Quantifying Privacy Loss of Human Mobility Graph Topology
Quantifying Privacy Loss of Human Mobility Graph Topology
Manousakas, Dionysis; Mascolo, Cecilia; Beresford, Alastair R.; Chan, Dennis; Sharma, Nikhil
2018-06-01 00:00:00
AbstractHuman mobility is often represented as a mobility network, or graph, with nodes representing places of significance which an individual visits, such as their home, work, places of social amenity, etc., and edge weights corresponding to probability estimates of movements between these places. Previous research has shown that individuals can be identified by a small number of geolocated nodes in their mobility network, rendering mobility trace anonymization a hard task. In this paper we build on prior work and demonstrate that even when all location and timestamp information is removed from nodes, the graph topology of an individual mobility network itself is often uniquely identifying. Further, we observe that a mobility network is often unique, even when only a small number of the most popular nodes and edges are considered. We evaluate our approach using a large dataset of cell-tower location traces from 1 500 smartphone handsets with a mean duration of 430 days. We process the data to derive the top−N places visited by the device in the trace, and find that 93% of traces have a unique top−10 mobility network, and all traces are unique when considering top−15 mobility networks. Since mobility patterns, and therefore mobility networks for an individual, vary over time, we use graph kernel distance functions, to determine whether two mobility networks, taken at different points in time, represent the same individual. We then show that our distance metrics, while imperfect predictors, perform significantly better than a random strategy and therefore our approach represents a significant loss in privacy.
http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.pngProceedings on Privacy Enhancing Technologiesde Gruyterhttp://www.deepdyve.com/lp/de-gruyter/quantifying-privacy-loss-of-human-mobility-graph-topology-6QgVeCzIiM
Quantifying Privacy Loss of Human Mobility Graph Topology
AbstractHuman mobility is often represented as a mobility network, or graph, with nodes representing places of significance which an individual visits, such as their home, work, places of social amenity, etc., and edge weights corresponding to probability estimates of movements between these places. Previous research has shown that individuals can be identified by a small number of geolocated nodes in their mobility network, rendering mobility trace anonymization a hard task. In this paper we build on prior work and demonstrate that even when all location and timestamp information is removed from nodes, the graph topology of an individual mobility network itself is often uniquely identifying. Further, we observe that a mobility network is often unique, even when only a small number of the most popular nodes and edges are considered. We evaluate our approach using a large dataset of cell-tower location traces from 1 500 smartphone handsets with a mean duration of 430 days. We process the data to derive the top−N places visited by the device in the trace, and find that 93% of traces have a unique top−10 mobility network, and all traces are unique when considering top−15 mobility networks. Since mobility patterns, and therefore mobility networks for an individual, vary over time, we use graph kernel distance functions, to determine whether two mobility networks, taken at different points in time, represent the same individual. We then show that our distance metrics, while imperfect predictors, perform significantly better than a random strategy and therefore our approach represents a significant loss in privacy.
Journal
Proceedings on Privacy Enhancing Technologies
– de Gruyter
Published: Jun 1, 2018
Recommended Articles
Loading...
References
Yves de Unique in the Crowd : The privacy bounds of human mobility Scientific reports dec http dx doi org
Alexandre
Deep Graph Kernels In Proceedings of the th International Conference on Knowledge Discovery and Data Mining New York http dx doi org
Pinar Yanardag
Shortest - Path Kernels on In Proceedings of the Fifth http dx doi org
Karsten
Kai Efficient estimation of word representations in vector space arXiv preprint arXiv
Tomas Mikolov
Where You Are Is Who You Are : User Identification by Matching on and http dx org
Farid
Persistent cascades : Measuring fundamental communication structure in social networks In International Conference on Big Data http dx doi org
Steven Morse
On the Anonymity of Home Work Location Pairs http dx org
Philippe Golle
gSpan Graph Based Substructure Pattern Mining In Proceedings of the http dl acm org citation cfm id
Xifeng Yan
Elena Lise To join or not to join : the illusion of privacy in social networks with mixed public and private user profiles In Proceedings of the th International Conference on World WWW
Zheleva
Urs and On the Privacy Implications of Location Semantics http dx org
Berker Agir
Urs and On the Privacy Implications of Location Semantics http dx org
Berker Agir
Muthuramakrishnan Venkitasubramaniam Privacy Beyond anonymity Data Article http dx org
Ashwin Machanavajjhala
Differentiating Smartphone Users by App Usage In Proceedings of the International Joint Conference on Pervasive and Ubiquitous New http dx doi org
Pascal Welke
Muthuramakrishnan Venkitasubramaniam Privacy Beyond anonymity Data Article http dx org
Ashwin Machanavajjhala
On the uniqueness of Web browsing history patterns Annales des Télécommunications http dx org
Lukasz Olejnik
reduction of a graph to a canonical form and an algebra arising during this reduction
Boris Weisfeiler
Luca Christoph and Privacy and the City : User Identification and Location Semantics in Location - Based Social Networks In Proceedings of the Ninth International Conference on Web and Social Media University of Oxford UK http www aaai org ocs index php
Rossi
anonymity model for protectingprivacy of and Knowledge - Based
Latanya Sweeney
Kevin Jonathan and Uri Shaft When Is Nearest Neighbor Meaningful In Proceedings of the th International Conference on Database Verlag London UK UK http dl acm org citation cfm id
Beyer
Luca Christoph and Privacy and the City : User Identification and Location Semantics in Location - Based Social Networks In Proceedings of the Ninth International Conference on Web and Social Media University of Oxford UK http www aaai org ocs index php
Rossi
Representing higher - order dependencies in networks Advances http dx org
Jian Xu
Trajectory Recovery From Ash : User Privacy Is NOT Preserved in Aggregated Mobility Data In Proceedings of the th International Conference on World International Wide Web Conferences Steering Committee
Fengli Xu
Hui Anonymization of Location Data Does Not Large - scale Measurement Study In Proceedings of the th Annual International Conference on Mobile New York http dx doi org
Zang
An Automated Social Graph De - anonymization Technique In Proceedings of the th Workshop on Privacy in the Electronic New York http dx doi org
Kumar Sharad
Kai Efficient estimation of word representations in vector space arXiv preprint arXiv
Tomas Mikolov
The mobile data challenge : Big data for mobile computing research in Workshop
Juha
Extracting places from traces of locations Mobile Communications http dx org
Jong
anonymity model for protectingprivacy of and Knowledge - Based
Latanya Sweeney
Identification via location - profiling in GSM networks In Proceedings of the Workshop on Privacy in the Electronic Alexandria http dx doi org
Yoni De Mulder
Dirk Anonymous Usage of Location - Based Services Through Spatial and Temporal Cloaking In Proceedings of the st International Conference on Mobile Systems Applications and Services New York http dx doi org
Marco Gruteser
The mobile data challenge : Big data for mobile computing research in Workshop
Juha
Ting Fingerprinting and Tracking on the Web Privacy Implications In The th Annual Network and Distributed System https www microsoft com en us research publication hostfingerprinting and tracking on the webprivacy and securityimplications
Fang Yen
graph kernels http dx org
Nino Shervashidze
Shortest - Path Kernels on In Proceedings of the Fifth http dx doi org
Karsten
Kondor Graph http dx org
Vishwanathan
Persistent cascades : Measuring fundamental communication structure in social networks In International Conference on Big Data http dx doi org
Steven Morse
reduction of a graph to a canonical form and an algebra arising during this reduction
Boris Weisfeiler
Dirk Anonymous Usage of Location - Based Services Through Spatial and Temporal Cloaking In Proceedings of the st International Conference on Mobile Systems Applications and Services New York http dx doi org
Marco Gruteser
Robust Deanonymization of Large Sparse Datasets In Proceedings of the on and http dx org
Arvind Narayanan
De What Does The Crowd Say About You ? Evaluating Aggregation - based Location Privacy arXiv preprint arXiv
Apostolos Pyrgelis
General Survey of Privacy - Preserving Data Mining Models and Algorithms In Privacy - Preserving Data Mining The on in Springer US http dx org
Charu
Kevin Jonathan and Uri Shaft When Is Nearest Neighbor Meaningful In Proceedings of the th International Conference on Database Verlag London UK UK http dl acm org citation cfm id
Beyer
An Automated Social Graph De - anonymization Technique In Proceedings of the th Workshop on Privacy in the Electronic New York http dx doi org
Kumar Sharad
Mining Heavy Subgraphs in Time - Evolving Networks In Proceedings of the th International Conference on Data Mining http dx doi org
Petko Bogdanov
Elena Lise To join or not to join : the illusion of privacy in social networks with mixed public and private user profiles In Proceedings of the th International Conference on World WWW
Zheleva
and Mobile user verification identification using statistical mobility profile In International Conference on Big Data and http dx doi org
Miao Lin
Identification via location - profiling in GSM networks In Proceedings of the Workshop on Privacy in the Electronic Alexandria http dx doi org
Yoni De Mulder
Extracting places from traces of locations Mobile Communications http dx org
Jong
Ingo When is a Network a Network Multi - Order Graphical Model Selection in Pathways and Temporal Networks In Proceedings of the rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining New York http dx doi org
Scholtes
Mining Heavy Subgraphs in Time - Evolving Networks In Proceedings of the th International Conference on Data Mining http dx doi org
Petko Bogdanov
Robust Deanonymization of Large Sparse Datasets In Proceedings of the on and http dx org
Arvind Narayanan
networks In Privacy th on
Arvind Narayanan
Deep Graph Kernels In Proceedings of the th International Conference on Knowledge Discovery and Data Mining New York http dx doi org
Pinar Yanardag
Practical graph isomorphism II of http dx org
Brendan
Yves de Unique in the Crowd : The privacy bounds of human mobility Scientific reports dec http dx doi org
Alexandre
Practical graph isomorphism II of http dx org
Brendan
Marc - Del De anonymization Attack on Data http dx org
Sébastien Gambs
On the Anonymity of Home Work Location Pairs http dx org
Philippe Golle
De What Does The Crowd Say About You ? Evaluating Aggregation - based Location Privacy arXiv preprint arXiv
Apostolos Pyrgelis
Representing higher - order dependencies in networks Advances http dx org
Jian Xu
graph kernels http dx org
Nino Shervashidze
Trajectory Recovery From Ash : User Privacy Is NOT Preserved in Aggregated Mobility Data In Proceedings of the th International Conference on World International Wide Web Conferences Steering Committee
Fengli Xu
Differentiating Smartphone Users by App Usage In Proceedings of the International Joint Conference on Pervasive and Ubiquitous New http dx doi org
Pascal Welke
On the uniqueness of Web browsing history patterns Annales des Télécommunications http dx org
Lukasz Olejnik
Convolution kernels on discrete structures Technical Report Technical report Department of University of California at Santa Cruz
David Haussler
Marc - Del De anonymization Attack on Data http dx org
Sébastien Gambs
Unraveling an old cloak anonymity for location privacy In Proceedings of the th annual ACM workshop on Privacy in the electronic society
Reza Shokri
Where You Are Is Who You Are : User Identification by Matching on and http dx org
Farid
Kondor Graph http dx org
Vishwanathan
Venkatasubramanian closeness Privacy beyond anonymity and diversity In Data rd International Conference on
and Mobile user verification identification using statistical mobility profile In International Conference on Big Data and http dx doi org
Miao Lin
Ingo When is a Network a Network Multi - Order Graphical Model Selection in Pathways and Temporal Networks In Proceedings of the rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining New York http dx doi org
Scholtes
Unraveling an old cloak anonymity for location privacy In Proceedings of the th annual ACM workshop on Privacy in the electronic society
Reza Shokri
General Survey of Privacy - Preserving Data Mining Models and Algorithms In Privacy - Preserving Data Mining The on in Springer US http dx org
Charu
Ting Fingerprinting and Tracking on the Web Privacy Implications In The th Annual Network and Distributed System https www microsoft com en us research publication hostfingerprinting and tracking on the webprivacy and securityimplications
Fang Yen
gSpan Graph Based Substructure Pattern Mining In Proceedings of the http dl acm org citation cfm id
Xifeng Yan
Discriminative frequent subgraph mining with optimality guarantees Statistical Analysis and Data Mining http dx doi org
Marisa Thoma
Discriminative frequent subgraph mining with optimality guarantees Statistical Analysis and Data Mining http dx doi org
Marisa Thoma
Venkatasubramanian closeness Privacy beyond anonymity and diversity In Data rd International Conference on
Ninghui Li
Hui Anonymization of Location Data Does Not Large - scale Measurement Study In Proceedings of the th Annual International Conference on Mobile New York http dx doi org
Zang
Convolution kernels on discrete structures Technical Report Technical report Department of University of California at Santa Cruz
To get new article updates from a journal on your personalized homepage, please log in first, or sign up for a DeepDyve account if you don’t already have one.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.