Repository logo

Infoscience

  • English
  • French
Log In
Logo EPFL, École polytechnique fédérale de Lausanne

Infoscience

  • English
  • French
Log In
  1. Home
  2. Academic and Research Output
  3. Conferences, Workshops, Symposiums, and Seminars
  4. Quantifying Location Privacy: The Case of Sporadic Location Exposure
 
conference paper

Quantifying Location Privacy: The Case of Sporadic Location Exposure

Shokri, Reza  
•
Theodorakopoulos, Georgios
•
Danezis, George
Show more
2011
The 11th Privacy Enhancing Technologies Symposium (PETS)
The 11th Privacy Enhancing Technologies Symposium (PETS)

Mobile users expose their location to potentially untrusted entities by using location-based services. Based on the frequency of location exposure in these applications, we divide them into two main types: Continuous and Sporadic. These two location exposure types lead to different threats. For example, in the continuous case, the adversary can track users over time and space, whereas in the sporadic case, his focus is more on localizing users at certain points in time. We propose a systematic way to quantify users' location privacy by modeling both the location-based applications and the location-privacy preserving mechanisms (LPPMs), and by considering a well-defined adversary model. This framework enables us to customize the LPPMs to the employed location-based application, in order to provide higher location privacy for the users. In this paper, we formalize localization attacks for the case of sporadic location exposure, using Bayesian inference for Hidden Markov Processes. We also quantify user location privacy with respect to the adversaries with two different forms of background knowledge: Those who only know the geographical distribution of users over the considered regions, and those who also know how users move between the regions (i.e., their mobility pattern). Using the Location-Privacy Meter tool, we examine the effectiveness of the following techniques in increasing the expected error of the adversary in the localization attack: Location obfuscation and fake location injection mechanisms for anonymous traces.

  • Files
  • Details
  • Metrics
Loading...
Thumbnail Image
Name

ShokriTDHL_PETS11.pdf

Type

Publisher's Version

Version

http://purl.org/coar/version/c_970fb48d4fbd8a85

Access type

openaccess

Size

312.14 KB

Format

Adobe PDF

Checksum (MD5)

87efd04ab0ebb7c4465e4e7a9392a1b6

Loading...
Thumbnail Image
Name

ShokriPETS11.pptx

Access type

openaccess

Size

1.87 MB

Format

Microsoft Powerpoint XML

Checksum (MD5)

fc1153fd884cd96dfed988d66eb46735

Logo EPFL, École polytechnique fédérale de Lausanne
  • Contact
  • infoscience@epfl.ch

  • Follow us on Facebook
  • Follow us on Instagram
  • Follow us on LinkedIn
  • Follow us on X
  • Follow us on Youtube
AccessibilityLegal noticePrivacy policyCookie settingsEnd User AgreementGet helpFeedback

Infoscience is a service managed and provided by the Library and IT Services of EPFL. © EPFL, tous droits réservés