De-anonymization attack on geolocated data

Sebastien Gambs, Marc Olivier Killijian, Miguel Nunez Del Prado Cortez

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

32 Scopus citations

Abstract

With the advent of GPS-equipped devices, a massive amount of location data is being collected, raising the issue of the privacy risks incurred by the individuals whose movements are recorded. In this work, we focus on a specific inference attack called the de-anonymization attack, by which an adversary tries to infer the identity of a particular individual behind a set of mobility traces. More specifically, we propose an implementation of this attack based on a mobility model called Mobility Markov Chain (MMC). A MMC is built out from the mobility traces observed during the training phase and is used to perform the attack during the testing phase. We design two distance metrics quantifying the closeness between two MMCs and combine these distances to build de-anonymizers that can re-identify users in an anonymized geolocated dataset. Experiments conducted on real datasets demonstrate that the attack is both accurate and resilient to sanitization mechanisms such as downsampling.
Original languageEnglish
Title of host publication12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications
Pages789-797
Number of pages9
ISBN (Electronic)978-0-7695-5022-0
DOIs
StatePublished - 12 Dec 2013
Externally publishedYes
EventProceedings - 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 -
Duration: 1 Dec 2013 → …

Conference

ConferenceProceedings - 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013
Period1/12/13 → …

Keywords

  • de-anonymization
  • geolocation
  • inference attack
  • Privacy

Fingerprint

Dive into the research topics of 'De-anonymization attack on geolocated data'. Together they form a unique fingerprint.

Cite this