Abstract
By effectively reaching out to and engaging larger population of mobile users, mobile crowd-sourcing has become a strategy to perform large amount of urban tasks. The recent empirical studies have shown that compared to the pull-based approach, which expects the users to browse through the list of tasks to perform, the push-based approach that actively recommends tasks can greatly improve the overall system performance. As the efficiency of the push-based approach is achieved by incorporating worker's mobility traces, privacy is naturally a concern. In this paper, we propose a novel, 2-stage and user-controlled obfuscation technique that provides a trade off-amenable framework that caters to multi-attribute privacy measures (considering the per-user sensitivity and global uniqueness of locations). We demonstrate the effectiveness of our approach by testing it using the real-world data collected from the well-established TA$Ker platform. More specifically, we show that one can increase its location entropy by 23% with only modest changes to the real trajectories while imposing an additional 24% (< 1 min) of detour overhead on average. Finally, we present insights derived by carefully inspecting various parameters that control the whole obfuscation process.
- O. Abul, F. Bonchi, and M. Nanni. 2008. Never Walk Alone: Uncertainty for Anonymity in Moving Objects Databases. In IEEE International Conference on Data Engineering (ICDE). Google ScholarDigital Library
- Alastair R. Beresford and Frank Stajano. 2003. Location Privacy in Pervasive Computing. Pervasive Computing (2003). Google ScholarDigital Library
- Ioannis Boutsis and Vana Kalogeraki. 2013. Privacy Preservation for Paricipatory Sensing Data. In IEEE International Conference on Pervasive Computing and Communications (PerCom).Google Scholar
- Ioannis Boutsis and Vana Kalogeraki. 2016. Location Privacy for Crowdsourcing Applications. In ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp). Google ScholarDigital Library
- Cen Chen, Shih-Fen Cheng, Aldy Gunawan, Archan Misra, Koustuv Dasgupta, and Deepthi Chander. 2014. TRACCS: Trajectory-Aware Coordinated Urban Crowd-Sourcing. In 2nd AAAI Conference on Human Computation and Crowdsourcing. 30--40.Google Scholar
- Cen Chen, Shih-Fen Cheng, Hoong Chuin Lau, and Archan Misra. 2015. Towards city-scale mobile crowdsourcing: Task recommendations under trajectory uncertainties. In Twenty-Fourth International Joint Conference on Artificial Intelligence. Google ScholarDigital Library
- Shih-Fen Cheng, Cen Chen, Thivya Kandappu, Hoong Chuin Lau, Archan Misra, Nikita Jaiman, Randy Tandriyansiyah, and Desmond Koh. 2017. Scalable urban mobile crowdsourcing: Handling uncertainty in worker movement. ACM Transactions on Intelligent Systems and Technology (2017), to appear. Google ScholarDigital Library
- C.Y Chow and M.F. Mokbel. 2011. Trajectory privacy in location-based services and data publication. ACM SIGKDD Explorations Newsletter 13, 1 (2011). Google ScholarDigital Library
- G. Cormode, C. Procopiuc, D. Srivastava, E. Shen, and T. Yu. 2012. Differentially Private Spatial Decompositions. In IEEE International Conference on Data Engineering (ICDE). Google ScholarDigital Library
- Yves-Alexandre de Montjoye, Cesar A Hidalgo, Michael Verleysen, and Vincent D Blondel. 2013. Unique in the Crowd: The privacy bounds of human mobility. Scientific Reports 1376 (2013).Google Scholar
- Cynthia Dwork. 2006. Differential Privacy. In International Colloquium on Automata, Languages and Programming. Google ScholarDigital Library
- Cynthia Dwork. 2008. Differential Pricacy: A Survey of Results. In Conference on Theory and Applications of Models of Computation. Google ScholarDigital Library
- Cynthia Dwork, Frank McSherry, Kobbi Nissim, and Adam Smith. 2008. Calibrating Noise to Sensitivity in Private Data Analysis. In Conference on Theory and Applications of Models of Computation.Google Scholar
- Srivatsava Ranjit Ganta, Shiva Kasiviswanathan, and Adam Smith. 2008. Composition Attacks and Auxiliary Information in Data Privacy. In Knowledge Discovery and Data Mining. Google ScholarDigital Library
- M. Gruteser and D. Grunwald. 2003. Anonymous Usage of Location Based Services Through Spatial and Temporal Cloaking.. In The First International Conference on Mobile Systems, Applications, and Services. Google ScholarDigital Library
- Takamasa Higuchi, Paul Martin, Supriyo Chakraborty, and Mani Srivastava. 2015. AnonyCast: Privacy Preserving Location Distribution for Anonymous Crowd Tracking Systems. In ACM International Joint Conference on Pervasive and Ubiquitous Computing. Google ScholarDigital Library
- K. L. Huang, S. S. Kanhere, and W. Hu. 2009. Towards Privacy-sensitive Particpatory Sensing.. In Pervasive Computing and Communications. Google ScholarDigital Library
- Thivya Kandappu, Nikita Jaiman, Randy Tandriyansiyah, Archan Misra, Shih-Fen Cheng, Cen Chen, Hoong Chuin Lau, Deepthi Chander, and Koustav Dasgupta. 2016. TASKer: behavioral insights via campus-based experimental mobile crowd-sourcing. In 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp). Google ScholarDigital Library
- Thivya Kandappu, Archan Misra, Shih-Fen Cheng, Nikita Jaiman, Randy Tandriyansiyah, Cen Chen, Hoong Chuin Lau, Deepthi Chander, and Koustav Dasgupta. 2016. Campus-Scale Mobile Crowd-Tasking Deployment 8 Behavioral Insights. In The 19th ACM Conference on Computer-Supported Cooperative Work and Social Computing. Google ScholarDigital Library
- Leyla Kazemi and Cyrus Shahabi. 2011. A privacy-aware framework for participatory sensing. ACM SIGKDD Explorations Newsletter 13, 1(2011), 43--51. Google ScholarDigital Library
- Azeem J. Khan, Vikash Ranjan, Trung-Tuan Luong, Rajesh Krishna Balan, and Archan Misra. 2013. Experiences with performance tradeoffs in practical, continuous indoor localization.. In IEEE WOWMOM. 1--9.Google Scholar
- Ninghui Li, Tiancheng Li, and Suresh Venkatasubramanian. 2007. t-Closeness: Privacy Beyond k-Anonymity and 1-Diversity. In International Conference on Data Engineering.Google ScholarCross Ref
- Ashwin Machanavajjhala, Johns Gehrke, Daniel Kifer, and Muthuramakrishnan Venkitasubramaniam. 2006. 1-Diversity: Privacy Beyond k-Anonymity. In International Conference on Data Engineering. Google ScholarDigital Library
- Archan Misra and Rajesh Krishna Balan. 2013. LiveLabs: Initial Reflections on Building a Large-scale Mobile Behavioral Experimentation Testbed. SIGMOBILE Mobile Computing and Communications Review 17, 4 (2013), 47--59. Google ScholarDigital Library
- M. F. Mokbel, C. Y. Chow, and W. G. Aref. 2006. The New Casper: Query Processing for Location Services without Compromising Privacy. In The First International Conference on Mobile Systems, Applications, and Services.Google Scholar
- Ben Niu, Qinghua Li, Xiaoyan Zhu, Guohong Cao, and Hui Li. 2014. Achieving k-anonymity in Privacy-Aware Location Based Services. In IEEE INFOCOM.Google Scholar
- Daniele Quercia, Ilias Leontiadis, Liam McNamara, Cecilia Mascolo, and Jon Crowcroft. 2011. SpotME If You Can: Randomized Responses for Location Obfuscation on Mobile Phones. In IEEE 31st International Conference on Distributed Computing Systems. Google ScholarDigital Library
- Pierangela Samarati and Latanya Sweeney. 1998. Generalizing Data to Provide Anonymity when Disclosing Information. In Seventeenth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems (PODS). Google ScholarDigital Library
- Kaixin Sui, Youjian Zhao, Dapeng Liu, Minghua Ma, Lei Xu, Li Zimu, and Dan Pei. 2016. Your trajectory privacy can be breached even if you walk in groups. In 2016 IEEE/ACM 24th International Symposium on Quality of Service (IWQoS).Google ScholarCross Ref
- Hien To, Ghinita Gabriel, and Cyrus Shahabi. 2015. PrivGeoCrowd: A Toolbox for Studying Private Spatial Crowdsourcing. In IEEE International Conference on Data Engineering.Google Scholar
- Hien To, Gabriel Ghinita, Liyue Fan, and Cyrus Shahabi. 2016. Differentially Private Location Protection for Worker Datasets in Spatial Crowdsourcing. IEEE Transactions on Mobile Computing (2016), 1--14. Google ScholarDigital Library
- Hien To, Gabriel Ghinita, and Cyrus Shahabi. 2014. A framework for protecting worker location privacy in spatial crowdsourcing. Very Large Data Base Endowment 7, 10 (2014), 919--930. Google ScholarDigital Library
- Leye Wang, Daqing Zhang, Dingqi Yang, Brian Lim, and Xiaojuan Ma. 2016. Differential Location Privacy for Sparse Mobile Crowdsensing. In IEEE International Conference on Data Mining.Google Scholar
- S. L. Warner. 1965. Randomized Response: A Survey Technique for Eliminating Evasive Answer Bias. J. Amer. Statist. Assoc. (1965), 63--69.Google Scholar
Index Terms
- Obfuscation At-Source: Privacy in Context-Aware Mobile Crowd-Sourcing
Recommendations
Obfuscation: The Hidden Malware
A cyberwar exists between malware writers and antimalware researchers. At this war's heart rages a weapons race that originated in the 80s with the first computer virus. Obfuscation is one of the latest strategies to camouflage the telltale signs of ...
Lightweight, Obfuscation-Resilient Detection and Family Identification of Android Malware
The number of malicious Android apps is increasing rapidly. Android malware can damage or alter other files or settings, install additional applications, and so on. To determine such behaviors, a security analyst can significantly benefit from ...
Exposing and mitigating privacy loss in crowdsourced survey platforms
CoNEXT Student Workhop '13: Proceedings of the 2013 workshop on Student workhopCrowdsourcing platforms such as Amazon Mechanical Turk and Google Consumer Surveys can profile users based on their inputs to online surveys. In this work we first demonstrate how easily user privacy can be compromised by collating information from ...
Comments