Perturbed-Location Mechanism for Increased User-Location Privacy in Proximity Detection and Digital Contact-Tracing Applications
Abstract
:1. Introduction and Problem Statement
2. Classification of Location-Privacy Mechanisms
3. Proposed Perturbed Location Mechanism
3.1. Scenario Definition, Hypotheses, and Preliminary Notations
3.2. Perturbation Metrics
3.3. Private Proximity-Detection Architecture with the Proposed Mechanism
4. Theoretical Analysis of the Proposed Argmax Perturbed Location Mechanism
5. Simulation-Based Results
5.1. Simulation Scenarios and Performance Metrics
5.2. Comparison with State-of-the-Art Perturbation Mechanisms
5.3. Privacy Level as a Function of Parameter
5.4. Utility Level as a Function of Parameter
5.5. Privacy-versus-Utility Tradeoffs
6. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Conflicts of Interest
List of Acronyms
6G | Sixth generation of cellular communications |
BLE | Bluetooth Low Energy |
COVID-19 | Coronavirus disease 2019 |
DP | Differential Privacy |
ECEF | Earth Centered Earth Fixed |
GNSS | Global Navigation Satellite Systems |
GeoInd | Geo-indistinguishability |
IEEE | Institute of Electrical and Electronics Engineers |
LDP | Local Differential Privacy |
LBS | Location-Based Services |
LPPM | Location Privacy-Preserving Mechanisms |
probability distribution function | |
RSS | Received Signal Strength |
RMSE | Root Mean Square Error |
UWB | Ultra Wide-Band |
References
- De Lima, C.; Belot, D.; Berkvens, R.; Bourdoux, A.; Dardari, D.; Guillaud, M.; Isomursu, M.; Lohan, E.S.; Miao, Y.; Barreto, A.N.; et al. Convergent Communication, Sensing and Localization in 6G Systems: An Overview of Technologies, Opportunities and Challenges. IEEE Access 2021, 9, 26902–26925. [Google Scholar] [CrossRef]
- P802.11bf—Standard for Information Technology—Telecommunications and Information Exchange Between Systems Local and Metropolitan Area Networks—Specific Requirements—Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications Amendment: Enhancements for Wireless Local Area Network (WLAN) Sensing. Available online: https://standards.ieee.org/project/802_11bf.html?utm_source=beyondstandards&utm_medium=post&utm_campaign=working-group-2020&utm_content=802 (accessed on 15 November 2021).
- Brovko, T.; Chugunov, A.; Malyshev, A. Positioning Algorithm for Smartphone Based Staff Tracking. In Proceedings of the 2021 International Russian Automation Conference (RusAutoCon), Sochi, Russia, 5–11 September 2021; pp. 464–468. [Google Scholar] [CrossRef]
- Flueratoru, L.; Shubina, V.; Niculescu, D.; Lohan, E.S. On the High Fluctuations of Received Signal Strength Measurements with BLE Signals for Contact Tracing and Proximity Detection. IEEE Sens. J. 2021. [Google Scholar] [CrossRef]
- Shubina, V.; Ometov, A.; Basiri, A.; Lohan, E.S. Effectiveness modelling of digital contact-tracing solutions for tackling the COVID-19 pandemic. J. Navig. 2021, 74, 853–886. [Google Scholar] [CrossRef]
- Shubina, V.; Holcer, S.; Gould, M.; Lohan, E.S. Survey of Decentralized Solutions with Mobile Devices for User Location Tracking, Proximity Detection, and Contact Tracing in the COVID-19 Era. Data 2020, 5, 87. [Google Scholar] [CrossRef]
- Bian, S.; Zhou, B.; Lukowicz, P. Social Distance Monitor with a Wearable Magnetic Field Proximity Sensor. Sensors 2020, 20, 5101. [Google Scholar] [CrossRef]
- Vaudenay, S. Centralized or Decentralized? The Contact Tracing Dilemma. 2020. Available online: https://eprint.iacr.org/2020/531.pdf (accessed on 24 November 2021).
- Castelluccia, C.; Bielova, N.; Boutet, A.; Cunche, M.; Lauradoux, C.; Le Métayer, D.; Roca, V. ROBERT: ROBust and privacy-presERving Proximity Tracing. Available online: https://hal.inria.fr/hal-02611265/document (accessed on 24 November 2020).
- Leith, D.J.; Farrell, S. Contact tracing app privacy: What data is shared by europe’s gaen contact tracing apps. In Proceedings of the IEEE INFOCOM 2021-IEEE Conference on Computer Communications, Vancouver, BC, Canada, 10–13 May 2021; pp. 1–10. [Google Scholar]
- Jiang, H.; Li, J.; Zhao, P.; Zeng, F.; Xiao, Z.; Iyengar, A. Location privacy-preserving mechanisms in location-based services: A comprehensive survey. ACM Comput. Surv. (CSUR) 2021, 54, 1–36. [Google Scholar] [CrossRef]
- Basiri, A.; Lohan, E.S.; Moore, T.; Winstanley, A.; Peltola, P.; Hill, C.; Amirian, P.; e Silva, P.F. Indoor location based services challenges, requirements and usability of current solutions. Comput. Sci. Rev. 2017, 24, 1–12. [Google Scholar] [CrossRef] [Green Version]
- von Arb, M.; Bader, M.; Kuhn, M.; Wattenhofer, R. VENETA: Serverless Friend-of-Friend Detection in Mobile Social Networking. In Proceedings of the 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, Avignon, France, 12–14 October 2008; pp. 184–189. [Google Scholar] [CrossRef] [Green Version]
- Ye, A.; Chen, Q.; Xu, L.; Wu, W. The flexible and privacy-preserving proximity detection in mobile social network. Future Gener. Comput. Syst. 2018, 79, 271–283. [Google Scholar] [CrossRef]
- Kim, J.W.; Edemacu, K.; Kim, J.S.; Chung, Y.D.; Jang, B. A Survey of differential privacy-based techniques and their applicability to location-Based services. Comput. Secur. 2021, 111, 102464. [Google Scholar] [CrossRef]
- Chatzikokolakis, K.; Palamidessi, C.; Stronati, M. Geo-indistinguishability: A principled approach to location privacy. In Proceedings of the International Conference on Distributed Computing and Internet Technology, Bhubaneswar, India, 5–8 February 2015; pp. 49–72. [Google Scholar]
- Andrés, M.E.; Bordenabe, N.E.; Chatzikokolakis, K.; Palamidessi, C. Geo-indistinguishability: Differential privacy for location-based systems. In Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, Berlin, Germany, Berlin, Germany, 4–8 November, 2013; pp. 901–914. [Google Scholar]
- Qiu, C.; Squicciarini, A.C.; Pang, C.; Wang, N.; Wu, B. Location privacy protection in vehicle-based spatial crowdsourcing via geo-indistinguishability. IEEE Trans. Mobile Comput. 2020. [Google Scholar] [CrossRef]
- Yan, Y.; Gao, X.; Mahmood, A.; Feng, T.; Xie, P. Differential private spatial decomposition and location publishing based on unbalanced quadtree partition algorithm. IEEE Access 2020, 8, 104775–104787. [Google Scholar] [CrossRef]
- Shubina, V.; Ometov, A.; Andreev, S.; Niculescu, D.; Lohan, E.S. Privacy versus Location Accuracy in Opportunistic Wearable Networks. In Proceedings of the2020 International Conference on Localization and GNSS (ICL-GNSS), Tampere, Finland, 2–4 June 2020; pp. 1–6. [Google Scholar]
- Chatzikokolakis, K.; Elsalamouny, E.; Palamidessi, C. Efficient utility improvement for location privacy. Proc. Priv. Enhancing Technol. 2017, 2017, 308–328. [Google Scholar] [CrossRef] [Green Version]
- Zhang, X.; Huang, H.; Huang, S.; Chen, Q.; Ju, T.; Du, X. A context-aware location differential perturbation scheme for privacy-aware users in mobile environment. Wirel. Commun. Mob. Comput. 2018, 2018, 9173519. [Google Scholar] [CrossRef]
- Agir, B.; Papaioannou, T.G.; Narendula, R.; Aberer, K.; Hubaux, J.P. User-side adaptive protection of location privacy in participatory sensing. GeoInformatica 2013, 18, 165–191. [Google Scholar] [CrossRef]
- du Pin Calmon, F.; Fawaz, N. Privacy against statistical inference. In Proceedings of the 2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton), Monticello, IL, USA, 1–5 October 2012; pp. 1401–1408. [Google Scholar] [CrossRef] [Green Version]
- Salamatian, S.; Zhang, A.; Calmon, F.d.P.; Bhamidipati, S.; Fawaz, N.; Kveton, B.; Oliveira, P.; Taft, N. How to hide the elephant- or the donkey- in the room: Practical privacy against statistical inference for large data. In Proceedings of the 2013 IEEE Global Conference on Signal and Information Processing, Austin, TX, USA, 3–5 December 2013; pp. 269–272. [Google Scholar] [CrossRef]
- Degue, K.H.; Ny, J.L. On Differentially Private Gaussian Hypothesis Testing. In Proceedings of the2018 56th Annual Allerton Conference on Communication, Control, and Computing (Allerton), Monticello, IL, USA, 2–5 October 2018; pp. 842–847. [Google Scholar] [CrossRef]
- Hua, J.; Tong, W.; Xu, F.; Zhong, S. A Geo-Indistinguishable Location Perturbation Mechanism for Location-Based Services Supporting Frequent Queries. IEEE Trans. Inf. Forensics Secur. 2018, 13, 1155–1168. [Google Scholar] [CrossRef]
- Zhao, M.; Zhu, X.; Niu, J.; Ma, J. A Semantic-Based Dummy Generation Strategy for Location Privacy. In Proceedings of the2019 International Conference on Networking and Network Applications (NaNA), Daegu, Korea, 10–13 October 2019; pp. 21–26. [Google Scholar] [CrossRef]
- Shekhar, S.; Xiong, H. Location Perturbation. In Encyclopedia of GIS; Springer: Boston, MA, USA, 2008; p. 630. [Google Scholar] [CrossRef]
- Gruteser, M.; Grunwald, D. Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking. In Proceedings of the 1st International Conference on Mobile Systems, Applications and Services—MobiSys’03, San Francisco, CA, USA, 5–8 May 2003; 2003. [Google Scholar] [CrossRef]
- Dini, G.; Perazzo, P. Uniform Obfuscation for Location Privacy. In Data and Applications Security and Privacy XXVI; Springer: Berlin/Heidelberg, Germany, 2012; pp. 90–105. [Google Scholar] [CrossRef]
- Krumm, J. A survey of computational location privacy. Pers. Ubiquitous Comput. 2008, 13, 391–399. [Google Scholar] [CrossRef]
- Xu, Z.; Zhang, H.; Yu, X. Multiple Mix-Zones Deployment for Continuous Location Privacy Protection. In Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, Tianjin, China, 23–26 August 2016; pp. 760–766. [Google Scholar] [CrossRef]
- Khodaei, M.; Papadimitratos, P. Cooperative Location Privacy in Vehicular Networks: Why Simple Mix Zones are Not Enough. IEEE Internet Things J. 2021, 8, 7985–8004. [Google Scholar] [CrossRef]
- Li, Y.; Li, S. A Real-Time Location Privacy Protection Method Based on Space Transformation. In Proceedings of the 2018 14th International Conference on Computational Intelligence and Security (CIS), Hangzhou, China, 16–19 November 2018; pp. 291–295. [Google Scholar] [CrossRef]
- Pu, Y.; Luo, J.; Wang, Y.; Hu, C.; Huo, Y.; Zhang, J. Privacy Preserving Scheme for Location Based Services Using Cryptographic Approach. In Proceedings of the2018 IEEE Symposium on Privacy-Aware Computing (PAC), Washington, DC, USA, 26–28 September 2018; pp. 125–126. [Google Scholar] [CrossRef]
- Jarvinen, K.; Leppakoski, H.; Lohan, E.S.; Richter, P.; Schneider, T.; Tkachenko, O.; Yang, Z. PILOT: Practical Privacy-Preserving Indoor Localization Using OuTsourcing. In Proceedings of the2019 IEEE European Symposium on Security and Privacy (EuroS P), Stockholm, Sweden, 17–19 June 2019; pp. 448–463. [Google Scholar] [CrossRef] [Green Version]
- Gupta, S.; Arora, G. Use of Homomorphic Encryption with GPS in Location Privacy. In Proceedings of the 2019 4th International Conference on Information Systems and Computer Networks (ISCON), Mathura, India, 21–22 November 2019; pp. 42–45. [Google Scholar] [CrossRef]
- Li, X.; Ren, Y.; Yang, L.T.; Zhang, N.; Luo, B.; Weng, J.; Liu, X. Perturbation-Hidden: Enhancement of Vehicular Privacy for Location-Based Services in Internet of Vehicles. IEEE Trans. Netw. Sci. Eng. 2020, 8, 2073–2086. [Google Scholar] [CrossRef]
- Lu, H.; Jensen, C.S.; Yiu, M.L. Pad: Privacy-area aware, dummy-based location privacy in mobile services. In MobiDE’08 Proceedings of the Seventh ACM International Workshop on Data Engineering for Wireless and Mobile Access, Vancouver, BC, Canada, 13 June 2008; pp. 16–23. [Google Scholar]
- Bindschaedler, V.; Shokri, R. Synthesizing plausible privacy-preserving location traces. In Proceedings of the 2016 IEEE Symposium on Security and Privacy (SP), San Jose, CA, USA, 22–26 May 2016; pp. 546–563. [Google Scholar]
- AbdelWahab, O.F.; Hussein, A.I.; Hamed, H.F.; Kelash, H.M.; Khalaf, A.A. Efficient Combination of RSA Cryptography, Lossy, and Lossless Compression Steganography Techniques to Hide Data. Procedia Comput. Sci. 2021, 182, 5–12. [Google Scholar] [CrossRef]
- Machanavajjhala, A.; Kifer, D.; Gehrke, J.; Venkitasubramaniam, M. l-diversity: Privacy beyond k-anonymity. ACM Trans. Knowl. Discov. Data (TKDD) 2007, 1, 3-es. [Google Scholar] [CrossRef]
- Li, N.; Li, T.; Venkatasubramanian, S. t-closeness: Privacy beyond k-anonymity and l-diversity. In Proceedings of the 2007 IEEE 23rd International Conference on Data Engineering, Istanbul, Turkey, 15–20 April 2007; pp. 106–115. [Google Scholar]
- Gedik, B.; and Liu, L. Protecting location privacy with personalized k-anonymity: Architecture and algorithms. IEEE Trans. Mob. Comput. 2007, 7, 1–18. [Google Scholar] [CrossRef]
- Cormode, G.; Procopiuc, C.; Srivastava, D.; Shen, E.; Yu, T. Differentially private spatial decompositions. In Proceedings of the 2012 IEEE 28th International Conference on Data Engineering, Arlington, VA, USA, 1–5 April 2012; pp. 20–31. [Google Scholar]
- Xu, Y.; Yang, G.; Bai, S. Laplace Input and Output Perturbation for Differentially Private Principal Components Analysis. Secur. Commun. Networks 2019, 2019, 9169802. [Google Scholar] [CrossRef]
- Balle, B.; Wang, Y.X. Improving the Gaussian Mechanism for Differential Privacy: Analytical Calibration and Optimal Denoising. In Proceedings of the 35th International Conference on Machine Learning, Stockholmsmässan, Stockholm Sweden, 10–15 July 2018; Volume 80, pp. 394–403. [Google Scholar]
Location-Preservation Area | Mechanism | Main Features | Refs. |
---|---|---|---|
User-side | Privacy-preserving mapping | Multiple initialization and data collection steps are required to build the initial map for further feature extraction and matching. | [24,25] |
User-side | Noise Perturbation | The concept of adding noise from a sample distribution and modifying the reported locations of the users. This approach is easy to break in cases where the adversary has prior knowledge about the noise model in use. | [26,27,39] |
User-side | Dummy locations | The mechanism is susceptible to inference attacks, easy to break with an application of heterogeneous location correlations. | [28,40,41] |
User-side | Partially hidden (incomplete) data | This method assumes ditching or deliberately hiding non-essential pieces of data, which could reveal sensitive information of the users’ whereabouts. This method is easy to break with an application of heterogeneous correlations. | [39] |
Communication | Encryption | For security reasons, all data should be encrypted, consequently, this might cause insignificant delays in transferring the packets within a communication scheme [42]. | [36,37,38] |
Server-side | k-anonymity/ Spatial cloaking | Minimizes risks of re-identification of anonymized data; however, this approach is susceptible to privacy breaches, such as de-anonymization, in cases where the adversary has prior knowledge about individuals. To tackle the issue, such approaches as t-closeness and l-diversity were developed to augment the k-anonymity privacy protection [43,44]. | [29,45] |
Server-side | Private spatial decomposition | Via applications of the hierarchical decomposition, the location data is stored in clusters, being decomposed into small pieces. | [19,46] |
Server-side | Mixed zones | This method aggregates the user data with common attributes and generalizes the location to set areas, having bigger radii than the ground truth location. Therefore, it is not providing a solid basis for preserving privacy as some data are still revealed. | [33,34] |
Parameter | Value [Unit] |
---|---|
Number of floors | 4 [-] |
Building grid | 1 [m] |
Building size | [m] horizontally |
12 m vertically (4 m floor heights) | |
Number of users | Variable, 100 or 1000 [-] |
Privacy budget | Variable, between and [1/m] |
Proximity threshold | Variable, 2 or 10 [m] |
Number of hotspots per floor | Variable, between 2 and 4 [-] |
Hotspot radius | Variable, between 4 and 10 [m] |
Percentage of users within hotspot areas | |
Number of Monte Carlo runs | 1000 [-] |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Lohan, E.S.; Shubina, V.; Niculescu, D. Perturbed-Location Mechanism for Increased User-Location Privacy in Proximity Detection and Digital Contact-Tracing Applications. Sensors 2022, 22, 687. https://doi.org/10.3390/s22020687
Lohan ES, Shubina V, Niculescu D. Perturbed-Location Mechanism for Increased User-Location Privacy in Proximity Detection and Digital Contact-Tracing Applications. Sensors. 2022; 22(2):687. https://doi.org/10.3390/s22020687
Chicago/Turabian StyleLohan, Elena Simona, Viktoriia Shubina, and Dragoș Niculescu. 2022. "Perturbed-Location Mechanism for Increased User-Location Privacy in Proximity Detection and Digital Contact-Tracing Applications" Sensors 22, no. 2: 687. https://doi.org/10.3390/s22020687