Location Privacy - USI...2009/09/10  · when disclosing information: k-anonymity and its...

70
LOCATION PRIVACY Marc Langheinrich University of Lugano (USI), Switzerland

Transcript of Location Privacy - USI...2009/09/10  · when disclosing information: k-anonymity and its...

Page 1: Location Privacy - USI...2009/09/10  · when disclosing information: k-anonymity and its enforcement through generalization and suppression, Tech Report SRI-CSL-98-04, 1998 Pierangela

LOCATION PRIVACY

Marc LangheinrichUniversity of Lugano (USI), Switzerland

Page 2: Location Privacy - USI...2009/09/10  · when disclosing information: k-anonymity and its enforcement through generalization and suppression, Tech Report SRI-CSL-98-04, 1998 Pierangela

Zurich (2.5h)

Milano (1h)

Genoa (2.5h)

Page 3: Location Privacy - USI...2009/09/10  · when disclosing information: k-anonymity and its enforcement through generalization and suppression, Tech Report SRI-CSL-98-04, 1998 Pierangela

Securing a Mobile Phone

Page 4: Location Privacy - USI...2009/09/10  · when disclosing information: k-anonymity and its enforcement through generalization and suppression, Tech Report SRI-CSL-98-04, 1998 Pierangela

Securing a Mobile Phone

Page 5: Location Privacy - USI...2009/09/10  · when disclosing information: k-anonymity and its enforcement through generalization and suppression, Tech Report SRI-CSL-98-04, 1998 Pierangela

Securing a Mobile Phone

Page 6: Location Privacy - USI...2009/09/10  · when disclosing information: k-anonymity and its enforcement through generalization and suppression, Tech Report SRI-CSL-98-04, 1998 Pierangela

Securing a Mobile Phone

Page 7: Location Privacy - USI...2009/09/10  · when disclosing information: k-anonymity and its enforcement through generalization and suppression, Tech Report SRI-CSL-98-04, 1998 Pierangela

Can We Have it Both Ways?

• Safe

• Secure

• Privacy-friendly

• Usable

• Useful

• Used

Page 8: Location Privacy - USI...2009/09/10  · when disclosing information: k-anonymity and its enforcement through generalization and suppression, Tech Report SRI-CSL-98-04, 1998 Pierangela

WHAT IS PRIVACY?

Page 9: Location Privacy - USI...2009/09/10  · when disclosing information: k-anonymity and its enforcement through generalization and suppression, Tech Report SRI-CSL-98-04, 1998 Pierangela

Facets of Privacy

Page 10: Location Privacy - USI...2009/09/10  · when disclosing information: k-anonymity and its enforcement through generalization and suppression, Tech Report SRI-CSL-98-04, 1998 Pierangela

Hard To Define

“Privacy is a value so complex, so entangled in competing and contradictory dimensions, so engorged with various and distinct meanings, that I sometimes despairwhether it can be usefully addressed at all.”

Robert C. Post, Three Concepts of Privacy, 89 Georgetown Law Journal 2087 (2001).

Original Slide from Lorrie Cranor: „ 8-533 / 8-733 / 19-608 / 95-818: Privacy Policy, Law, and Technology”, Fall 2008, CMU

Prof. Robert C. PostYale Law School

Page 11: Location Privacy - USI...2009/09/10  · when disclosing information: k-anonymity and its enforcement through generalization and suppression, Tech Report SRI-CSL-98-04, 1998 Pierangela

Hard To Analyze

„... The notion of privacy is fraught with multiple meanings, interpretations, and value judgments. … Nearly every thread of analysis leads to other questions and issues that also cry out for additional analysis—one might even regard the subject as fractal, where each level of analysis requires another equally complex level of analysis to explore the issues that the previous level raises.”

James Waldo et al., Engaging Privacy and Information Technology in a Digital Age. National Academies Press, 2008

Page 12: Location Privacy - USI...2009/09/10  · when disclosing information: k-anonymity and its enforcement through generalization and suppression, Tech Report SRI-CSL-98-04, 1998 Pierangela

A Privacy Definition

• “The right to be let alone.“– Warren and Brandeis, 1890

(Harvard Law Review)

• “Numerous mechanical devices threaten to make good the prediction that ’what is whispered in the closet shall be proclaimed from the housetops’“

Image source: http://historyofprivacy.net/RPIntro3-2009.htm

Page 13: Location Privacy - USI...2009/09/10  · when disclosing information: k-anonymity and its enforcement through generalization and suppression, Tech Report SRI-CSL-98-04, 1998 Pierangela

George Eastman1854-1932

Technological Revolution, 1888

Image Source: Wikipedia; Encyclopedia Britannica (Student Edition)

Page 14: Location Privacy - USI...2009/09/10  · when disclosing information: k-anonymity and its enforcement through generalization and suppression, Tech Report SRI-CSL-98-04, 1998 Pierangela

TomTom iPhone

The Location Revolution, 2009

Rakon GPS

Infineon XPOSYS GPS

Trackstick 2Hitachi Clarion

Nokia N97

Page 15: Location Privacy - USI...2009/09/10  · when disclosing information: k-anonymity and its enforcement through generalization and suppression, Tech Report SRI-CSL-98-04, 1998 Pierangela

A Privacy Definition

• “The right to be let alone.“– Warren and Brandeis, 1890

(Harvard Law Review)

• “Numerous mechanical devices threaten to make good the prediction that ’what is whispered in the closet shall be proclaimed from the housetops’“

Image source: http://historyofprivacy.net/RPIntro3-2009.htm

Page 16: Location Privacy - USI...2009/09/10  · when disclosing information: k-anonymity and its enforcement through generalization and suppression, Tech Report SRI-CSL-98-04, 1998 Pierangela

SOLITUDEFacets of Privacy

Page 17: Location Privacy - USI...2009/09/10  · when disclosing information: k-anonymity and its enforcement through generalization and suppression, Tech Report SRI-CSL-98-04, 1998 Pierangela

Information Privacy

• “The desire of people to choose freely under what circumstances and to what extent they will expose themselves, their attitude and their behavior to others.“– Alan Westin, 1967

Privacy And Freedom, Atheneum

Dr. Alan F. Westin

Page 18: Location Privacy - USI...2009/09/10  · when disclosing information: k-anonymity and its enforcement through generalization and suppression, Tech Report SRI-CSL-98-04, 1998 Pierangela

CONTROLFacets of Privacy

Page 19: Location Privacy - USI...2009/09/10  · when disclosing information: k-anonymity and its enforcement through generalization and suppression, Tech Report SRI-CSL-98-04, 1998 Pierangela

Privacy Regulation Theory

• Privacy as Accessibility Optimization:Inputs and Outputs– Not monotonic: “More“ is not always

“better“– Spectrum: “Openness“/ “Closedness“ – Privacy levels: isolation > desired > crowding

• Dynamic Boundary Negotiation Process– Neither static nor rule-based– Privacy as a social interaction process– Cultural, territorial, verbal mechanisms

Irwin AltmanUniversity of Utah

See, e.g., L. Palen, P. Dourish: “Unpacking "privacy" for a networked world.” Proceedings of CHI 2003. pp.129-136.

Page 20: Location Privacy - USI...2009/09/10  · when disclosing information: k-anonymity and its enforcement through generalization and suppression, Tech Report SRI-CSL-98-04, 1998 Pierangela

INTIMACYFacets of Privacy

Page 21: Location Privacy - USI...2009/09/10  · when disclosing information: k-anonymity and its enforcement through generalization and suppression, Tech Report SRI-CSL-98-04, 1998 Pierangela

Privacy – More Than Secrecy!

Privacy

Secrecy

Solitude

Control

Intimacy

Dignity

Freedom

Anonymity

Safety

Page 22: Location Privacy - USI...2009/09/10  · when disclosing information: k-anonymity and its enforcement through generalization and suppression, Tech Report SRI-CSL-98-04, 1998 Pierangela

WHY LOCATION PRIVACY?

Page 23: Location Privacy - USI...2009/09/10  · when disclosing information: k-anonymity and its enforcement through generalization and suppression, Tech Report SRI-CSL-98-04, 1998 Pierangela

„Location“ Privacy?

What‘s so special about „location“ that it is worth inventing a special category for it?

Page 24: Location Privacy - USI...2009/09/10  · when disclosing information: k-anonymity and its enforcement through generalization and suppression, Tech Report SRI-CSL-98-04, 1998 Pierangela

Location Privacy

• “… the ability to prevent other parties from learning one’s current or past location.“

(Beresford and Stajano, 2003)

• „It‘s not about where you are... It‘s where you have been!“

• Gary Gale, Head of UK Engineering for Yahoo! Geo Technologies

Useful Definition?! Think Altman!

Alastair BeresfordCambridge Univ.

Frank StajanoCambridge Univ.

Gary GaleYahoo! UK

Page 25: Location Privacy - USI...2009/09/10  · when disclosing information: k-anonymity and its enforcement through generalization and suppression, Tech Report SRI-CSL-98-04, 1998 Pierangela

Motivating Disclosure

• Why Share Your Location?– By-product of positioning technology (e.g., cell

towers, WiFi, ...)– Required to use service (local recommendations,

automated payment for toll roads, ...)– Social benefits (let friends and family know where I

am, finding new friends, ...)

• Why NOT to Share Your Location?– Location profiles reveal/imply activities, interests,

identity

Page 26: Location Privacy - USI...2009/09/10  · when disclosing information: k-anonymity and its enforcement through generalization and suppression, Tech Report SRI-CSL-98-04, 1998 Pierangela

Location Implications

• Places I Go– Where I Live / Work

– Who I Am (Name)

– Hobbies/Interests/Memberships

• People I Meet– My Social Network

• Profiling, e.g., – ZIP-Code: implies income, ethnicity, family size

Page 27: Location Privacy - USI...2009/09/10  · when disclosing information: k-anonymity and its enforcement through generalization and suppression, Tech Report SRI-CSL-98-04, 1998 Pierangela

Implications: Profiles

• Allow Inferences About You– May or may not be true!

• May Categorize You– High spender, music afficinado, credit risk

• May Offer Or Deny Services– Rebates, different prices, priviliged access

• „Social Sorting“ (Lyons, 2003)– Opaque decisions „channel“ life choices

Image Sources: http://www.jimmyjanesays.com/sketchblog/paperdollmask_large.jpghttp://www.queensjournal.ca/story/2008-03-14/supplement/keeping-tabs-personal-data/

Page 28: Location Privacy - USI...2009/09/10  · when disclosing information: k-anonymity and its enforcement through generalization and suppression, Tech Report SRI-CSL-98-04, 1998 Pierangela

www.nytimes.com/1992/09/12/technology/orwellian-dream-come-true-a-badge-that-pinpoints-you.html

Page 29: Location Privacy - USI...2009/09/10  · when disclosing information: k-anonymity and its enforcement through generalization and suppression, Tech Report SRI-CSL-98-04, 1998 Pierangela

Proxy-Based Location PrivacyActive Badge System (1992)

Mike Spreitzer and Marvin Theimer. Providing location information in a ubiquitous computing environment. In Proc. of the 14th ACM Symp. on Operating Systems Principles (SOSP ’93), pp. 270–283. ACM Press, 1993.

Bob‘s User Agent

Location Updates

Location Query Service

Query Interface

7829

7829 (pseudonym)

Where‘s Bob?

Bob

Bob?

Page 30: Location Privacy - USI...2009/09/10  · when disclosing information: k-anonymity and its enforcement through generalization and suppression, Tech Report SRI-CSL-98-04, 1998 Pierangela

Location Triangle

Who

Where When

Page 31: Location Privacy - USI...2009/09/10  · when disclosing information: k-anonymity and its enforcement through generalization and suppression, Tech Report SRI-CSL-98-04, 1998 Pierangela

What To Protect Against

• Protect against unwanted/accidentialdisclosure (friend finder services/Latitude)– Immediate disclosure vs. later „lookups“

• Protect against monitoring (nosy employer)– Monitoring breaks, work efficiency

• Protect against commercial profiling– Excerting subtle influence over decisions

• Against law enforcement– If you got nothing to hide, you got nothing to fear?

Page 32: Location Privacy - USI...2009/09/10  · when disclosing information: k-anonymity and its enforcement through generalization and suppression, Tech Report SRI-CSL-98-04, 1998 Pierangela

Do People Care?

Danezis, George, Lewis, Stephen, Anderson, Ross: How Much is Location Privacy Worth. Fourth Workshop on the Economics of Information Security, Harvard University (2005)

Page 33: Location Privacy - USI...2009/09/10  · when disclosing information: k-anonymity and its enforcement through generalization and suppression, Tech Report SRI-CSL-98-04, 1998 Pierangela

End-User Attitudes Towards LBS

• Clear value proposition

• Simple and appropriate control and feedback

• Plausible deniability

• Limited retention of data

• Decentralized control

• Special exceptions for emergencies

Jason Hong: An Architecture for Privacy-Sensitive Ubiquitous Computing. PhD Thesis, Univ. of Califronia Berkeley, 2005. Available at www.cs.cmu.edu/~jasonh/publications/jihdiss.pdf

Jason HongCMU

Page 34: Location Privacy - USI...2009/09/10  · when disclosing information: k-anonymity and its enforcement through generalization and suppression, Tech Report SRI-CSL-98-04, 1998 Pierangela

LOCATION PRIVACY TECHNOLOGY

Page 35: Location Privacy - USI...2009/09/10  · when disclosing information: k-anonymity and its enforcement through generalization and suppression, Tech Report SRI-CSL-98-04, 1998 Pierangela

Location Privacy Technology

• Transparency Tools– Privacy Policies

– Rule-based access control

• Opacity Tools– Anonymization (“k-anonymity“)

– Obfuscation

Page 36: Location Privacy - USI...2009/09/10  · when disclosing information: k-anonymity and its enforcement through generalization and suppression, Tech Report SRI-CSL-98-04, 1998 Pierangela

TRANSPARENCY TOOLS

Page 37: Location Privacy - USI...2009/09/10  · when disclosing information: k-anonymity and its enforcement through generalization and suppression, Tech Report SRI-CSL-98-04, 1998 Pierangela

GEOPRIV

• “A suite of protocols that allow applications to represent and transmitgeographic and civic location information about resources and entities, and to allow users to express policies on how these repre-sentations are exposed and used”

• GEOPRIV Model– Defines how services

should use location– Includes privacy controls

(Rule Holder)– Location is published to

Location Server– Location is used by

Location Recipient

• Defines XML Formats– Location Objects (GML)– Preference Rules

http://tools.ietf.org/wg/geopriv/

Page 38: Location Privacy - USI...2009/09/10  · when disclosing information: k-anonymity and its enforcement through generalization and suppression, Tech Report SRI-CSL-98-04, 1998 Pierangela

GEOPRIV Model

Dawson, Martin; James Winterbottom, Martin Thomson (2006-11-13). IP Location. McGraw-Hill. ISBN 0-07-226377-6.

Device

Target

Location Generator

LocationServer

Rule Holder

RuleMaker

Location RecipientsLocation

RecipientsLocation Recipients

Page 39: Location Privacy - USI...2009/09/10  · when disclosing information: k-anonymity and its enforcement through generalization and suppression, Tech Report SRI-CSL-98-04, 1998 Pierangela

GEOPRIV Example[Restaurant Finder]

Dawson, Martin; James Winterbottom, Martin Thomson (2006-11-13). IP Location. McGraw-Hill. ISBN 0-07-226377-6.

TargetLocation

Generator

LocationServer

Rule Holder

RuleMaker

Location Recipients

Device

Bob Bob‘s GPS-Enable Phone

Bob is at43.5723 S,

153.21760 E

Restaurant Finder

Page 40: Location Privacy - USI...2009/09/10  · when disclosing information: k-anonymity and its enforcement through generalization and suppression, Tech Report SRI-CSL-98-04, 1998 Pierangela

Location Privacy User Interfaces (UIs)

Lederer, Hong, Dey, Landay, Personal Privacy through Understanding and Action: Five Pitfalls for Designers. Personal and Ubiquitous Computing, Vol. 8, no. 6, Nov. 2004, pp. 440-454

Page 41: Location Privacy - USI...2009/09/10  · when disclosing information: k-anonymity and its enforcement through generalization and suppression, Tech Report SRI-CSL-98-04, 1998 Pierangela

Hong, J. I. and Landay, J. A. 2004. An architecture for privacy-sensitive ubiquitous computing. In Proc. 2nd intl Conf. on Mobile Systems, Applications, and Services (MobiSys '04). ACM, pp. 177-189

Example Confab/Lemming

• Configuration during use

• Built-in Plausible Deniability

Page 42: Location Privacy - USI...2009/09/10  · when disclosing information: k-anonymity and its enforcement through generalization and suppression, Tech Report SRI-CSL-98-04, 1998 Pierangela

Support for Continuous Services

Page 43: Location Privacy - USI...2009/09/10  · when disclosing information: k-anonymity and its enforcement through generalization and suppression, Tech Report SRI-CSL-98-04, 1998 Pierangela

Example UI: Google Latitude

• Reciprocal sharing with individual contacts

• Individual adjustments (hide, or only city level)

• Global (temporal) adjustments– Manual override

– Disable

Page 44: Location Privacy - USI...2009/09/10  · when disclosing information: k-anonymity and its enforcement through generalization and suppression, Tech Report SRI-CSL-98-04, 1998 Pierangela

OPACITY TOOLS

Page 45: Location Privacy - USI...2009/09/10  · when disclosing information: k-anonymity and its enforcement through generalization and suppression, Tech Report SRI-CSL-98-04, 1998 Pierangela

Location Anonymity[Naïve Approach]

• Use random IDs that change periodically– Trivial to trace

Page 46: Location Privacy - USI...2009/09/10  · when disclosing information: k-anonymity and its enforcement through generalization and suppression, Tech Report SRI-CSL-98-04, 1998 Pierangela

Plan B: Strong Pseudonyms[Won‘t work either]

Page 47: Location Privacy - USI...2009/09/10  · when disclosing information: k-anonymity and its enforcement through generalization and suppression, Tech Report SRI-CSL-98-04, 1998 Pierangela

Why Pseudonyms Don‘t Work

• Observation Identification (OI) Attack– Correlate single identifiable observation with

location pseudonym

– ATM use @ location -> Name for pseudonym

Page 48: Location Privacy - USI...2009/09/10  · when disclosing information: k-anonymity and its enforcement through generalization and suppression, Tech Report SRI-CSL-98-04, 1998 Pierangela

Observation Identifcation Attack

Page 49: Location Privacy - USI...2009/09/10  · when disclosing information: k-anonymity and its enforcement through generalization and suppression, Tech Report SRI-CSL-98-04, 1998 Pierangela

Observation Identifcation Attack

Page 50: Location Privacy - USI...2009/09/10  · when disclosing information: k-anonymity and its enforcement through generalization and suppression, Tech Report SRI-CSL-98-04, 1998 Pierangela

Observation Identifcation Attack

Page 51: Location Privacy - USI...2009/09/10  · when disclosing information: k-anonymity and its enforcement through generalization and suppression, Tech Report SRI-CSL-98-04, 1998 Pierangela

Why Pseudonyms Don‘t Work

• Observation Identification (OI) Attack– Correlate single identifiable observation with

location pseudonym

– ATM use @ location -> Name for pseudonym

• Restricted Space Identification (RSI) Attack– Using known mapping from place to name

– Home location -> Home address -> Name (Phonebook)

Page 52: Location Privacy - USI...2009/09/10  · when disclosing information: k-anonymity and its enforcement through generalization and suppression, Tech Report SRI-CSL-98-04, 1998 Pierangela

Pseudonymous User Trace

Img src: [Bereseford, Stajano 2003]

Page 53: Location Privacy - USI...2009/09/10  · when disclosing information: k-anonymity and its enforcement through generalization and suppression, Tech Report SRI-CSL-98-04, 1998 Pierangela

Location Mix Zones[Countering RSI Attacks]

• Address Restricted Space Identification Attacks– How to change pseudonyms?

• Idea: Designate “Mix Zones“ With No Tracking / LBS Active– Change pseudonyms only within

mix zone

– (Beresford and Stajano, 2003) offer probabilistic model for unlinkability in mix zones

Alastair BeresfordCambridge Univ.

Frank StajanoCambridge Univ.

Page 54: Location Privacy - USI...2009/09/10  · when disclosing information: k-anonymity and its enforcement through generalization and suppression, Tech Report SRI-CSL-98-04, 1998 Pierangela

K-Anonymity[Countering OI Attacks]

• Concept from statistical DBs

• Challenge: How do you publicly release a database without compromising individual privacy?

• Problem: Anonymized data still subject to „observation attack“ (i.e., linking), allows identification

Page 55: Location Privacy - USI...2009/09/10  · when disclosing information: k-anonymity and its enforcement through generalization and suppression, Tech Report SRI-CSL-98-04, 1998 Pierangela

K-Anonymity – The Problem

DOB Sex Zipcode Disease

1/21/76 Female 53715 Heart Disease

4/13/86 Male 53715 Hepatitis

2/28/76 Female 53703 Brochitis

1/21/76 Female 53703 Broken Arm

4/13/86 Male 53706 Swine Flu

2/28/76 Male 53706 Common Flu

Name DOB Sex Zipcode

Alice 1/21/76 Female 53715

Bob 1/10/81 Male 55410

Charlie 10/1/44 Male 90210

Dave 2/21/84 Male 02174

Ellen 4/19/72 Female 02237

Hospital Patient Data

Vote Registration Data

Samarati P and Sweeney L.: Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression, Tech Report SRI-CSL-98-04, 1998

Pierangela SamaratiUniv. of Milan

Latanya SweeneyCMU

The triple (DOB, gender, zip code) suffices to uniquely identify at least 87% of US citizens in publicly available databases (1990 U.S. Census summary data).

Page 56: Location Privacy - USI...2009/09/10  · when disclosing information: k-anonymity and its enforcement through generalization and suppression, Tech Report SRI-CSL-98-04, 1998 Pierangela

K-Anonymity

• Approach: Generalize attributes so that each row in the table cannot be distinguished from at least k-1other rows

• Example for k=2: shorten ZIP code to first 3 digits

DOB Sex Zipcode Disease

1/21/76 Female 537* Heart Disease

4/13/86 Male 537* Hepatitis

2/28/76 Female 537* Brochitis

1/21/76 Female 537* Broken Arm

4/13/86 Male 537* Swine Flu

2/28/76 Male 537* Common Flu

Name DOB Sex Zipcode

Alice 1/21/76 Female 53715

Bob 1/10/81 Male 55410

Charlie 10/1/44 Male 90210

Dave 2/21/84 Male 02174

Ellen 4/19/72 Female 02237

Hospital Patient Data Vote Registration Data

Page 57: Location Privacy - USI...2009/09/10  · when disclosing information: k-anonymity and its enforcement through generalization and suppression, Tech Report SRI-CSL-98-04, 1998 Pierangela

Location K-Anonymity

• AS knows location of all users

• Subdivides area until it contains at less than k users– Uses previous quadrant as

„cloaking region“ in LBS query

Marco GruteserRutgers Univ.

Dirk GrunwaldUniv. of Colorado

AnonymizerService (AS)

LBS

LBS

LBS

Gruteser, M. and Grunwald, D. Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking. In Proc.of MobiSys 2003. ACM, pp 31-42

Page 58: Location Privacy - USI...2009/09/10  · when disclosing information: k-anonymity and its enforcement through generalization and suppression, Tech Report SRI-CSL-98-04, 1998 Pierangela

Location K-Anonymity – Issues

• Global or individual k?• Quality of Service (QoS) degradation?• Random cloaking regions allow inference of

true location if repated queries occur• Postprocessing required on client (e.g.,

routing)

• Does not hide true location of user!– Protects agains observation identification attack

Page 59: Location Privacy - USI...2009/09/10  · when disclosing information: k-anonymity and its enforcement through generalization and suppression, Tech Report SRI-CSL-98-04, 1998 Pierangela

Greatly Varying Obfuscation Areas

Example: k=100

Industrial Area on Weekend Promenade on WeekendWeekend Train

Page 60: Location Privacy - USI...2009/09/10  · when disclosing information: k-anonymity and its enforcement through generalization and suppression, Tech Report SRI-CSL-98-04, 1998 Pierangela

Location Obfuscation

• Adding noise, pertubation, dummy traffic to location data– Protects against attackers, but degrades service use

– (Krumm, 2007) showed that LOTS of obfuscation is needed

– Typically combined with rules to selectively adjust accuracy

Image Source: Krumm, J., Inference Attacks on Location Tracks, in Fifth International Conference on Pervasive Computing (Pervasive 2007). 2007: Toronto, Ontario Canada. p. 127-143.

Page 61: Location Privacy - USI...2009/09/10  · when disclosing information: k-anonymity and its enforcement through generalization and suppression, Tech Report SRI-CSL-98-04, 1998 Pierangela

Track Obfuscation

• Location tracks more difficult to fake! Requires– Believable speeds (existing speed limits)– Realistic start/end-points, trip times (duration, days)– Suboptimal routes (human driver vs. route planner)– Expected GPS noise (higher in urban environments)

Krumm, J., Realistic Driving Tracks for Location Privacy. In 7th International Conference on Pervasive Computing (Pervasive 2009), Nara, Japan, Springer.

Page 62: Location Privacy - USI...2009/09/10  · when disclosing information: k-anonymity and its enforcement through generalization and suppression, Tech Report SRI-CSL-98-04, 1998 Pierangela

SUMMING UP

Img src: www.flickr.com/photos/nomeacuerdo/431060441/

Page 63: Location Privacy - USI...2009/09/10  · when disclosing information: k-anonymity and its enforcement through generalization and suppression, Tech Report SRI-CSL-98-04, 1998 Pierangela

Take Home Message

• Privacy is Not Just Secrecy/Seclusion!– Privacy is a process, not a state

• Basic Challenges of Location Privacy Tech– Disassociating “Who?”, “When?”, “Where?”– Observation Identification Attack– Restricted Space Identification Attack

• Technical Approaches– Transparency: Policy and User Interfaces– Opacity: K-Anonymity and Obfuscation– Usability! Economic Viability!

Page 64: Location Privacy - USI...2009/09/10  · when disclosing information: k-anonymity and its enforcement through generalization and suppression, Tech Report SRI-CSL-98-04, 1998 Pierangela

Further Issues

• Legal Issues– 9-1-1, GPS, Mobile Phone Tracking Ruling (US)– Data Protection, E-privacy, Retention (EU)

• Location And Activity Data Mining– citysense.com (MIT), cenceme.org (Dartmouth)– FP7: GeoPKDD.eu, MODAP Coordinated Action

• Location Sharing Practices (Ethnography)– Reno (Iachello et al. ‘05), Whereabouts Clock

(Sellen et al. ‘06), Connecto (Barkhuus et al. ‘08)

Page 65: Location Privacy - USI...2009/09/10  · when disclosing information: k-anonymity and its enforcement through generalization and suppression, Tech Report SRI-CSL-98-04, 1998 Pierangela

Techno Fallacies, Beware!

• The Objectivity Of Numbers• Data Means Knowledge• More Data Means More Knowledge• If It Is In The Computer, It Must Be Right• If You Have Nothing To Hide, There’s No

Danger• Less Data Means More Privacy

Technology Is Neither Good Nor Bad. Nor Is It Neutral Melvin C. Kranzberg

See, e.g., Gary Marx: Rocky Bottoms and Some Information Age Techno-Fallacies. Intl. Political Sociology, Vol. 1, No. 1. March 2007, pp. 83-110.

Irwin AltmanUniversity of Utah

Melvin C. KranzbergGeorgia Tech (1917-1995)

Gary T. MarxMIT

Page 66: Location Privacy - USI...2009/09/10  · when disclosing information: k-anonymity and its enforcement through generalization and suppression, Tech Report SRI-CSL-98-04, 1998 Pierangela

General Reading

• David Brin: The Transparent Society. Perseus Publishing, 1999

• Simson Garfinkel: Database Nation – The Death of Privacy in the 21st Century. O’Reilly, 2001

• Lawrence Lessig: Code and Other Laws of Cyberspace. Basic Books, 2006 http://codev2.cc/

Page 67: Location Privacy - USI...2009/09/10  · when disclosing information: k-anonymity and its enforcement through generalization and suppression, Tech Report SRI-CSL-98-04, 1998 Pierangela

Privacy and Technology

• Deborah Estrin (ed.): Embedded, Every-where: A Research Agenda for Networked Systems of Embedded Computers. National Academies Press, 2001.http://www.nap.edu/openbook.php?isbn=0309075688

• Waldo, Lin, Millett (eds.): Engaging Privacy and Information Technology in a Digital Age. National Academies Press, 2007.

• Wright, Gutwirth, Friedewald, et al.: Safeguards in a World of Ambient Intelligence. Springer, 2008

Page 68: Location Privacy - USI...2009/09/10  · when disclosing information: k-anonymity and its enforcement through generalization and suppression, Tech Report SRI-CSL-98-04, 1998 Pierangela

SHAMELESS PLUG

Page 69: Location Privacy - USI...2009/09/10  · when disclosing information: k-anonymity and its enforcement through generalization and suppression, Tech Report SRI-CSL-98-04, 1998 Pierangela

To Read

• John Krumm (ed): Ubiquitous Computing Fundamentals. Taylor & Francis, 2009

• With Contributions From:– Roy Want – Jakob Bardram and Adrian Friday– Marc Langheinrich– A.J. Bernheim Brush– Alex S. Taylor– Aaron Quigley– Alexander Varshavsky and Shwetak Patel– Anind K. Dey– John Krumm

Page 70: Location Privacy - USI...2009/09/10  · when disclosing information: k-anonymity and its enforcement through generalization and suppression, Tech Report SRI-CSL-98-04, 1998 Pierangela