Repository logo

Infoscience

  • English
  • French
Log In
Logo EPFL, École polytechnique fédérale de Lausanne

Infoscience

  • English
  • French
Log In
  1. Home
  2. Academic and Research Output
  3. Conferences, Workshops, Symposiums, and Seminars
  4. Protecting Location Privacy: Optimal Strategy against Localization Attacks
 
conference paper

Protecting Location Privacy: Optimal Strategy against Localization Attacks

Shokri, Reza  
•
Theodorakopoulos, Georgios
•
Troncoso, Carmela
Show more
2012
CCS '12: Proceedings of the 2012 ACM conference on Computer and communications security
19th ACM Conference on Computer and Communications Security

The mainstream approach to protecting the location-privacy of mobile users in location-based services (LBSs) is to alter the users' actual locations in order to reduce the location information exposed to the service provider. The location obfuscation algorithm behind an effective location-privacy preserving mechanism (LPPM) must consider three fundamental elements: the privacy requirements of the users, the adversary's knowledge and capabilities, and the maximal tolerated service quality degradation stemming from the obfuscation of true locations. We propose the first methodology, to the best of our knowledge, that enables a designer to find the optimal LPPM for a LBS given each user's service quality constraints against an adversary implementing the optimal inference algorithm. Such LPPM is the one that maximizes the expected distortion (error) that the optimal adversary incurs in reconstructing the actual location of a user, while fulfilling the user's service-quality requirement. We formalize the mutual optimization of user-adversary objectives (location privacy vs. correctness of localization) by using the framework of Stackelberg Bayesian games. In such setting, we develop two linear programs that output the best LPPM strategy and its corresponding optimal inference attack. Our optimal user-centric LPPM can be easily integrated in the users' mobile devices they use to access LBSs. We validate the efficacy of our game theoretic method against real location traces. Our evaluation confirms that the optimal LPPM strategy is superior to a straightforward obfuscation method, and that the optimal localization attack performs better compared to a Bayesian inference attack.

  • Files
  • Details
  • Metrics
Loading...
Thumbnail Image
Name

CCS12presentation_Shokri.pptx

Access type

openaccess

Size

7.51 MB

Format

Microsoft Powerpoint XML

Checksum (MD5)

de9daa3f11e7f68a95f11d20bc811d9d

Loading...
Thumbnail Image
Name

OptimalPrivacyStrategies.zip

Access type

openaccess

Size

2.08 KB

Format

ZIP

Checksum (MD5)

dddcfc7b61372b745d214aea9bf92695

Logo EPFL, École polytechnique fédérale de Lausanne
  • Contact
  • infoscience@epfl.ch

  • Follow us on Facebook
  • Follow us on Instagram
  • Follow us on LinkedIn
  • Follow us on X
  • Follow us on Youtube
AccessibilityLegal noticePrivacy policyCookie settingsEnd User AgreementGet helpFeedback

Infoscience is a service managed and provided by the Library and IT Services of EPFL. © EPFL, tous droits réservés