Privacy Vulnerability of Published Anonymous Mobility Traces

Mobility traces of people and vehicles have been collected and published to assist the design and evaluation of mobile networks, such as large-scale urban sensing networks. Although the published traces are often made anonymous in that the true identities of nodes are replaced by random identifiers,...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE/ACM transactions on networking 2013-06, Vol.21 (3), p.720-733
Hauptverfasser: Ma, C. Y. T., Yau, D. K. Y., Yip, N. K., Rao, N. S. V.
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 733
container_issue 3
container_start_page 720
container_title IEEE/ACM transactions on networking
container_volume 21
creator Ma, C. Y. T.
Yau, D. K. Y.
Yip, N. K.
Rao, N. S. V.
description Mobility traces of people and vehicles have been collected and published to assist the design and evaluation of mobile networks, such as large-scale urban sensing networks. Although the published traces are often made anonymous in that the true identities of nodes are replaced by random identifiers, the privacy concern remains. This is because in real life, nodes are open to observations in public spaces, or they may voluntarily or inadvertently disclose partial knowledge of their whereabouts. Thus, snapshots of nodes' location information can be learned by interested third parties, e.g., directly through chance/engineered meetings between the nodes and their observers, or indirectly through casual conversations or other information sources about people. In this paper, we investigate how an adversary, when equipped with a small amount of the snapshot information termed as side information, can infer an extended view of the whereabouts of a victim node appearing in an anonymous trace. Our results quantify the loss of victim nodes' privacy as a function of the nodal mobility, the inference strategies of adversaries, and any noise that may appear in the trace or the side information. Generally, our results indicate that the privacy concern is significant in that a relatively small amount of side information is sufficient for the adversary to infer the true identity (either uniquely or with high probability) of a victim in a set of anonymous traces. For instance, an adversary is able to identify the trace of 30%-50% of the victims when she has collected 10 pieces of side information about a victim.
doi_str_mv 10.1109/TNET.2012.2208983
format Article
fullrecord <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_osti_scitechconnect_1095747</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6256763</ieee_id><sourcerecordid>3001842401</sourcerecordid><originalsourceid>FETCH-LOGICAL-c363t-af238446f9370f191240ed73f0194f32c3d2c601b92ed9fc9f612ffb930613233</originalsourceid><addsrcrecordid>eNo9kFtLwzAUgIMoOKc_QHwp-tya5LRpA76MMS8wdQ_V19CmCcvompm0Qv-9GR0-nQPnO7cPoVuCE0Iwfyw_VmVCMaEJpbjgBZyhGcmyIqYZY-chxwxixji9RFfe7zAmgCmboaeNM7-VHKPvoe2Uq2rTmn6MrI42Q90av1VNtOhsN-7t4KN3e6qXrpLKX6MLXbVe3ZziHH09r8rla7z-fHlbLtaxBAZ9XGkKRZoyzSHHmnBCU6yaHDQmPNVAJTRUMkxqTlXDteSaEap1zQEzAhRgju6nudb3RnhpeiW30nadkr0I32d5mgfoYYIOzv4MyvdiZwfXhbsECXsBCBRFoMhESWe9d0qLgzP7yo1hjjiaFEeT4mhSnEyGnrupxyil_nkWzOYM4A_xMG1s</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1370331388</pqid></control><display><type>article</type><title>Privacy Vulnerability of Published Anonymous Mobility Traces</title><source>IEEE Electronic Library (IEL)</source><creator>Ma, C. Y. T. ; Yau, D. K. Y. ; Yip, N. K. ; Rao, N. S. V.</creator><creatorcontrib>Ma, C. Y. T. ; Yau, D. K. Y. ; Yip, N. K. ; Rao, N. S. V. ; Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)</creatorcontrib><description>Mobility traces of people and vehicles have been collected and published to assist the design and evaluation of mobile networks, such as large-scale urban sensing networks. Although the published traces are often made anonymous in that the true identities of nodes are replaced by random identifiers, the privacy concern remains. This is because in real life, nodes are open to observations in public spaces, or they may voluntarily or inadvertently disclose partial knowledge of their whereabouts. Thus, snapshots of nodes' location information can be learned by interested third parties, e.g., directly through chance/engineered meetings between the nodes and their observers, or indirectly through casual conversations or other information sources about people. In this paper, we investigate how an adversary, when equipped with a small amount of the snapshot information termed as side information, can infer an extended view of the whereabouts of a victim node appearing in an anonymous trace. Our results quantify the loss of victim nodes' privacy as a function of the nodal mobility, the inference strategies of adversaries, and any noise that may appear in the trace or the side information. Generally, our results indicate that the privacy concern is significant in that a relatively small amount of side information is sufficient for the adversary to infer the true identity (either uniquely or with high probability) of a victim in a set of anonymous traces. For instance, an adversary is able to identify the trace of 30%-50% of the victims when she has collected 10 pieces of side information about a victim.</description><identifier>ISSN: 1063-6692</identifier><identifier>EISSN: 1558-2566</identifier><identifier>DOI: 10.1109/TNET.2012.2208983</identifier><identifier>CODEN: IEANEP</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Data privacy ; Electric noise ; Entropy ; MATHEMATICS AND COMPUTING ; Maximum likelihood estimation ; Mobile communication ; Mobility traces ; networking ; Noise ; Noise measurement ; Privacy ; security and protection ; Sensors</subject><ispartof>IEEE/ACM transactions on networking, 2013-06, Vol.21 (3), p.720-733</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Jun 2013</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c363t-af238446f9370f191240ed73f0194f32c3d2c601b92ed9fc9f612ffb930613233</citedby><cites>FETCH-LOGICAL-c363t-af238446f9370f191240ed73f0194f32c3d2c601b92ed9fc9f612ffb930613233</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6256763$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>230,314,780,784,796,885,27924,27925,54758</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6256763$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc><backlink>$$Uhttps://www.osti.gov/servlets/purl/1095747$$D View this record in Osti.gov$$Hfree_for_read</backlink></links><search><creatorcontrib>Ma, C. Y. T.</creatorcontrib><creatorcontrib>Yau, D. K. Y.</creatorcontrib><creatorcontrib>Yip, N. K.</creatorcontrib><creatorcontrib>Rao, N. S. V.</creatorcontrib><creatorcontrib>Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)</creatorcontrib><title>Privacy Vulnerability of Published Anonymous Mobility Traces</title><title>IEEE/ACM transactions on networking</title><addtitle>TNET</addtitle><description>Mobility traces of people and vehicles have been collected and published to assist the design and evaluation of mobile networks, such as large-scale urban sensing networks. Although the published traces are often made anonymous in that the true identities of nodes are replaced by random identifiers, the privacy concern remains. This is because in real life, nodes are open to observations in public spaces, or they may voluntarily or inadvertently disclose partial knowledge of their whereabouts. Thus, snapshots of nodes' location information can be learned by interested third parties, e.g., directly through chance/engineered meetings between the nodes and their observers, or indirectly through casual conversations or other information sources about people. In this paper, we investigate how an adversary, when equipped with a small amount of the snapshot information termed as side information, can infer an extended view of the whereabouts of a victim node appearing in an anonymous trace. Our results quantify the loss of victim nodes' privacy as a function of the nodal mobility, the inference strategies of adversaries, and any noise that may appear in the trace or the side information. Generally, our results indicate that the privacy concern is significant in that a relatively small amount of side information is sufficient for the adversary to infer the true identity (either uniquely or with high probability) of a victim in a set of anonymous traces. For instance, an adversary is able to identify the trace of 30%-50% of the victims when she has collected 10 pieces of side information about a victim.</description><subject>Data privacy</subject><subject>Electric noise</subject><subject>Entropy</subject><subject>MATHEMATICS AND COMPUTING</subject><subject>Maximum likelihood estimation</subject><subject>Mobile communication</subject><subject>Mobility traces</subject><subject>networking</subject><subject>Noise</subject><subject>Noise measurement</subject><subject>Privacy</subject><subject>security and protection</subject><subject>Sensors</subject><issn>1063-6692</issn><issn>1558-2566</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2013</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNo9kFtLwzAUgIMoOKc_QHwp-tya5LRpA76MMS8wdQ_V19CmCcvompm0Qv-9GR0-nQPnO7cPoVuCE0Iwfyw_VmVCMaEJpbjgBZyhGcmyIqYZY-chxwxixji9RFfe7zAmgCmboaeNM7-VHKPvoe2Uq2rTmn6MrI42Q90av1VNtOhsN-7t4KN3e6qXrpLKX6MLXbVe3ZziHH09r8rla7z-fHlbLtaxBAZ9XGkKRZoyzSHHmnBCU6yaHDQmPNVAJTRUMkxqTlXDteSaEap1zQEzAhRgju6nudb3RnhpeiW30nadkr0I32d5mgfoYYIOzv4MyvdiZwfXhbsECXsBCBRFoMhESWe9d0qLgzP7yo1hjjiaFEeT4mhSnEyGnrupxyil_nkWzOYM4A_xMG1s</recordid><startdate>20130601</startdate><enddate>20130601</enddate><creator>Ma, C. Y. T.</creator><creator>Yau, D. K. Y.</creator><creator>Yip, N. K.</creator><creator>Rao, N. S. V.</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><general>IEEE/ACM</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>OIOZB</scope><scope>OTOTI</scope></search><sort><creationdate>20130601</creationdate><title>Privacy Vulnerability of Published Anonymous Mobility Traces</title><author>Ma, C. Y. T. ; Yau, D. K. Y. ; Yip, N. K. ; Rao, N. S. V.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c363t-af238446f9370f191240ed73f0194f32c3d2c601b92ed9fc9f612ffb930613233</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2013</creationdate><topic>Data privacy</topic><topic>Electric noise</topic><topic>Entropy</topic><topic>MATHEMATICS AND COMPUTING</topic><topic>Maximum likelihood estimation</topic><topic>Mobile communication</topic><topic>Mobility traces</topic><topic>networking</topic><topic>Noise</topic><topic>Noise measurement</topic><topic>Privacy</topic><topic>security and protection</topic><topic>Sensors</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Ma, C. Y. T.</creatorcontrib><creatorcontrib>Yau, D. K. Y.</creatorcontrib><creatorcontrib>Yip, N. K.</creatorcontrib><creatorcontrib>Rao, N. S. V.</creatorcontrib><creatorcontrib>Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>OSTI.GOV - Hybrid</collection><collection>OSTI.GOV</collection><jtitle>IEEE/ACM transactions on networking</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Ma, C. Y. T.</au><au>Yau, D. K. Y.</au><au>Yip, N. K.</au><au>Rao, N. S. V.</au><aucorp>Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)</aucorp><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Privacy Vulnerability of Published Anonymous Mobility Traces</atitle><jtitle>IEEE/ACM transactions on networking</jtitle><stitle>TNET</stitle><date>2013-06-01</date><risdate>2013</risdate><volume>21</volume><issue>3</issue><spage>720</spage><epage>733</epage><pages>720-733</pages><issn>1063-6692</issn><eissn>1558-2566</eissn><coden>IEANEP</coden><abstract>Mobility traces of people and vehicles have been collected and published to assist the design and evaluation of mobile networks, such as large-scale urban sensing networks. Although the published traces are often made anonymous in that the true identities of nodes are replaced by random identifiers, the privacy concern remains. This is because in real life, nodes are open to observations in public spaces, or they may voluntarily or inadvertently disclose partial knowledge of their whereabouts. Thus, snapshots of nodes' location information can be learned by interested third parties, e.g., directly through chance/engineered meetings between the nodes and their observers, or indirectly through casual conversations or other information sources about people. In this paper, we investigate how an adversary, when equipped with a small amount of the snapshot information termed as side information, can infer an extended view of the whereabouts of a victim node appearing in an anonymous trace. Our results quantify the loss of victim nodes' privacy as a function of the nodal mobility, the inference strategies of adversaries, and any noise that may appear in the trace or the side information. Generally, our results indicate that the privacy concern is significant in that a relatively small amount of side information is sufficient for the adversary to infer the true identity (either uniquely or with high probability) of a victim in a set of anonymous traces. For instance, an adversary is able to identify the trace of 30%-50% of the victims when she has collected 10 pieces of side information about a victim.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/TNET.2012.2208983</doi><tpages>14</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1063-6692
ispartof IEEE/ACM transactions on networking, 2013-06, Vol.21 (3), p.720-733
issn 1063-6692
1558-2566
language eng
recordid cdi_osti_scitechconnect_1095747
source IEEE Electronic Library (IEL)
subjects Data privacy
Electric noise
Entropy
MATHEMATICS AND COMPUTING
Maximum likelihood estimation
Mobile communication
Mobility traces
networking
Noise
Noise measurement
Privacy
security and protection
Sensors
title Privacy Vulnerability of Published Anonymous Mobility Traces
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-22T07%3A08%3A16IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Privacy%20Vulnerability%20of%20Published%20Anonymous%20Mobility%20Traces&rft.jtitle=IEEE/ACM%20transactions%20on%20networking&rft.au=Ma,%20C.%20Y.%20T.&rft.aucorp=Oak%20Ridge%20National%20Lab.%20(ORNL),%20Oak%20Ridge,%20TN%20(United%20States)&rft.date=2013-06-01&rft.volume=21&rft.issue=3&rft.spage=720&rft.epage=733&rft.pages=720-733&rft.issn=1063-6692&rft.eissn=1558-2566&rft.coden=IEANEP&rft_id=info:doi/10.1109/TNET.2012.2208983&rft_dat=%3Cproquest_RIE%3E3001842401%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1370331388&rft_id=info:pmid/&rft_ieee_id=6256763&rfr_iscdi=true