CAP: A Context-Aware Privacy Protection System For Location-Based Services
CAP: A Context-Aware Privacy Protection System For Location-Based Services
CAP: A Context-Aware Privacy Protection System For Location-Based Services
Rank Distance
road density index = 9
1.8 3.5 road density index = 11
road density index = 7
1 3 road density index = 9
road density index = 5 1.6 Naive technique road density index = 7
0.8 2.5
1.4 VHC-mapping road density index = 5
0.6 2
1.2 1.5
0.4 1 1
0.2 0.8 0.5
0 0.6 0
0.01 0.1 0.5 1 2 5 7 9 11 13 0.01 0.1 0.5 1 2
Noise parameter (!) Road Density Index Noise parameter (!)
Figure 4. 2-d Perturbation dis- Figure 5. Naive technique vs Figure 6. lr (Top-10) vs. σ
tance vs σ VHC-mapping
5
100 100
4.5
90 90
4 True positives rate
3.5 noise[-0.1,0.1] 70 70
3 noise[-0.5,0.5]
60 60
2.5 noise[-1.0,1.0]
noise[-2.0,2.0]
50 50
2 40 road density index = 13 40 noise[-0.01,0.01]
1.5 30 road density index = 11 30 noise[-0.1,0.1]
1 20 road density index = 9 20 noise[-0.5,0.5]
road density index = 7 noise[-1.0,1.0]
0.5 10 10
road density index = 5 noise[-2.0,2.0]
0 0 0
5 7 9 11 13 0.01 0.1 0.5 1 2 5 7 9 11 13
Road Density Index Noise parameter (!) Road Density Index
Figure 7. lr (Top-10) vs. Road Figure 8. True Positive Rate (Top- Figure 9. True Positive Rate (Top-
Density Index 10) vs. σ 10) vs. Road Density Index
Extra traveling distance (miles)
1 100 200000
Middlesex County,MA
Figure 10. Extra miles vs σ Figure 11. Extra miles (%) vs σ Figure 12. Binary map file size vs
µ
most experiments. Generally, the road density increases in techniques. One can clearly observe that in contrast with
exponential order with the road density index. the naive technique, VHC-mapping applies context-aware
Figure 4 depicts the relationship between the average 2-d perturbation, i.e., higher perturbation is applied to locations
perturbation distance DISTANCE(userP os, R(userP os)) with lower road density.
and the noise parameter σ for locations with various road We evaluated the accuracy of location perturbing compo-
densities. The 2-d perturbation distance is the Euclidean nent for a scenario where we issue a top-10 query for the
distance between the original and perturbed locations. Be- nearest POI. Figures 6 and 7 depict the relationship between
sides, we tested with Manhattan distance [12] and obtained the degree of LBS accuracy lr and the noise parameter σ for
similar results. As we can see, the 2-d perturbation distance locations with various road densities. In both the figures,
for a rural location (road density index = 5) is much we can make two observations: First, lr increases with the
greater compared to a downtown (road density index = 13) increase of σ. Second, there is no significant difference
location. This confirms that a rural location merits a larger in LBS accuracy for locations with different road density
perturbation than a downtown location. indices. Similar observations can be made from Figures 8
Figure 5 depicts the comparison between VHC-mapping and 9, where the LBS accuracy measure is the true positive
and a naive technique, which uses universal random noise rate of the returned top-10 results.
to perturb a user’s location, regardless of its context. We To estimate the real-world experience of CAP users, we
have used the same noise parameter value, σ = 2, for both consider the additional distance traveled by a user to reach
1
the returned nearest POI (compared with the real nearest 0.8 Weighted Routing
POI). Figure 10 depicts the relationship between extra miles 0.6 Differential Routing
F(x)
Diff/CA Routing (≤20KB/s)
to be traveled and noise parameter σ. It can be observed that 0.4
a user will have to travel more for higher level of privacy 0.2
f(x)
0.1
in Figure 11, where for all the different values of noise 0.05
parameter σ, the extra miles to be traveled is approximately 0 20 40 60 80 100 120 140
65% of the 2-d perturbation distance. (b) PDF Downloading Time (s)
[1] B. Arai, G. Das, D. Gunopulos, and N. Koudas. Anytime [15] M. F. Mokbel and C. Y. Chow. Challenges in preserving
measures for top-k algorithms. In VLDB, 2007. location privacy in peer-to-peer environments. In Proc. of
the International Workshop on Information Processing over
[2] C. A. Ardagna, M. Cremonini, E. Damiani, S. D. C. di Vimer- Evolving Networks (WINPEN), 2006.
cati, and P. Samarati. Location privacy protection through
obfuscation-based techniquess. Data and Applications Secu- [16] Moonbuggy. Man accused of stalking with gps, 2004.
rity XXI (Lecture Notes in Computer Science), 2007.
[17] H.-O. Peitgen and D. Saupe. The Science of Fractal Images.
[3] deluogps.com. Sirf star iii based mouse type USB GPS Springer-Verlag, New York, 1988.
receiver for laptop, 2008.
[18] R. Pries, W. Yu, S. Graham, and X. Fu. On performance
[4] R. Dingledine and N. Mathewson. Tor: An anonymous in- bottleneck of anonymous communication networks. In Proc.
ternet communication system. http://archives.seul.org/or/talk/, of the 22nd IEEE International Parallel and Distributed
2006. Processing Symposium (IPDPS), 2008.
[5] M. Duckham and L. Kulik. A formal model of obfuscation [19] A. Research. GPS-enabled location-based services (lbs)
and negotiation or location privacy. In Proc. of the 3rd subscribers will total 315 million in five years, 2006.
Internation Conference on Pervasive Computing and Com-
munications, 2005. [20] R.Snader and N.Borisov. A tune-up for tor: Improving
security and performance in the tor network. In Proc. of
[6] geobytes.com. Ip address locator tool, 2008. the 15th Annual Network and Distributed System Security
Symposium (NDSS), 2008.
[7] G. Ghinita, P. Kalnis, A. Khoshgozaran, C. Shahabi, Tan,
and Kian-Lee. Private queries in location based services: [21] R. Sion and B. Carbunar. On the computational practicality
Anonymizers are not necessary. In Proc. of ACM SIGMOD, of private information retrieval. In Proc. of the 14th Annual
2008. Network and Distributed Security Symposium (NDSS), 2007.
[8] D. R. Glover and J. L. Simon. The effect of population density [22] L. Sweeney. k-anonymity: a model for protecting pri-
on infrastructure: The case of road building. Economic vacy. International Journal on Uncertainty, Fuzziness and
Development and Cultural Change, 23(3):453–468, 1975. Knowledge-based Systems, 10(5):557–570, 2002.
[9] M. Gruteser and X. Liu. Protecting privacy in continuous [23] T. Xu and Y. Cai. Exploring historical location data for
location-tracking applications. IEEE Security and Privacy, anonymity preservation in location-based services. In Proc.
2(2):28–34, 2004. of IEEE International Conference on Computer Communica-
tions (INFOCOM), 2008.
[10] Y.-C. Hu and H. J. Wang. Location privacy in wireless
networks. In Proc. of the ACM SIGCOMM Asia Workshop, [24] N. Zhang and W. Zhao. Privacy-preserving data mining
2005. systems. IEEE Computer, 40(4):52–58, 2007.