A Framework for Managing Multifaceted Privacy Leakage While Optimizing Utility in Continuous LBS Interactions (2404.13407v2)
Abstract: Privacy in Location-Based Services (LBS) has become a paramount concern with the ubiquity of mobile devices and the increasing integration of location data into various applications. This paper presents several novel contributions to advancing the understanding and management of privacy leakage in LBS. Our contributions provide a more comprehensive framework for analyzing privacy concerns across different facets of location-based interactions. Specifically, we introduce $(\epsilon, \delta)$-location privacy, $(\epsilon, \delta, \theta)$-trajectory privacy, and $(\epsilon, \delta, \theta)$-POI privacy, which offer refined mechanisms for quantifying privacy risks associated with location, trajectory, and points of interest (POI) when continuously interacting with LBS. Furthermore, we establish fundamental connections between these privacy notions, facilitating a holistic approach to privacy preservation in LBS. Additionally, we present a lower bound analysis to evaluate the utility of the proposed privacy-preserving mechanisms, offering insights into the trade-offs between privacy protection and data utility. Finally, we instantiate our framework with the Plannar Isotopic Mechanism to demonstrate its practical applicability while ensuring optimal utility and quantifying privacy leakages across various dimensions. The evaluations provided provide a comprehensive insight into the efficacy of our framework in capturing privacy loss on location, trajectory, and points of interest while enabling quantification of the ensured accuracy.
- Geo-indistinguishability: Differential privacy for location-based systems. In Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security. 901–914.
- Calibrating noise to sensitivity in private data analysis. Journal of Privacy and Confidentiality 7, 3 (2016), 17–51.
- Differential privacy under continual observation. In Proceedings of the forty-second ACM symposium on Theory of computing. 715–724.
- Slotswap: Strong and affordable location privacy in intelligent transportation systems. IEEE Communications Magazine 49, 11 (2011), 126–133.
- Chengfang Fang and Ee-Chien Chang. 2014. Differential privacy with δ𝛿\deltaitalic_δ-neighbourhood for spatial and dynamic datasets. In Proceedings of the 9th ACM symposium on Information, computer and communications security. 159–170.
- Foursquare. [n. d.]. Foursquare Dataset. https://sites.google.com/site/yangdingqi/home/foursquare-dataset. Accessed: April 16th, 2024.
- Marco Gruteser and Baik Hoh. 2005. On the anonymity of periodic location samples. In International Conference on Security in Pervasive Computing. Springer, 179–192.
- Category-aware next point-of-interest recommendation via listwise bayesian personalized ranking.. In IJCAI, Vol. 17. 1837–1843.
- Inferring a personalized next point-of-interest recommendation model with latent behavior patterns. In Proceedings of the AAAI Conference on Artificial Intelligence, Vol. 30.
- Achieving guaranteed anonymity in gps traces via uncertainty-aware path cloaking. IEEE Transactions on Mobile Computing 9, 8 (2010), 1089–1107.
- Location privacy-preserving mechanisms in location-based services: A comprehensive survey. ACM Computing Surveys (CSUR) 54, 1 (2021), 1–36.
- RobLoP: Towards robust privacy preserving against location dependent attacks in continuous LBS queries. IEEE/ACM Transactions on Networking 26, 2 (2018), 1018–1032.
- Differentially private event sequences over infinite streams. Proceedings of the VLDB Endowment 7, 12 (2014), 1155–1166.
- Balaji Palanisamy and Ling Liu. 2014. Attack-resilient mix-zones over road networks: architecture and algorithms. IEEE Transactions on Mobile Computing 14, 3 (2014), 495–508.
- Anonymizing continuous queries with delay-tolerant mix-zones over road networks. Distributed and Parallel Databases 32 (2014), 91–118.
- The long road to computational location privacy: A survey. IEEE Communications Surveys & Tutorials 21, 3 (2018), 2772–2793.
- Privacy protection for users of location-based services. IEEE Wireless Communications 19, 1 (2012), 30–39.
- Quantifying location privacy. In 2011 IEEE symposium on security and privacy. IEEE, 247–262.
- Privacy-preserving location-proximity for mobile apps. In 2017 25th Euromicro International Conference on Parallel, Distributed and Network-based Processing (PDP). IEEE, 337–345.
- Latanya Sweeney. 2002. k-anonymity: A model for protecting privacy. International journal of uncertainty, fuzziness and knowledge-based systems 10, 05 (2002), 557–570.
- Yonghui Xiao and Li Xiong. 2015. Protecting locations with differential privacy under temporal correlations. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. 1298–1309.
- A neural network approach to jointly modeling social networks and mobile trajectories. ACM Transactions on Information Systems (TOIS) 35, 4 (2017), 1–28.
- Location prediction over sparse user mobility traces using rnns. In Proceedings of the twenty-ninth international joint conference on artificial intelligence. 2184–2190.
- Anis Bkakria (2 papers)
- Reda Yaich (4 papers)