Practical Privacy Preservation in a Mobile Cloud Environment

02/09/2023
by   Dimitrios Tomaras, et al.
0

The proliferation of smartphone devices has led to the emergence of powerful user services from enabling interactions with friends and business associates to mapping, finding nearby businesses and alerting users in real-time. Moreover, users do not realize that continuously sharing their trajectory data with online systems may end up revealing a great amount of information in terms of their behavior, mobility patterns and social relationships. Thus, addressing these privacy risks is a fundamental challenge. In this work, we present TP^3, a Privacy Protection system for Trajectory analytics. Our contributions are the following: (1) we model a new type of attack, namely 'social link exploitation attack', (2) we utilize the coresets theory, a fast and accurate technique which approximates well the original data using a small data set, and running queries on the coreset produces similar results to the original data, and (3) we employ the Serverless computing paradigm to accommodate a set of privacy operations for achieving high system performance with minimized provisioning costs, while preserving the users' privacy. We have developed these techniques in our TP^3 system that works with state-of-the-art trajectory analytics apps and applies different types of privacy operations. Our detailed experimental evaluation illustrates that our approach is both efficient and practical.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
12/13/2022

Trajectory Privacy Protection Mechanism based on Social Attributes

The current trajectory privacy protection technology only considers the ...
research
03/08/2017

A Hybrid Deep Learning Architecture for Privacy-Preserving Mobile Analytics

The increasing quality of smartphone cameras and variety of photo editin...
research
01/03/2020

Privacy in Data Service Composition

In modern information systems different information features, about the ...
research
06/14/2020

LSTM-TrajGAN: A Deep Learning Approach to Trajectory Privacy Protection

The prevalence of location-based services contributes to the explosive g...
research
09/20/2023

CATS: Conditional Adversarial Trajectory Synthesis for Privacy-Preserving Trajectory Data Publication Using Deep Learning Approaches

The prevalence of ubiquitous location-aware devices and mobile Internet ...
research
10/26/2020

Open Smartphone Data for Structured Mobility and Utilization Analysis in Ubiquitous Systems

The development and evaluation of new data mining methods for ubiquitous...
research
05/25/2023

Privacy Protectability: An Information-theoretical Approach

Recently, inference privacy has attracted increasing attention. The infe...

Please sign up or login with your details

Forgot password? Click here to reset