Gruteserspaceos

spaceos  时间:2021-03-28  阅读:()
ProtectingLocationPrivacythroughSemantics-awareObfuscationTechniquesMariaLuisaDamiani,ElisaBertino,ClaudioSilvestriAbstractThewidespreadadoptionoflocation-basedservices(LBS)raisesincreas-ingconcernsfortheprotectionofpersonallocationinformation.
Toprotectloca-tionprivacytheusualstrategyistoobfuscatetheactualpositionoftheuserwithacoarselocationandthenforwardtheobfuscatedlocationtotheLBSprovider.
Ex-istingtechniquesforlocationobfuscationareonlybasedongeometricmethods.
Westatethatsuchtechniquesdonotprotectagainstprivacyattacksrootedintheknowl-edgeofthespatialcontext.
Wethuspresentanovelframeworkforthesafeguardofsensitivelocationscomprehensiveofaprivacymodelandanalgorithmforthecomputationofobfuscatedlocations1IntroductionLocation-basedservices(LBS)andinparticularGPS-enabledlocationservicesaregainingincreasingpopularity.
Marketstudies[7]forecastthatthenumberofGPS-enabledmobiledevices,includingpersonalnavigationdevices,cellularhandsets,mobilePCs,andavarietyofportableconsumerelectronicsdevices,willgrowfrom180millionunitsin2006to720millionunitsin2011.
Mobileusersequippedwithlocation-awaredevicestypicallyrequestaLBSser-vicebyforwardingtotheserviceprovideraqueryalongwiththeuser'sposition.
Theserviceproviderthenanswersthequerybasedontheposition.
Unfortunately,thecommunicationoftheuser'spositiontotheserviceproviderraisesstrongpri-MariaLuisaDamianiDICO,UniversityofMilan,ViaComelico39,20135Milan(I),e-mail:damiani@dico.
unimi.
itElisaBertinoPurdueUniversity,WestLafayette(US)e-mail:bertino@cs.
purdue.
eduClaudioSilvestriDICO,UniversityofMilan,ViaComelico39,20135Milan(I),e-mail:silvestri@dico.
unimi.
itPleaseusethefollowingformatwhencitingthischapter:Damiani,M.
L.
,Bertino,E.
andSilvestri,C.
,2008,inIFIPInternationalFederationforInformationProcessing,Volume263;TrustManagementII;YücelKarabulut,JohnMitchell,PeterHerrmann,ChristianDamsgaardJensen;(Boston:Springer),pp.
231–245.
vacyconcernsbecauseitmayresultintheunauthorizeddisseminationofpersonallocationdata.
Suchdatamayinturnleadtotheinferenceofsensitiveinformationaboutindividuals.
Forexamplethehealthstatusofaserviceusercanbeinferredfromthenatureoftheclinicsbeingvisited.
Personallocationdatareferstotheassociation(u,p)betweenuseridentieruandpositioninformationp.
Protectinglocationprivacymeansthuspreventinguandpfrombeingbothdisclosedwithouttheconsentoftheuser[2].
Awell-knownapproachtotheprotectionoflocationprivacyistodeliberatelydegradethequalityoflocationinformationandforwardtotheLBSprovideranimpreciseposition.
Imprecisionmayhowevercompromisethequalityofservicebecausetheanswertothequerymayresulttoocoarse.
Therefore,theimprecisepositionmustbedenedataresolutionwhichisacceptablefortheuser.
Werefertoanimpreciseuser'spositionasobfuscatedlocation.
Ingeneral,obfuscatedlocationsarecomputedusingtechniques,suchas(loca-tion)k-anonymity[6,10,8],basedongeometricmethods.
Werefertothesetech-niquesasgeometry-based.
Weclaimthatgeometry-basedobfuscationtechniquesdonotprotectagainstthefollowingsimpleprivacyattack.
LocationprivacyattackAssumethatJohnissuesaLBSrequestfrompositionpinsidehospitalMaggioreinFigure1(a).
Johnhoweverdoesnotwanttodisclosethefactofbeinginsidethehospitalbecausethatmightrevealhehashealthproblems.
Nowassumethatlocationpisobfuscatedbyregionqusingsomegeometry-basedtechnique(Figure1(b)).
WecanobservethatifanadversaryknowsthatJohnisintheobfuscatedlocationqandqisentirelycontainedinthespatialextentofthehospital(thelocationofthehospitalispubliclyknown),thensuchadversarycanimmediatelyinferthatJohnisinthehospital.
Asaresult,sensitiveinformationisdisclosedagainsttheuserconsent.
NotehoweverthatifJohnwouldbeadoctor,suchaprivacyconcernwouldnotarisebecausethelocationwouldberelatedtotheuser'sprofessionalactivity.
Werefertothisprivacyattackasspatialknowledgeattack.
Thespatialknowledgeattackarisesbecausegeometry-basedobfuscationtech-niquesdonotconsidertheactualsemanticsofspace,namelythespatialentitiespopulatingthereferencespaceandtheirspatialrelationships,inothertermsthespatialknowledge.
Thereforethosetechniqueareunabletoprotectagainsttheinfer-encesmadebylinkingthegeometricinformationwiththelocationmeaningwhich,dependingontheperceptionsofuser,mayrepresentsensitiveinformation.
Thepro-tectionoflocationprivacythuscallsfortechniquesabletotakeintoaccountthequalitativecontextinwhichusersarelocatedaswellastheirprivacypreferences.
Toaddressthoserequirements,weproposeanovellocationobfuscationframe-work,thatwerefertoassemantic-awareobfuscationsystem.
Themaincontribution232M.
L.
Damianietal.
Fig.
1Exampleofobfuscatedlocationofthispaperisthedenitionofthecorecomponentsoftheobfuscationsystem,thatis:aprivacymodelsupportingtheobfuscationofsensitivelocationsbasedonuserpreferences;analgorithm,calledSensFlow(i.
e.
SensitivityFlow),implementingtheobfus-cationstrategy.
Theremainderofthepaperisstructuredasfollows.
Nextsectionoverviewsre-latedwork.
Thenwepresenttheoutlineoftheapproachandtheprivacymodel.
TheSensFlowalgorithmandtwoalternativeapproachestospacesubdivisionarediscussedinthesubsequentsection.
Thenalsectionreportingopenissuesandre-searchdirectionsconcludesthepaper.
2RelatedworkRecentworkonprivacymodelsinLBScomprisestwosetsofapproaches,focusedrespectivelyontheprotectionoflocationinformationandontheconceptofk-anonymity.
PrivacymodelsfortheprotectionoflocationinformationTheproblemistohowtoprocessthequerywithoutknowingtheexactlocationoftheuser.
Atallahatal.
[1]haveproposedthreemethodsofvaryingcomplexitytoprocessnearest-neighborqueriessuchasWhereisthenearesthospitalThesim-plestmethodisasfollows:theclientappliesageometrictranslationtotheuser'spositionandforwardstheapproximatedpositiontotheLBSprovider.
ThedatabaseProtectingLocationPrivacythroughSemantics-awareObfuscationTechniques233answersthequeryandreturnsanimpreciseanswer.
Thesecondmethoddoesnotre-sultinanyaccuracylossbutcanpotentiallyrequiremorecommunication.
Theideaistosubdividespaceinagridofcells.
Theclientqueriesthedatabasewiththetilethatcontainstheclient'slocation.
Thedatabaseanswersthequerywithallspatialobjectsthatareclosesttoatleastonepointinthequerytile.
Uponreceivingtheseobjectstheclientdetermineswhichofthemisclosesttotheactualposition.
Thethirdapproachismoreefcientanddoesnotrequireanyobfuscationoftheuser'sposition.
Theideaistodeterminewhethertheuser'spositioniscontainedinacellofaspacesubdivisiondenedasVoronoidiagramwithoutrevealingtothedatabaseanythingotherthantheYes/Noanswertothequestion.
IftheanswerisYesthentheobjectassociatedwiththecellistheoneclosesttotheuser.
Thismechanism,whichusesasecuremulti-partprotocol[4],canbeonlyappliedwheneverspaceispartitioned.
Anotherapproachforprocessingnearest-neighborqueriesisproposedbyDuck-hamandKulik[5].
InsuchapproachtheclientobfuscatespositionpbysupplyingasetPofarbitrarypositionsincludingp.
Thedatabasethenanswersthenearest-neighborquerybydeterminingtheobjectsthatareclosesttoanypointinP.
Then,inthesimplestcase,thedatabasereturnsthewholesetofobjectsleavingtheclienttochooseamongthem.
Protectionofuseridentitythroughk-anonymityAsignicantnumberofproposalsarebasedonk-anonymity.
Theconceptofk-anonymityhasbeenoriginallydenedforrelationaldatabases.
ArelationaltableTisk-anonymouswhenforeachrecordthereareatleast(k-1)otherrecordswhosevalues,overasetofelds,referredtoasquasi-identier,areequal.
Aquasi-identierconsistsofoneormoreattributeswhich,thoughnotcontaininganexplicitreferencetotheindividualsidentity,canbeeasilylinkedwithexternaldatasourcesandinthiswayrevealswhotheindividualis.
K-anonymitycanbeachievedbygen-eralization,thatisreplacingaquasi-identierattributevaluewithalessspecicbutsemanticallyconsistentvalue[13].
Theconceptsofk-anonymityaretransposedintheLBScontextasfollows.
Thelocationattributeistreatedasaquasi-identier.
Hence,arequestislocationk-anonymousiftheuser'slocationisundistinguishableformthelocationofotherk-1individuals.
Finallyageneralizedlocationisaregioncontainingthepositionofkindividuals.
Locationgeneralizationtechniquesgener-ateobfuscatedlocationsindependentofthequerytype.
ThersttechniquehasbeenproposedbyGruteser.
Theideabehindthisschemeistorecursivelysubdividespaceinquadrantsofaquadtree[6].
Thequadtreeisthentraversedtopdown,thusfromthelargestquadrantcoveringthewholespace,untilthesmallestquadrantisfoundwhichincludestherequesterandotherk1users.
Suchanalquadrantconstitutesthegeneralizedlocation.
AnothertechniquebasedonquadtreeshasbeenproposedinthecontextoftheCaspersystem[10].
Ahashtableallowsonetodirectlylocatetheuser.
Suchtablecontainsthepointertothelowest-levelcellinthequadtree-baseddatastructurein234M.
L.
Damianietal.
whicheachuserislocatedandhisprivacyprole.
Aprivacyproleisdenedbythepair(k,AMin)wherekmeansthattheuserwishestobek-anonymous,andAMinistheminimumacceptableresolutionofthegeneralizedlocation.
Thelocationgener-alizationalgorithmworksbottom-up:ifacellorcombinationoftwoadjacentcellsdoesnotsatisfyprivacypreferences,thenthealgorithmisrecursivelyexecutedwiththeparentcelluntilavalidcellisreturned.
Kelnisetal.
in[8]observethatlocationk-anonymityalgorithmsmaycompromiselocationprivacyifanattackerknowsthegeneralizationalgorithm,thevalueofkandthepositionofallusers.
Specically,thishappenswhenageneralizedlocationcanunivocallyassociatedwithauser.
Toaddressthisproblem,Kelnisetal.
presentanewalgorithmbasedontheuseofalinearorderingoflocations.
Recentworkonrelationaldataprivacyhaspointedoutthatk-anonymitydoesnotensureasufcientprotectionagainstanumberofprivacyattacks.
Forexamplek-anonymitycangenerategroupsofrecordsthatleakinformationduetothelackofdiversityinthesensitiveattribute.
Suchaninformationleakiscalledhomogeneityattack.
Againstthisattack,apossiblecounter-measureisl-diversity.
Themainideabehindl-diversityistherequirementthatthevaluesofthesensitiveattributesmustbewellrepresentedineachgroup[9].
Initssimplerform,l-diversitymeansthateachgroupshouldhaveatleastldistinctvalues.
Anothercriticismagainstk-anonymityisthatitdoesnottakeintoaccountper-sonalanonymityrequirementsontheacceptablevaluesofsensitiveattributes.
Toaddressthisrequirement,XianandTao[14]introducestheconceptofpersonalizedanonymity.
Themainideaistoorganizethevaluesofthesensitiveattributeinataxonomyandthenleteachuserspecifythroughaguardingnodethemostspecicvalueoftheattributethattheuserwantstodisclose.
Interestingly,thisapproachattemptstoprotecttheassociationbetweenauserandthemeaningofthesensi-tiveattribute,whichisclosetowhatwepropose.
TheapproachofXianandTao,however,onlyworksforcategoricalattributes.
3OutlineoftheapproachThebasicideaistocollectusers'preferencesaboutsensitiveplacesandthedesireddegreeoflocationprivacyinprivacyprolesandthencarryouttheprocessofloca-tionobfuscationintwosteps.
Suchaprocessisdescribedbelow.
Consideraprivacyprolev.
(1)Therststepistoobfuscatethesensitiveplacesspeciedinvbasedontheuser'sdesireddegreeofprivacy.
Thisoperation,thatwecallobfuscatedspacegenera-tion,resultsinthegenerationofasetofcoarselocationshidingtheactualextentofsensitiveplacesincompliancewithuserpreferences.
WecanabstractlythinkofobfuscatedspacegenerationasthefunctionObf:Obf(v)=sProtectingLocationPrivacythroughSemantics-awareObfuscationTechniques235whichmapsprolevontothesetsofregionsenclosingsensitiveplaces.
(2)Thesecondstepiscarriedoutuponauser'sLBSrequest.
Considerauserwithprivacyprolevinpositionp.
Theoperationthatwecallobfuscationenforce-mentcanbeabstractlyrepresentedbythefunctionOe:Oe(p,v)=qmappingpositionpandprolevontoalocationqwhereq∈Obf(v)ifpiscontainedinqandq=potherwise.
Asaresult,whenthelocationisobfuscated,anadversarycannotinferwithcertaintythattheuserisinsideasensitive(fortheuser)place.
Atmostonecaninferthatthepositionmaybeinasensitiveplace.
AnaiveimplementationofthefunctionObfistodene,foreachsensitiveplace,aregioncontainingtheplaceofinterest.
Thissolutionhashoweverimportantdraw-back:rstifthesensitiveplacehasalargeextent,theobfuscatedlocationmayresulttoobroadandthuscompromisethequalityofservice.
Bycontrast,iftheobfuscatedlocationisnotlargeenoughtheprobabilityofbeinglocatedinsideasensitiveplacemaybeveryhighandthusobfuscationisineffective.
Toovercomethesedrawbackswesubdividesensitiveregionsincells.
Eachcellhasasensitivitywhichdependsontheuserpreferencesintheprivacyprole.
Eachcellisthusobfuscatedsepa-ratelythroughanobfuscationalgorithm.
Torepresentuserpreferences,wedeneaprivacymodel,calledobfuscationmodel,centeredonthefollowingconcepts.
Propertiesofplaces.
Placesasclassiedintotypes.
Usersspecifyintheirprivacyproleswhichtypesofplacesaresensitive,non-sensitiveorunreachable.
Aplaceissensitivewhentheuserdoesnotwanttorevealtobeinit;aplaceisunreachablewhentheusercannotbelocatedinit;aplaceisnon-sensitiveotherwise.
Thelevelofsensitivityquantiesthedegreeofsensitivityofaregionforauser.
Forexamplearegionentirelyoccupiedbyahospitalhasahighlevelofsensitiv-ity,ifhospitalissensitivefortheuser.
Weemphasizethatthelevelofsensitivitydependsontheextentandnatureoftheobjectslocatedintheregionaswellastheprivacyconcernsoftheuser.
Anobfuscatedspaceisasetofobfuscatedlocationsassociatedwithaprivacyprole.
Specically,thelocationsofanobfuscatedspacehavealevelofsensi-tivitylessorequalthanasensitivitythresholdvalue.
Thesensitivitythresholdvalueisthemaximumacceptablesensitivityofalocationfortheuser.
Sincethethresholdvalueisuser-dependent,itsvalueisspeciedintheprivacyprole.
4TheobfuscationmodelWerstintroducethebasicnomenclatureusedintherestofthepaper.
Apositionisapointinatwo-dimensionalspaceS;regionisapolygon;locationbroadlydenotesaportionofspacecontainingtheuser'sposition.
Placesarerepresentedassimplefeatures.
Afeaturehasanuniquename,sayMilano,andauniquefeaturetype,sayCity.
Furthermore,afeaturehasaspatialextentofgeometrictype[12]that,without236M.
L.
Damianietal.
signicantlossofgenerality,consistsofaregion.
Featuresextentsarespatiallydis-joint.
Considerthecaseoftwooverlappingplaces,forexamplearestaurantwithinapark:theextentoftheparkfeaturemustbedenedinsuchawaythatitdoesnotcontaintheextentoftherestaurantfeature.
AnadvantageofourapproachisthatspatialfeaturescanbestoredincommercialspatialDBMSsandeasilydisplayedasmaps.
WedenotewithFTandFrespectivelythesetoffeaturestypesandthesetofcorrespondingfeatures.
Hereinafterwerefertothepair(FT,F)asthegeographicaldatabaseoftheapplication.
SensitiveandunreachablefeaturetypesInaprivacyproleauserspeciesthefeaturetypeswhichareconsideredsensitiveandunreachable.
Afeaturetypeissensitivewhenitdenotesasetofsensitiveplaces.
ForexampleifReligiousBuildingisasensitivefeaturetype,thenDuomodiMilano,aninstanceofReligiousBuilding,isasensitivefeature.
Insteadafeaturestypeisnon-reachablewhenitdenotesasetofplaceswhichforvariousreasons,suchasphysicalimpediment,cannotbeaccessedbytheuser.
Forexample,thefeaturetypeMilitaryZonemaybenon-reachableiftheuserisacommoncitizen.
Afeaturetypewhichisneithersensitiveorunreachableisnon-sensitive.
Inprinciple,ausercandenemultipleprivacyproles.
QuantifyingthelevelofsensitivityofaregionWeintroducersttheconceptofsensitivityscore(simplyscore).
Thescoreofafeaturetypeftisavaluewhichisassignedtofttospecify"howmuchsensitive"ftisfortheuser.
Forexamplethescoreoftherestaurantfeaturetypeistypicallylowerthanthescoreofhospitalbecauseanindividualisusuallymoreconcernedwithprivacyofmedicalinformationthanwithinformationabouthis/herpreferredrestaurants.
Formally,thescoreoffeaturetypeftisdenedbythefunctionScore(ft)rangingbetween0and1:value0meansthatthefeaturetypeisnotsensitiveorunreachablewhileavalue1meansthatthefeaturetypehasthehighestsensitivity.
Theconceptofscorecapturesthesubjectiveperceptionofthedegreeofsensitivity.
Thescoreofeachsensitivefeaturetypeisthusspecieddirectlyintheprivacyprole.
Thescorefunctionisusedforcomputingthesensitivitylevelofaregion.
Thesensitivitylevel(SL)ofaregionr,writtenasSLReg(r),quantieshowmuchsensitiverisfortheuser.
Inparticular,SLisdenedassumoftheratiosofweightedsensitiveareatotherelevantareaintheregion.
Theweightedsensitiveareaisthesurfaceinroccupiedbysensitivefeaturesweightedwithrespecttothesensitiv-ityscoreofeachfeaturetype.
Therelevantareaofristheportionofregionnotoccupiedbyunreachablefeatures.
ToformallydeneSL,weintroducethefollowingnotation:EisthesetofregionsinthereferencespaceProtectingLocationPrivacythroughSemantics-awareObfuscationTechniques237(FT,F)isthegeographicaldatabase,namelythesetoffeaturestypesandfea-turesFTSensFTisthesetofsensitivefeaturetypesandFTNreachFTisthesetofnon-reachablefeatures,withFTNreachFTSens=/0Thefunctions:AreaGeo(r)andAreaFea(r,ft)compute,respectively,thewholeareaofrandtheareaofrcoveredbyfeaturesoftypeft.
Inthelattercase,onlytheportionsoffeatureswhicharecontainedinrareconsidered.
Denition1(Sensitivitylevelofaregion).
Thesensitivitylevelofaregionisde-nedbythefunction:SLReg:E→[0,1]suchthat,givenaregionr:SLReg(r)=ft∈FTSensScore(ft)AreaFea(r,ft)AreaRel(r)whereAreaRel(r)=AreaGeo(r)ft∈FTNreachAreaFea(r,ft).
Ifronlycontainsnon-reachablefeatures,wedeneSLreg(r)=0.
Example1.
Consideraspaceconsistingoffourregionsc0,c1,c2,c3;thesetofsen-sitivefeaturetypesisFTsens={ft0,ft1,ft3}andthesetofnon-reachablefeaturetypesisFTNreach={ft2}.
Table1reports,foreachfeaturetypeftiandregioncj,theareaoccupiedbyftiincj,withi,jrangingover{0,1,2,3}.
Inaddition,therowNSreportsthenon-sensitiveareaineachregion.
Forexample,regionc2includessensitivefeatures(orportion)oftypeft0andoftypeft3bothcoveringanareaof100units;non-reachablefeatures(orportion)oftypeft2coveringanareaof1000units;andanon-sensitiveareaof100units.
TherowTotrelevantreportstherelevantareaineachregion,thatistheareanotcoveredbyunreachablefeatures.
Forexam-pletherelevantareainregionc2hasanextentof300units.
Thelastcolumnontherightreportsthesensitivityscoreassignedtoeachfeaturetype.
Area(c,ft)c0c1c2c3Score(ft)ft0200010000.
5ft1100001000.
7ft23005010004000ft301001001000.
9NS001000-Totrelevant300100300200-SLreg0.
570.
90.
470.
8-Table1AreaandsensitivityscoresoffeaturetypesThesensitivitylevelforregionsc0andc1is:-SLreg(c0)=0.
5·200300+0.
7·100300=0.
57-SLreg(c1)=0.
9·100100=0.
9.
Itresultsthatregionc1ismoresensitivethanc0.
Themotivationisthatuserslocatedinregionc1arecertainlylocatedintheextentofafeatureoftypeft3,whichhasahighsensitivityscore.
238M.
L.
Damianietal.
ObfuscatedspaceFinallyweintroducetheconceptofobfuscatedspace.
Anobfuscatedspaceisaspacepartitionconsistingofregionswhichareprivacy-preserving.
Wesaythataregionrisprivacy-preservingwhenthelevelofsensitivityofr,SLReg(r)isequalorbelowathresholdvalue.
Thethresholdvalueisthemaximumacceptablesensitivityoflocationsfortheuser.
Itsvaluerangesintheinterval(0,1].
Avalueequalto1meansthattheuserdoesnotcareoflocationprivacyinanypointofspace.
Weruleoutthevalue0becauseitwouldbesatisedonlyiftherewerenosensitivelocations(againsttheinitialassumption).
Thethresholdvalueisanotherparameterspeciedintheprivacyprole.
Weformallydenethenotionofobfuscatedspaceandofprivacyproleinthedenitionbelow.
Denition2(Obfuscatedspace).
Let(FT,F)bethegeographicaldatabase.
More-overlet:-FTSensFTbeasetofsensitivefeaturetypes.
-FTNreachFTbeasetofnon-reachablefeaturetypes.
-Scorebethescorefunction.
-qsens∈(0,1)bethesensitivitythresholdvalue.
Then:(1)AnobfuscatedspaceOSisaspacepartitionsuchthat:maxc∈OSSLReg(c)≤qsens(2)TheprivacyproleassociatedwithOSisthetupleExample2.
Withreferencetoexample1,considertheprole:-FTSens={ft0,ft1,ft3}whereft0representsnightclubs,ft1religiousbuildingsandft3clinics.
-FTNreach={ft2}whereft2representsamilitaryzone-Score(ft0)=0.
5,Score(ft1)=0.
7,Score(ft2)=0,Score(ft3)=0.
9-qsens=0.
90123thanqsens.
Thus,thesetofregionsisanobfuscatedspace.
5ComputingtheobfuscatedspacesAfterpresentingtheprivacymodel,thenextstepistodenehowtocomputeanobfuscatedspace.
Ourstrategyconsistsoftwomainsteps:ProtectingLocationPrivacythroughSemantics-awareObfuscationTechniques239(reportedinTable1).
Itcanbenoticedthatsuchvalue,inallcases,islessorequal{c,c,c,c}andthesensitivitylevelofeachofthemConsiderthefourregions1.
Specicationoftheinitialpartition.
Thereferencespaceissubdividedinasetofsmallregions,referredtoascells,whichconstitutetheinitialpartitiondenotedasCin.
Thegranularityoftheinitialpartition,thatis,howsmallthecellsare,isapplication-dependent.
2.
Iterationmethod.
Thecurrentpartitionischeckedtoverifywhetherthesetofcellsisanobfuscatedspace.
Ifnot,itmeansthatatleastonecellisnotprivacypreserving.
Acellcisthusselectedamongthosecellswhicharenotprivacy-preservingandmergedwithanadjacentcelltoobtainacoarsercell.
Theresultisanewpartition.
Thisstepisiterateduntilthesolutionisfound,andthusallprivacypreferencesaresatisedorthepartitiondegeneratesintothewholespace.
Inthefollowingwedescribethesetwosteps,startingfromthelatter.
5.
1TheiterationmethodConsiderapartitionCofthereferencespace.
Giventwoadjacentcellsc1,c2∈C,themergeofthetwocellsgeneratesanewpartitionC′inwhichcellsc1andc2arereplacedbycellc=c1∪Sc2with∪Sdenotingtheoperationofspatialunion.
WesaythatpartitionC′isderivedfrompartitionC,writtenasC′C.
ConsiderthesetPCinofpartitionsderiveddirectlyorindirectlyfromtheinitialpartitionCinthroughsubsequentmergeoperations.
TheposetH=(PCin,)isaboundedlatticeinwhichtheleastelementistheinitialpartitionwhilethegreatestelementisthepartitionconsistingofauniqueelement,thatis,thewholespace(calledmaximalpartition).
Itcanbeshownthatanobfuscatedspace,ifitexists,canbegeneratedbypro-gressivelyaggregatingcellsincoarserlocationsandthusbyderivingsubsequentpartitions.
Thedemonstration,thatweomit,isarticulatedintwosteps.
FirstitisshownthattheSL(i.
e.
sensitivitylevel)ofthecellresultingfromamergeoperationislessorequalthesensitivitylevelofthestartingcells.
Thenitisshownthatthesensitivitylevelofthepartition(i.
e.
themaximumsensitivityvalueofcells)result-ingfromsubsequentmergeoperationsislessorequalthanthesensitivitylevelofthestartingpartition.
ThealgorithmThealgorithmcomputestheobfuscatedspacebyprogressivelymergingadjacentcells.
Ingeneral,forthesameprivacyprole,multipleobfuscatedspacescanbegenerated.
Weconsideroptimaltheobfuscatedspacewiththemaximumcardinality,thuspossiblyconsistingofthenest-grainedregions.
Theproblemofndingtheoptimalobfuscatedspacecanbeformulatedasfollows:GivenaninitialpartitionCin,determine,ifitexists,thesequenceofmergeoper-ationssuchthattheresultingpartitionCistheobfuscatedspacewiththemaximumnumberofcells240M.
L.
Damianietal.
Inthispaper,wepresentanalgorithmwhichcomputesanapproximatedsolutiontotheproblem.
Theideaistoprogressivelyexpandeachcellwhichisnotprivacypreservinguntilaterminatingconditionismet.
Thisapproachraisesanumberofis-sues.
Therstissueishowtochoosethecellstobemerged.
Weadoptthefollowingheuristic:weselecttheadjacentcellwhichdeterminesthemostsensiblereductionofsensitivityoftheaggregatedcell.
Asecondissueconcernsthecriteriafortheex-pansionofcells.
Toaddresssuchissues,wehaveidentiedtwobasicstrategies:therststrategyistoexpandoneover-sensitivecell(i.
e.
anon-privacy-preservingcell)atatime,untilthelevelofsensitivityisbelowthethreshold;thesecondstrategyistoexpand"inparallel"allcellswhichareover-sensitive.
Thesecondstrategyistheonewhichhasbeenadoptedbecauseitallowsonetobettercontrolthesizeoftheaggregatedcells.
InsightsontheSensFlowalgorithmWerepresentaspacepartitionthroughaRegionAdjacencyGraph(RAG)[11].
IngeneralaRAGisdenedfromapartitionbyassociatingonevertexwitheachcellandbycreatinganedgebetweentwoverticesiftheassociatedcellsshareacommonboundary.
Withinthisframework,theedgeinformationisinterpretedaspossibilityofmergingthetwocellsidentiedbytheverticesincidenttotheedge.
Suchamergeoperationimpliestocollapsethetwoverticesincidenttotheedgeintoonevertexandtoremovethisedgetogetherwithanydoubleedgebetweenthenewlycreatedvertexandtheremainingvertices[3].
Theinputparametersofthealgorithmare:1)theinitialRAGbuiltontheini-tialpartition;2)theprivacyprole.
Thealgorithmreturnsanobfuscatedspaceifitexists,anerrorotherwise.
StartingfromtheRAGcorrespondingtotheinitialpar-tition,thealgorithmshrinksthegraphbymergingadjacentcellsuntilallprivacyconstraintsaresatisedorasolutioncannotbefound.
Ateachiteration,thealgo-rithmlooksfornon-privacypreservingcells;theneachofsuchcellsismergedwithatmostoneadjacentcell.
Amongthecellsintheneighborhood,mergingisexe-cutedwiththecellwhichdeterminesthemostsignicantreductioninthesensitivityoftheresultingaggregatedregion.
Afterthemerge,thealgorithmproceedstoscantheremainingcells,andthewholeloopisrepeateduntilnocellismodied.
Thecomplexityofthealgorithm,evaluatedwithrespecttothetwokeyoperations,thatis(a)mergeoperations,(b)numberofedgesanalyzed,isO(n2).
5.
2ThespecicationoftheinitialpartitionTheabovealgorithmisappliedtoaninitialspacepartitionwhichisthenmappedontoagraph.
Nowakeydesignissueistodenehowtobuildtheinitialparti-tionandhowtospecifysensitiveandunreachablecellsinsuchapartition.
Inotherwords,givenamapofspace,whatkindofpartitioncanbegeneratedAndhowProtectingLocationPrivacythroughSemantics-awareObfuscationTechniques241canthesensitivityleveloftheinitialpartitionbecomputedWehaveinvestigatedtwoapproaches:a)Tosubdividespaceintoaregulargridofcells.
Cellshavethusequalshapesandsizes.
b)Tosubdividespaceintoasetofirregulartilesbasedonanaturalsubdivisionofterritory.
Eachtilerepresentsarealworldentity,forexampleacensusblock.
Fig.
2SensitivecellsintheinitialpartitionWenowdiscusstheexperimentscarriedoutusingthesetwoapproaches.
TheadoptedsoftwareplatformconsistsofaJavaimplementationoftheSensFlowal-gorithm,thesystemIntergraphGeomediaforthevisualizationofspatialdataandOracleSpatialfortheconstructionoftheRAG.
Wepresentrsttheexperimentwiththeirregulartessellationofspace.
Seeminglytheadvantageoftheirregulartessellationagainstgridisthattilesmayrepresentphysicalentities.
Therefore,sincesensitiveplaces,suchclinicsorreligiousplaces,havewell-knownboundaries,theylikelycorrespondtotilesandthuscanbemoreeasilyidentied.
Creatingaspacetessellationatveryhighresolutionis,however,extremelycostly.
Amorepracticalsolutionistousepubliclyavailabledatasets,albeitatlowerresolution.
AtypicaldatasetrepresentingaspacepartitionistheUSCensusdata.
WehavethusrunthealgorithmonaninitialpartitionobtainedfromUSCensusBlockdataset.
Thedatasetconsistsof15000polygonsrepresentingCensusBlockGroups,thatis,aggregationofcensusblocks.
Eachpolygonisacellofthepartition.
Weassume:Auniquefeaturetypeftwithscore=1thusatthehighestsensitivity.
Thedensitysofsensitivecellsisaparameteroftheexperiment.
Forexamples=0.
05meansthat5%ofcellscontainsensitivefeatures.
Thepercentageofareawhichissensitiveinacellisassignedrandomly.
Figure2showsaportionoftheinitialpartitionwiths=0.
05:theblackcellsaresensitive,whereasthewhitecellsarenon-sensitive.
242M.
L.
Damianietal.
(a)qsens=0.
3(b)qsens=0.
1Fig.
3VisualrepresentationoftwoobfuscatedspacesrelativetoareainFigure2(s=0.
05)TheSensFlowalgorithmhasbeenrunusingdifferentvaluesofthesensitivitythreshold.
TheexperimentalresultsareshowninthemapsinFigure3.
Thegener-alizedregionsarerepresentedbypolygonsofdifferentcolor,basedonthenumberofaggregations:thecolorisdarkerforthemoreaggregatedregions;whitespacedenotestheoriginalspace.
Wecanobservethatthegranularityoftheobfuscatedspaceiscoarserforlowervaluesofthesensitivitythreshold.
Themainlimitationofthisapproachisthatthepubliclyavailabledatasetisnotsufcientlyprecise.
Cellsaregenerallytoobroad,especiallyinruralareasandthatcompromisesthequalityofservice.
Wehavethusevaluatedthegrid-basedapproachtospacesubdivision.
Spaceissubdividedintoagridofregularcells.
Featuresdonothaveanyphysicalcorrespon-dencewithcells.
Featuresarethuscontainedinacelloroverlapmultiplecells.
Thesensitiveareainthecellresultsfromthespatialintersectionofthefeatureextentwiththecell.
Wehaverunthealgorithmoveragridof100squaredcells,assumingagainauniquefeaturetypewithmaximumscore.
qsens=0.
5qsens=0.
4qsens=0.
3Fig.
4Visualrepresentationofthecellaggregationfordifferentvaluesofthesensitivitythresholdqsens.
MergedcellsareindicatedusingboththesamenumberandthesamecolorFigure4showstheobfuscatedspacesgeneratedfordifferentvaluesofthesen-sitivitythreshold.
Theresultisvisualizedasfollows:adjacentcellswhichhavenotbeenmergedareassigneddifferentgraytones;mergedcellshaveanidenticalgrayProtectingLocationPrivacythroughSemantics-awareObfuscationTechniques243toneandarelabeledbythesamenumber.
Wecanobservehowthegranularityofobfuscatedlocations(i.
e.
asetofcellswithidenticallabel)changesfordifferentvaluesofqsens.
Fromtheexperimentsitturnsoutthatthegrid-basedapproachismoreexiblebecausethegranularityofpartitioncanbedenedbasedonapplica-tionneeds.
Ontheotherhand,thewholeprocessofdiscretizationoffeaturesincellsismuchmorecomplex.
6OpenissuesandconclusionsInthispaperwehavepresentedacomprehensiveframeworkfortheprotectionofprivacyofsensitivelocations.
Becauseofthenoveltyoftheapproachanumberofimportantissuesarestillopen,pertainingvariousaspectsconcerning:theprivacymodel,thecomputationalcomplexityandthesystemarchitecturerespectively.
Asconcernstheprivacymodel,onecouldobservethatthesensitivityofaplacemayvarydependingonthecontext,suchastime.
Indeedinourapproachtheuserisallowedtospecifymultipleprolesandthus,ideally,onecouldselecttheprivacyprolebasedonthecontextualconditions.
Unfortunatelythissolutionmayresultintoanexcessiveburdenfortheuser.
Somemechanismforacontext-drivenselec-tionofprivacyproleswouldthusbedesirable.
Anotherobservationisthatourprivacymodelrequiresdetailedknowledgeoftheextentsofsensitiveplaces,whilesuchaknowledgeisdifcultandcostlytoacquire.
WebelievethatinthenextfewyearshighqualityspatialdatawillbecomeincreasinglyavailableunderthepushofthegrowingLBSmarketandthusthedevelopmentofobfuscationservicesbyLBSprovidersorthirdpartieswillbecomeaffordable.
Ourprivacymodelcanbeimprovedinseveralways.
First,weobservethatthenotionofthresholdvaluemaybenotsointuitivefortheuser.
Asaconsequence,thespecicationoftheprivacyprolemaybecomplex.
Second,inourmodelweassumethatmobileusershaveequalprobabilityofbeinglocatedinanypointoutsideanunreachablearea,whilethatcontrastswiththeevidencethatsomeareasaremorefrequentedthanothersandthusanindividualismorelikelyinthoseplacesthaninothers.
Theinvestigationofaprobabilisticmodelisamajoreffortofthefutureactivity.
Adistinctclassofissuesareaboutthecomputationalcostofobfuscatedmapgeneration.
Thepresentalgorithmhasaquadraticcomplexity.
Foraneffectivede-ploymentofthesystem,amoreefcientalgorithmisneeded.
Arelatedaspectisthedevelopmentofasuitableplatformfortheexperimentalevaluationofthealgorithmsincludingageneratorofinitialpartitions.
Anothermajorclassofissuesconcernsthespecicationofadistributedsystemarchitecture.
Weenvisagetwomainarchitec-turalsolutions.
ThestraightforwardapproachistouseatrustedObfuscationServerasanintermediarybetweentheclientandtheLBSprovider.
TheTOScreatestheob-fuscatedspacesandstoresthemalongwiththeassociatedprivacyproleinalocalrepository.
Atruntime,theuser'srequestisforwardedtotheObfuscationServerwhichappliestheobfuscationenforcement.
Thisschemehasamaindrawbackinthatitrequiresadedicatedandtrustedserver.
Thismayresultintoabottleneck;244M.
L.
Damianietal.
furtherthetrustworthinessoftheserveriscostlytoensure.
Toovercomethislimi-tation,analternativeapproachistobasethearchitectureonthefollowingidea.
TheObfuscatorServerisstillusedbutexclusivelytogenerateobfuscatedmapsuponuser'srequests.
Oncegenerated,themapisthentransferredbacktotherequestingclientwhichstoresitlocally.
Finally,theobfuscationenforcementisthencarriedoutontheclient.
Becauseofthestoragelimitationsofmobiledevices,thegener-atedmapshouldbenotonlygeneratedinanacceptabletimefortheuserbutalsohaveareasonablesize.
AcknowledgementsThisworkhasbeenpartiallyfundedbytheEuropeanCommissionprojectIST-6FP-014915"GeoPKDD:GeographicPrivacy-awareKnowledgeDiscoveryandDelivery(GeoPKDD)"(website:http://www.
geopkdd.
eu),andbytheUSNationalScienceFoundationgrant0712846"IPS:SecurityServicesforHealthcareApplications".
References1.
M.
AtallahandK.
Frikken.
Privacy-preservinglocation-dependentqueryprocessing.
InACS/IEEEIntl.
Conf.
onPervasiveServices(ICPS),2004.
2.
A.
R.
BeresfordandF.
Stajano.
Locationprivacyinpervasivecomputing.
IEEEPervasiveComputing,2(1):46–55,2003.
3.
L.
BrunandW.
Kropatsch.
Containsandinsiderelationshipswithincombinatorialpyramids.
PatternRecognition,39(4),2006.
4.
W.
DuandM.
J.
Atallah.
Securemulti-partycomputationproblemsandtheirapplications:areviewandopenproblems.
InNSPW'01:Proceedingsofthe2001workshoponNewsecurityparadigms,pages13–22,NewYork,NY,USA,2001.
ACM.
5.
M.
DuckhamandL.
Kulik.
Aformalmodelofobfuscationandnegotiationforlocationpri-vacy.
InPervasiveComputing,volume3468ofLectureNotesinComputerScienceLNCS,pages152–170.
SpringerBerlin/Heidelberg,2005.
6.
M.
GruteserandD.
Grunwald.
Anonymoususageoflocation-basedservicesthroughspatialandtemporalcloaking.
InMobiSys'03:Proceedingsofthe1stinternationalconferenceonMobilesystems,applicationsandservices,pages31–42,NewYork,NY,USA,2003.
ACMPress.
7.
In-Stat.
http://www.
instat.
com/press.
aspid=2140&sku=in0703846wt.
Publicationdate:5November2007.
8.
P.
Kalnis,G.
Ghinita,K.
Mouratidis,andD.
Papadias.
Preventinglocation-basedidentityinfer-enceinanonymousspatialqueries.
IEEETransactionsonKnowledgeandDataEngineering,19(12):1719–1733,2007.
9.
A.
Machanavajjhala,J.
Gehrke,D.
Kifer,andM.
Venkitasubramaniam.
l-diversity:Privacybeyondk-anonymity.
In22ndIEEEInternationalConferenceonDataEngineering,2006.
10.
M.
F.
Mokbel,C.
-Y.
Chow,andW.
G.
Aref.
Thenewcasper:queryprocessingforlocationserviceswithoutcompromisingprivacy.
InVLDB'2006:Proceedingsofthe32ndinternationalconferenceonVerylargedatabases,pages763–774.
VLDBEndowment,2006.
11.
M.
Molenaar.
AnIntroductiontotheTheoryofSpatialObjectModellingforGIS.
CRCPress,1998.
12.
OpenGISConsortium.
OpenGISsimplefeaturesspecicationforSQL,1999.
Revision1.
1.
13.
L.
Sweeney.
Achievingk-anonymityprivacyprotectionusinggeneralizationandsuppression.
Int.
J.
Uncertain.
FuzzinessKnowl.
-BasedSyst.
,10(5):571–588,2002.
14.
X.
XiaoandY.
Tao.
Personalizedprivacypreservation.
InSIGMOD'06:Proceedingsofthe2006ACMSIGMODinternationalconferenceonManagementofdata,pages229–240,NewYork,NY,USA,2006.
ACM.
ProtectingLocationPrivacythroughSemantics-awareObfuscationTechniques245

牦牛云(3.5USD/月 )阿里云国际版云服务器 1核1G40G

收到好多消息,让我聊一下阿里云国际版本,作为一个阿里云死忠粉,之前用的服务器都是阿里云国内版的VPS主机,对于现在火热的阿里云国际版,这段时间了解了下,觉得还是有很多部分可以聊的,毕竟,实名制的服务器规则导致国际版无需实名这一特点被无限放大。以前也写过几篇综合性的阿里云国际版vps的分析,其中有一点得到很多人的认同,那句是阿里云不管国内版还是国际版的IO读写速度实在不敢恭维,相对意义上的,如果在这...

柚子互联(34元),湖北十堰高防, 香港 1核1G 5M

柚子互联官网商家介绍柚子互联(www.19vps.cn)本次给大家带来了盛夏促销活动,本次推出的活动是湖北十堰高防产品,这次老板也人狠话不多丢了一个6.5折优惠券而且还是续费同价,稳撸。喜欢的朋友可以看看下面的活动详情介绍,自从站长这么久以来柚子互联从19年开始算是老商家了。六五折优惠码:6kfUGl07活动截止时间:2021年9月30日客服QQ:207781983本次仅推荐部分套餐,更多套餐可进...

HostYun(22元/月)全场88折优惠香港原生IP大带宽

在之前的一些文章中有提到HostYun商家的信息,这个商家源头是比较老的,这两年有更换新的品牌域名。在陆续的有新增机房,价格上还是走的低价格路线,所以平时的折扣力度已经是比较低的。在前面我也有介绍到提供九折优惠,这个品牌商家就是走的低价量大为主。中秋节即将到,商家也有推出稍微更低的88折。全场88折优惠码:moon88这里,整理部分HostYun商家的套餐。所有的价格目前都是原价,我们需要用折扣码...

spaceos为你推荐
neworiental我国最好的英语学校是在哪里?商标注册流程及费用商标注册流程及费用?access数据库什么是ACCESS数据库比肩工场比肩接踵的意思rawtoolsRAW是什么衣服牌子丑福晋大福晋比正福晋大么同一ip网站如何用不同的IP同时登陆一个网站lcoc.toptop weenie 是什么?kb123.net股市里的STAQ、NET市场是什么?本冈一郎本冈一郎有副作用吗?主要有什么呢?
深圳域名注册 北京主机租用 个人域名备案流程 花生壳免费域名 香港bgp机房 paypal认证 42u标准机柜尺寸 新世界电讯 彩虹ip 本网站服务器在美国 免费个人空间申请 web服务器的架设 hkg hdd 西安主机 中国linux 如何登陆阿里云邮箱 服务器硬件配置 windowsserver2012 alexa搜 更多