Two de-anonymization attacks on real-world location data based on a hidden Markov model
dc.contributor.author | Eshun, Samuel N. | |
dc.contributor.author | Palmieri, Paolo | |
dc.date.accessioned | 2022-07-08T10:06:20Z | |
dc.date.available | 2022-07-08T10:06:20Z | |
dc.date.issued | 2022-06 | |
dc.date.updated | 2022-07-07T15:37:13Z | |
dc.description.abstract | The increasing demand for smart context-aware services and the widespread use of location-based services (LBS) have resulted in the proliferation of mobile devices equipped with geolocation sensors (including GPS, geomagnetic field sensor, accelerometer, proximity sensor, et cetera). As a result, service providers and telecommunications companies can collect massive mobility datasets, often for millions of subscribers. To provide a degree of privacy, dataset owners normally replace personal identifiers such as name, address, and social security number (SSN) with pseudorandom identifiers prior to publication or sale. However, it has been repeatedly shown how sensitive information can be easily extracted or inferred from individuals' mobility data even when personal identifiers are removed. Knowledge of the extent to which location data can be de-anonymized is therefore crucial, in order to design appropriate privacy mechanisms that can prevent re-identification. In this paper, we propose and implement two novel and highly effective de-anonymization techniques: the Forward, and the KL algorithms. Our work utilizes a hidden Markov model (which incorporates spatio-temporal trajectories) in a novel way to generate user mobility profiles for target users. Using a real-world reference dataset containing mobility trajectories from the city of Shanghai (GeoLife, a reference dataset also used in previous studies), we evaluate the robustness of the proposed attack techniques. The results show that our attack techniques successfully re-identify up to 85% anonymized users. This significantly exceeds current comparable de-anonymization techniques, which have a success rate of 40% to 45%. | en |
dc.description.status | Peer reviewed | en |
dc.description.version | Accepted Version | en |
dc.format.mimetype | application/pdf | en |
dc.identifier.citation | Eshun, S. N. and Palmieri, P. (2022) 'Two de-anonymization attacks on real-world location data based on a hidden Markov model ', 7th IEEE European Symposium on Security and Privacy (IEEE EuroS&P 2022), Genoa, Italy, June 6-10, co-located Workshop Proceedings. https://doi.org/10.1109/EuroSPW55150.2022.00062 | en |
dc.identifier.doi | 10.1109/EuroSPW55150.2022.00062 | en |
dc.identifier.endpage | 9 | en |
dc.identifier.isbn | 978-1-6654-9560-8 | |
dc.identifier.issn | 2768-0657 | |
dc.identifier.startpage | 1 | en |
dc.identifier.uri | https://hdl.handle.net/10468/13352 | |
dc.language.iso | en | en |
dc.publisher | IEEE | en |
dc.relation.ispartof | 2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) | |
dc.relation.uri | https://ieeexplore.ieee.org/abstract/document/9799345 | |
dc.rights | © 2022, Samuel N. Eshun. Under license to IEEE. | en |
dc.subject | De-anonymization | en |
dc.subject | Re-identification | en |
dc.subject | Location privacy | en |
dc.title | Two de-anonymization attacks on real-world location data based on a hidden Markov model | en |
dc.type | Conference item | en |