Two de-anonymization attacks on real-world location data based on a hidden Markov model

dc.contributor.authorEshun, Samuel N.
dc.contributor.authorPalmieri, Paolo
dc.date.accessioned2022-07-08T10:06:20Z
dc.date.available2022-07-08T10:06:20Z
dc.date.issued2022-06
dc.date.updated2022-07-07T15:37:13Z
dc.description.abstractThe increasing demand for smart context-aware services and the widespread use of location-based services (LBS) have resulted in the proliferation of mobile devices equipped with geolocation sensors (including GPS, geomagnetic field sensor, accelerometer, proximity sensor, et cetera). As a result, service providers and telecommunications companies can collect massive mobility datasets, often for millions of subscribers. To provide a degree of privacy, dataset owners normally replace personal identifiers such as name, address, and social security number (SSN) with pseudorandom identifiers prior to publication or sale. However, it has been repeatedly shown how sensitive information can be easily extracted or inferred from individuals' mobility data even when personal identifiers are removed. Knowledge of the extent to which location data can be de-anonymized is therefore crucial, in order to design appropriate privacy mechanisms that can prevent re-identification. In this paper, we propose and implement two novel and highly effective de-anonymization techniques: the Forward, and the KL algorithms. Our work utilizes a hidden Markov model (which incorporates spatio-temporal trajectories) in a novel way to generate user mobility profiles for target users. Using a real-world reference dataset containing mobility trajectories from the city of Shanghai (GeoLife, a reference dataset also used in previous studies), we evaluate the robustness of the proposed attack techniques. The results show that our attack techniques successfully re-identify up to 85% anonymized users. This significantly exceeds current comparable de-anonymization techniques, which have a success rate of 40% to 45%.en
dc.description.statusPeer revieweden
dc.description.versionAccepted Versionen
dc.format.mimetypeapplication/pdfen
dc.identifier.citationEshun, S. N. and Palmieri, P. (2022) 'Two de-anonymization attacks on real-world location data based on a hidden Markov model ', 7th IEEE European Symposium on Security and Privacy (IEEE EuroS&P 2022), Genoa, Italy, June 6-10, co-located Workshop Proceedings. https://doi.org/10.1109/EuroSPW55150.2022.00062en
dc.identifier.doi10.1109/EuroSPW55150.2022.00062en
dc.identifier.endpage9en
dc.identifier.isbn978-1-6654-9560-8
dc.identifier.issn2768-0657
dc.identifier.startpage1en
dc.identifier.urihttps://hdl.handle.net/10468/13352
dc.language.isoenen
dc.publisherIEEEen
dc.relation.ispartof2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)
dc.relation.urihttps://ieeexplore.ieee.org/abstract/document/9799345
dc.rights© 2022, Samuel N. Eshun. Under license to IEEE.en
dc.subjectDe-anonymizationen
dc.subjectRe-identificationen
dc.subjectLocation privacyen
dc.titleTwo de-anonymization attacks on real-world location data based on a hidden Markov modelen
dc.typeConference itemen
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Eshun_Palmieri_EuroS&P2022.pdf
Size:
399.16 KB
Format:
Adobe Portable Document Format
Description:
Accepted version
License bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
2.71 KB
Format:
Item-specific license agreed upon to submission
Description: