SlideShare una empresa de Scribd logo
1 de 14
Descargar para leer sin conexión
Semanticand SensitivityAwareLocation-PrivacyProtection for the Internet of Things 
Berker Ağır, Jean-Paul Calbimonte, Karl Aberer 
Workshop on Society, Privacy and the Semantic Web -Policy and Technology 2014 
20 October2014
Introduction 
•Online Devices 
•more infiltratingin dailylife 
•online services & applications 
•They are capable of sensing 
their environment and context 
GPS 
Accelerometer 
Barometer 
Thermometer 
2
PrivacyUnder Threat 
•Honest but curious server 
•Exploits all available data 
•With limited computational power, tries to infer private information 
Background knowledge on user history 
User Events 
Process according to objectives 
Perform attack 
Observed events 
Privacy Protection Mechanism(s) 
Application Server 
3
Location Privacy 
•Location data carries highly contextual information 
•Activity tracking 
•Inferring habits 
•Physical assault 
•Rich sensor environment and continuous connectivity 
•A non-stop and unbalanced threat on privacy 
4
Common Location-Privacy Protection Approaches 
? 
Obfuscation 
Perturbation 
Hiding 
Anonymization 
Actual location 
Observed locations 
5
Shortcomings of Existing Approaches 
•Location information is multi- dimensional 
•Semantics 
•Not every location / semantic tagmight have the same importance in terms of privacy 
•Home location 
•Hospitals, restaurants 
•Overprotection 
•Service degradation 
6
Smart Adversariesand Strategies 
•Privacy has to be evaluated w.r.t. a real attack scenario 
•Adaptive protection mechanisms on user device 
•Move against each other in a strategic game 
•Location Semantics 
•User Mobility History 
•Common-knowledge sensitivities 
→Inference 
•Location Semantics 
•Adversary Modelling 
•Sensitivity Profile 
→Real-Time Adaptive Protection 
User 
Adversary 
7
Adaptive Location Privacy Protection 
8 
Adaptive Privacy Protection Mechanisms 
Privacy Estimation Module 
Estimate 
Candidate obfuscation area 
Sensitivity Profile 
Geographical& Semantic 
User History 
•Adaptive approach:Past behavior is considered before making a privacy decision 
•Causality and physical feasibility between transitions
Sensitivity Profile Configuration 
Android application allowing to set semantic and geography based sensitivity levels 
9
Adaptive Protection in Action 
10 
Lowsensitivity-university 
High sensitivity-hospital
SemanticLocation Privacy 
•Whatabout the privacyof the semantics? 
•Location mightnot matteras long as the user activityisunknown 
11 
Cinema? 
Pharmacy? 
Hotel? 
Hospital? 
Bar?
EvaluatingPrivacy 
•What is the adversary’s errorin inferring 
•users’ geographical locations? 
•the semantics of user locations? 
•How confidentis the adversary? 
•Probabilistic nature of inference 
•What is the user’s desired privacy level (i.e., sensitivity) for 
•his geographical location? 
•the semantics of his location? 
12
NextSteps& Future Work 
•Model & implementinferenceconsideringlocation semanticsand user sensitivities 
•Inferring user activity from a collection of location and semantic tag series 
•Private attributes such as age, gender, occupation 
•Reasoningabout causalityin the semanticlevel 
•Goingto a cinemaafterhavingdinnerat a nearbyrestaurant 
13
Future Work 
14 
Health-care 
(x, y)coordinates 
Geographical 
Semantics 
Visit 
Interactions/ 
Relationships 
Work 
Treatment 
Has sick friend 
Attributes 
Is Doctor 
Is Nurse 
Has 
Broken Leg 
Has Cancer 
Work Place 
Business 
Has customer 
User 
Adversary

Más contenido relacionado

La actualidad más candente

La actualidad más candente (8)

SplunkLive! London - Scoping Infections and Disrupting Breaches breakout
SplunkLive! London - Scoping Infections and Disrupting Breaches breakoutSplunkLive! London - Scoping Infections and Disrupting Breaches breakout
SplunkLive! London - Scoping Infections and Disrupting Breaches breakout
 
CEH - Module 6 : Trojans and Backdoors
CEH - Module 6 : Trojans and BackdoorsCEH - Module 6 : Trojans and Backdoors
CEH - Module 6 : Trojans and Backdoors
 
QR Codes and the Ushahidi Platform
QR Codes and the Ushahidi PlatformQR Codes and the Ushahidi Platform
QR Codes and the Ushahidi Platform
 
All Your Base Still Belong To Us Physical Penetration Testing Tales From The ...
All Your Base Still Belong To Us Physical Penetration Testing Tales From The ...All Your Base Still Belong To Us Physical Penetration Testing Tales From The ...
All Your Base Still Belong To Us Physical Penetration Testing Tales From The ...
 
Wi fi quiz
Wi fi quizWi fi quiz
Wi fi quiz
 
WiFi Data Leakage by Solomon Sonya
WiFi Data Leakage by Solomon SonyaWiFi Data Leakage by Solomon Sonya
WiFi Data Leakage by Solomon Sonya
 
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญCurrent trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
 
Protecting the Crown Jewels from Devastating Data Breaches
Protecting the Crown Jewels from Devastating Data BreachesProtecting the Crown Jewels from Devastating Data Breaches
Protecting the Crown Jewels from Devastating Data Breaches
 

Similar a Semantic and Sensitivity Aware Location-Privacy Protection for the Internet of Things

On Location-based Services for Patient Empowerment, Guidance and Safety
On Location-based Services for Patient Empowerment, Guidance and SafetyOn Location-based Services for Patient Empowerment, Guidance and Safety
On Location-based Services for Patient Empowerment, Guidance and Safety
Andreas Triantafyllidis
 
Building a Mobile Security Model
Building a Mobile Security Model Building a Mobile Security Model
Building a Mobile Security Model
tmbainjr131
 
TakeDownCon Rocket City: Research Advancements Towards Protecting Critical As...
TakeDownCon Rocket City: Research Advancements Towards Protecting Critical As...TakeDownCon Rocket City: Research Advancements Towards Protecting Critical As...
TakeDownCon Rocket City: Research Advancements Towards Protecting Critical As...
EC-Council
 

Similar a Semantic and Sensitivity Aware Location-Privacy Protection for the Internet of Things (20)

An Architecture for Privacy-Sensitive Ubiquitous Computing at Mobisys 2004
An Architecture for Privacy-Sensitive Ubiquitous Computing at Mobisys 2004An Architecture for Privacy-Sensitive Ubiquitous Computing at Mobisys 2004
An Architecture for Privacy-Sensitive Ubiquitous Computing at Mobisys 2004
 
Contextual apps for Tizen
Contextual apps for TizenContextual apps for Tizen
Contextual apps for Tizen
 
On Location-based Services for Patient Empowerment, Guidance and Safety
On Location-based Services for Patient Empowerment, Guidance and SafetyOn Location-based Services for Patient Empowerment, Guidance and Safety
On Location-based Services for Patient Empowerment, Guidance and Safety
 
Building a Mobile Security Model
Building a Mobile Security Model Building a Mobile Security Model
Building a Mobile Security Model
 
From Context-awareness to Human Behavior Patterns
From Context-awareness to Human Behavior PatternsFrom Context-awareness to Human Behavior Patterns
From Context-awareness to Human Behavior Patterns
 
Mobi hoc panel_arpanpal
Mobi hoc panel_arpanpalMobi hoc panel_arpanpal
Mobi hoc panel_arpanpal
 
[EUC2014] cODA: An Open-Source Framework to Easily Design Context-Aware Andro...
[EUC2014] cODA: An Open-Source Framework to Easily Design Context-Aware Andro...[EUC2014] cODA: An Open-Source Framework to Easily Design Context-Aware Andro...
[EUC2014] cODA: An Open-Source Framework to Easily Design Context-Aware Andro...
 
wireless networks
wireless networkswireless networks
wireless networks
 
Cps innovation lab kolkata iiest
Cps innovation lab kolkata iiestCps innovation lab kolkata iiest
Cps innovation lab kolkata iiest
 
TakeDownCon Rocket City: Research Advancements Towards Protecting Critical As...
TakeDownCon Rocket City: Research Advancements Towards Protecting Critical As...TakeDownCon Rocket City: Research Advancements Towards Protecting Critical As...
TakeDownCon Rocket City: Research Advancements Towards Protecting Critical As...
 
Save Your Network – Protecting Healthcare Data from Deadly Breaches
Save Your Network – Protecting Healthcare Data from Deadly BreachesSave Your Network – Protecting Healthcare Data from Deadly Breaches
Save Your Network – Protecting Healthcare Data from Deadly Breaches
 
project ppt.pptx
project ppt.pptxproject ppt.pptx
project ppt.pptx
 
Contextual Biometrics
Contextual BiometricsContextual Biometrics
Contextual Biometrics
 
Conference talk: On the Privacy of Frequently Visited User Locations
Conference talk: On the Privacy of Frequently Visited User LocationsConference talk: On the Privacy of Frequently Visited User Locations
Conference talk: On the Privacy of Frequently Visited User Locations
 
Ubiquitous Computing: Privacy Issues
Ubiquitous Computing: Privacy IssuesUbiquitous Computing: Privacy Issues
Ubiquitous Computing: Privacy Issues
 
preserving location privacy in geosocial applications
preserving location privacy in geosocial applicationspreserving location privacy in geosocial applications
preserving location privacy in geosocial applications
 
Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...
Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...
Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...
 
Defending the campus juniper nerworks
Defending the campus juniper nerworksDefending the campus juniper nerworks
Defending the campus juniper nerworks
 
Computer Security: Principles of Information Security
Computer Security: Principles of Information SecurityComputer Security: Principles of Information Security
Computer Security: Principles of Information Security
 
Securing Your Mobile Applications
Securing Your Mobile ApplicationsSecuring Your Mobile Applications
Securing Your Mobile Applications
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Último (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 

Semantic and Sensitivity Aware Location-Privacy Protection for the Internet of Things

  • 1. Semanticand SensitivityAwareLocation-PrivacyProtection for the Internet of Things Berker Ağır, Jean-Paul Calbimonte, Karl Aberer Workshop on Society, Privacy and the Semantic Web -Policy and Technology 2014 20 October2014
  • 2. Introduction •Online Devices •more infiltratingin dailylife •online services & applications •They are capable of sensing their environment and context GPS Accelerometer Barometer Thermometer 2
  • 3. PrivacyUnder Threat •Honest but curious server •Exploits all available data •With limited computational power, tries to infer private information Background knowledge on user history User Events Process according to objectives Perform attack Observed events Privacy Protection Mechanism(s) Application Server 3
  • 4. Location Privacy •Location data carries highly contextual information •Activity tracking •Inferring habits •Physical assault •Rich sensor environment and continuous connectivity •A non-stop and unbalanced threat on privacy 4
  • 5. Common Location-Privacy Protection Approaches ? Obfuscation Perturbation Hiding Anonymization Actual location Observed locations 5
  • 6. Shortcomings of Existing Approaches •Location information is multi- dimensional •Semantics •Not every location / semantic tagmight have the same importance in terms of privacy •Home location •Hospitals, restaurants •Overprotection •Service degradation 6
  • 7. Smart Adversariesand Strategies •Privacy has to be evaluated w.r.t. a real attack scenario •Adaptive protection mechanisms on user device •Move against each other in a strategic game •Location Semantics •User Mobility History •Common-knowledge sensitivities →Inference •Location Semantics •Adversary Modelling •Sensitivity Profile →Real-Time Adaptive Protection User Adversary 7
  • 8. Adaptive Location Privacy Protection 8 Adaptive Privacy Protection Mechanisms Privacy Estimation Module Estimate Candidate obfuscation area Sensitivity Profile Geographical& Semantic User History •Adaptive approach:Past behavior is considered before making a privacy decision •Causality and physical feasibility between transitions
  • 9. Sensitivity Profile Configuration Android application allowing to set semantic and geography based sensitivity levels 9
  • 10. Adaptive Protection in Action 10 Lowsensitivity-university High sensitivity-hospital
  • 11. SemanticLocation Privacy •Whatabout the privacyof the semantics? •Location mightnot matteras long as the user activityisunknown 11 Cinema? Pharmacy? Hotel? Hospital? Bar?
  • 12. EvaluatingPrivacy •What is the adversary’s errorin inferring •users’ geographical locations? •the semantics of user locations? •How confidentis the adversary? •Probabilistic nature of inference •What is the user’s desired privacy level (i.e., sensitivity) for •his geographical location? •the semantics of his location? 12
  • 13. NextSteps& Future Work •Model & implementinferenceconsideringlocation semanticsand user sensitivities •Inferring user activity from a collection of location and semantic tag series •Private attributes such as age, gender, occupation •Reasoningabout causalityin the semanticlevel •Goingto a cinemaafterhavingdinnerat a nearbyrestaurant 13
  • 14. Future Work 14 Health-care (x, y)coordinates Geographical Semantics Visit Interactions/ Relationships Work Treatment Has sick friend Attributes Is Doctor Is Nurse Has Broken Leg Has Cancer Work Place Business Has customer User Adversary