. World Wide Web (WWW), 2008, pp. 237–246.
[29]
M. F. Mokbel, C.-Y. Chow, and W. G. Aref, “The new casper: Query processing for location services without compromising privacy,” in Proc. VLDB, Sep. 2006, pp. 763–774.
[30]
R. Shokri, G. Theodorakopoulos, C. Troncoso, J.-P. Hubaux, and J.-Y. Le Boudec, “Protecting location privacy: Optimal strategy against localization attacks,” in Proc. ACM Conf. Comput. Commun. Secur. (CCS), 2012, pp. 617–627.
[31]
R. Dewri, “Local differential perturbations: Location privacy under approximate knowledge attackers,” IEEE Trans. Mobile Comput., vol. 12, no. 12, pp. 2360–2372, Dec. 2013.
[32]
L. Wang, G. Qin, D. Yang, X. Han, and X. Ma, “Geographic differential privacy for mobile crowd coverage maximization,” in Proc. AAAI, Apr. 2018, pp,. 1–8.
[33]
L. Pournajaf, D. A. Garcia-Ulloa, L. Xiong, and V. Sunderam, “Participant privacy in mobile crowd sensing task management: A survey of methods and challenges,” ACM SIGMOD Rec., vol. 44, no. 4, pp. 23–34, May 2016.
[34]
C. Cornelius, A. Kapadia, D. Kotz, D. Peebles, M. Shin, and N. Triandopoulos, “Anonysense: Privacy-aware people-centric sensing,” in Proc. 6th Int. Conf. Mobile Syst., Appl., Services (MobiSys), 2008, pp. 211–224.
[35]
I. Krontiris and T. Dimitriou, “Privacy-respecting discovery of data providers in crowd-sensing applications,” in Proc. IEEE Int. Conf. Distrib. Comput. Sensor Syst., May 2013, pp. 249–257.
[36]
L. Pournajaf, L. Xiong, V. Sunderam, and S. Goryczka, “Spatial task assignment for crowd sensing with cloaked locations,” in Proc. IEEE 15th Int. Conf. Mobile Data Manage., Jul. 2014, pp. 73–82.
[37]
I. J. Vergara-Laurens, D. Mendez, and M. A. Labrador, “Privacy, quality of information, and energy consumption in participatory sensing systems,” in Proc. IEEE Int. Conf. Pervas. Comput. Commun. (PerCom), Mar. 2014, pp. 199–207.
[38]
H. To, G. Ghinita, and C. Shahabi, “A framework for protecting worker location privacy in spatial crowdsourcing,” Proc. VLDB Endowment, vol. 7, no. 10, pp. 919–930, Jun. 2014.
[39]
H. To, C. Shahabi, and L. Xiong, “Privacy-preserving online task assignment in spatial crowdsourcing with untrusted server,” in Proc. IEEE 34th Int. Conf. Data Eng. (ICDE), Apr. 2018, pp. 833–844.
[40]
L. Wang, D. Yang, X. Han, T. Wang, D. Zhang, and X. Ma, “Location privacy-preserving task allocation for mobile crowdsensing with differential geo-obfuscation,” in Proc. 26th Int. Conf. World Wide Web (WWW), 2017, pp. 627–636.
[41]
D. L. Donoho, “Compressed sensing,” IEEE Trans. Inf. Theory, vol. 52, no. 4, pp. 1289–1306, Apr. 2006.
[42]
E. J. Candes and Y. Plan, “Matrix completion with noise,” Proc. IEEE, vol. 98, no. 6, pp. 925–936, Jun. 2010.
[43]
J. Shang, Y. Zheng, W. Tong, E. Chang, and Y. Yu, “Inferring gas consumption and pollution emission of vehicles throughout a city,” in Proc. 20th ACM SIGKDD Int. Conf. Knowl. Discovery Data Mining (KDD), 2014, pp. 1027–1036.
[44]
G. James, D. Witten, T. Hastie, and R. Tibshirani, An Introduction to Statistical Learning. New York, NY, USA: Springer, 2013.
[45]
D. A. Spielman and S.-H. Teng, “Smoothed analysis of algorithms: Why the simplex algorithm usually takes polynomial time,” J. ACM, vol. 51, no. 3, pp. 385–463, 2004.
[46]
L. Caccetta and R. Häggkvist, “On diameter critical graphs,” Discrete Math., vol. 28, no. 3, pp. 223–229, 1979.
[47]
P. Erdős, A. Rényi, and V. Sós, “On a problem of graph theory,” Studia Sci. Math. Hungar, vol. 1, pp. 215–235, Dec. 1966.
[48]
Y. Koren, R. Bell, and C. Volinsky, “Matrix factorization techniques for recommender systems,” Computer, vol. 42, no. 8, pp. 30–37, Aug. 2009.
[49]
S. Agrawal and J. R. Haritsa, “A framework for high-accuracy privacy-preserving mining,” in Proc. ICDE, 2005, pp. 193–204.
[50]
W. Eltarjaman, R. Dewri, and R. Thurimella, “Location privacy for rank-based geo-query systems,” Proc. Privacy Enhancing Technol., vol. 2017, no. 4, pp. 77–96, Oct. 2017.
[51]
F. Ingelrest, G. Barrenetxea, G. Schaefer, M. Vetterli, O. Couach, and M. Parlange, “SensorScope: Application-specific sensor network for environmental monitoring,” ACM Trans. Sensor Netw., vol. 6, no. 2, pp. 1–32, Feb. 2010.
[52]
S. Kosta, A. Mei, and J. Stefa, “Large-scale synthetic social mobile networks with SWIM,” IEEE Trans. Mobile Comput., vol. 13, no. 1, pp. 116–129, Jan. 2014.
[53]
Y. Zheng, F. Liu, and H.-P. Hsieh, “U-air: When urban air quality inference meets big data,” in Proc. KDD, 2013, pp. 1436–1444.
[54]
D. Yang, D. Zhang, and B. Qu, “Participatory cultural mapping based on collective behavior data in location-based social networks,” ACM Trans. Intell. Syst. Technol., vol. 7, no. 3, pp. 1–23, Jan. 2016.
[55]
G. Danezis, S. Lewis, and R. J. Anderson, “How much is location privacy worth?” in Proc. WEIS, vol. 5, Jun. 2005, pp. 1–13.

Cited By

View all
  • (2024)A Quality-Aware and Obfuscation-Based Data Collection Scheme for Cyber-Physical Metaverse SystemsACM Transactions on Multimedia Computing, Communications, and Applications10.1145/365958221:2(1-23)Online publication date: 16-Apr-2024
  • (2024)Enhancing Sparse Mobile CrowdSensing With Manifold Optimization and Differential PrivacyIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.340766819(6070-6083)Online publication date: 3-Jun-2024
  • (2024)Personalized 3D Location Privacy Protection With Differential and Distortion Geo-PerturbationIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2023.333537421:4(3629-3643)Online publication date: 1-Jul-2024
  • Show More Cited By

Index Terms

  1. Sparse Mobile Crowdsensing With Differential and Distortion Location Privacy
      Index terms have been assigned to the content through auto-classification.

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image IEEE Transactions on Information Forensics and Security
      IEEE Transactions on Information Forensics and Security  Volume 15, Issue
      2020
      2247 pages

      Publisher

      IEEE Press

      Publication History

      Published: 01 January 2020

      Qualifiers

      • Research-article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 31 Dec 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)A Quality-Aware and Obfuscation-Based Data Collection Scheme for Cyber-Physical Metaverse SystemsACM Transactions on Multimedia Computing, Communications, and Applications10.1145/365958221:2(1-23)Online publication date: 16-Apr-2024
      • (2024)Enhancing Sparse Mobile CrowdSensing With Manifold Optimization and Differential PrivacyIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.340766819(6070-6083)Online publication date: 3-Jun-2024
      • (2024)Personalized 3D Location Privacy Protection With Differential and Distortion Geo-PerturbationIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2023.333537421:4(3629-3643)Online publication date: 1-Jul-2024
      • (2024)L3P-DLI: A Lightweight Positioning-Privacy Protection Scheme With Double-Layer Incentives for Wireless Crowd Sensing SystemsIEEE Journal on Selected Areas in Communications10.1109/JSAC.2024.341458042:10(2938-2953)Online publication date: 14-Jun-2024
      • (2024)Privacy-preserving generation and publication of synthetic trajectory microdataJournal of Network and Computer Applications10.1016/j.jnca.2024.103951230:COnline publication date: 18-Oct-2024
      • (2024)A differential privacy location protect approach with intelligence data collection paradigm for MCSComputer Networks: The International Journal of Computer and Telecommunications Networking10.1016/j.comnet.2024.110421247:COnline publication date: 18-Jul-2024
      • (2024)pFind: Privacy-preserving lost object finding in vehicular crowdsensingWorld Wide Web10.1007/s11280-024-01300-427:5Online publication date: 13-Sep-2024
      • (2024)A Secure Incentive Mechanism in Blockchain-Based Mobile CrowdsensingInformation Security Practice and Experience10.1007/978-981-97-9053-1_20(347-364)Online publication date: 25-Oct-2024
      • (2023)PAMDIJournal of Ambient Intelligence and Smart Environments10.3233/AIS-22047515:1(19-46)Online publication date: 1-Jan-2023
      • (2023)Differentiated Location Privacy Protection in Mobile Communication Services: A Survey from the Semantic Perception PerspectiveACM Computing Surveys10.1145/361758956:3(1-36)Online publication date: 5-Oct-2023
      • Show More Cited By

      View Options

      View options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media