SlideShare une entreprise Scribd logo
1  sur  14
Télécharger pour lire hors ligne
Semanticand SensitivityAwareLocation-PrivacyProtection for the Internet of Things 
Berker Ağır, Jean-Paul Calbimonte, Karl Aberer 
Workshop on Society, Privacy and the Semantic Web -Policy and Technology 2014 
20 October2014
Introduction 
•Online Devices 
•more infiltratingin dailylife 
•online services & applications 
•They are capable of sensing 
their environment and context 
GPS 
Accelerometer 
Barometer 
Thermometer 
2
PrivacyUnder Threat 
•Honest but curious server 
•Exploits all available data 
•With limited computational power, tries to infer private information 
Background knowledge on user history 
User Events 
Process according to objectives 
Perform attack 
Observed events 
Privacy Protection Mechanism(s) 
Application Server 
3
Location Privacy 
•Location data carries highly contextual information 
•Activity tracking 
•Inferring habits 
•Physical assault 
•Rich sensor environment and continuous connectivity 
•A non-stop and unbalanced threat on privacy 
4
Common Location-Privacy Protection Approaches 
? 
Obfuscation 
Perturbation 
Hiding 
Anonymization 
Actual location 
Observed locations 
5
Shortcomings of Existing Approaches 
•Location information is multi- dimensional 
•Semantics 
•Not every location / semantic tagmight have the same importance in terms of privacy 
•Home location 
•Hospitals, restaurants 
•Overprotection 
•Service degradation 
6
Smart Adversariesand Strategies 
•Privacy has to be evaluated w.r.t. a real attack scenario 
•Adaptive protection mechanisms on user device 
•Move against each other in a strategic game 
•Location Semantics 
•User Mobility History 
•Common-knowledge sensitivities 
→Inference 
•Location Semantics 
•Adversary Modelling 
•Sensitivity Profile 
→Real-Time Adaptive Protection 
User 
Adversary 
7
Adaptive Location Privacy Protection 
8 
Adaptive Privacy Protection Mechanisms 
Privacy Estimation Module 
Estimate 
Candidate obfuscation area 
Sensitivity Profile 
Geographical& Semantic 
User History 
•Adaptive approach:Past behavior is considered before making a privacy decision 
•Causality and physical feasibility between transitions
Sensitivity Profile Configuration 
Android application allowing to set semantic and geography based sensitivity levels 
9
Adaptive Protection in Action 
10 
Lowsensitivity-university 
High sensitivity-hospital
SemanticLocation Privacy 
•Whatabout the privacyof the semantics? 
•Location mightnot matteras long as the user activityisunknown 
11 
Cinema? 
Pharmacy? 
Hotel? 
Hospital? 
Bar?
EvaluatingPrivacy 
•What is the adversary’s errorin inferring 
•users’ geographical locations? 
•the semantics of user locations? 
•How confidentis the adversary? 
•Probabilistic nature of inference 
•What is the user’s desired privacy level (i.e., sensitivity) for 
•his geographical location? 
•the semantics of his location? 
12
NextSteps& Future Work 
•Model & implementinferenceconsideringlocation semanticsand user sensitivities 
•Inferring user activity from a collection of location and semantic tag series 
•Private attributes such as age, gender, occupation 
•Reasoningabout causalityin the semanticlevel 
•Goingto a cinemaafterhavingdinnerat a nearbyrestaurant 
13
Future Work 
14 
Health-care 
(x, y)coordinates 
Geographical 
Semantics 
Visit 
Interactions/ 
Relationships 
Work 
Treatment 
Has sick friend 
Attributes 
Is Doctor 
Is Nurse 
Has 
Broken Leg 
Has Cancer 
Work Place 
Business 
Has customer 
User 
Adversary

Contenu connexe

Tendances

Tendances (8)

SplunkLive! London - Scoping Infections and Disrupting Breaches breakout
SplunkLive! London - Scoping Infections and Disrupting Breaches breakoutSplunkLive! London - Scoping Infections and Disrupting Breaches breakout
SplunkLive! London - Scoping Infections and Disrupting Breaches breakout
 
CEH - Module 6 : Trojans and Backdoors
CEH - Module 6 : Trojans and BackdoorsCEH - Module 6 : Trojans and Backdoors
CEH - Module 6 : Trojans and Backdoors
 
QR Codes and the Ushahidi Platform
QR Codes and the Ushahidi PlatformQR Codes and the Ushahidi Platform
QR Codes and the Ushahidi Platform
 
All Your Base Still Belong To Us Physical Penetration Testing Tales From The ...
All Your Base Still Belong To Us Physical Penetration Testing Tales From The ...All Your Base Still Belong To Us Physical Penetration Testing Tales From The ...
All Your Base Still Belong To Us Physical Penetration Testing Tales From The ...
 
Wi fi quiz
Wi fi quizWi fi quiz
Wi fi quiz
 
WiFi Data Leakage by Solomon Sonya
WiFi Data Leakage by Solomon SonyaWiFi Data Leakage by Solomon Sonya
WiFi Data Leakage by Solomon Sonya
 
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญCurrent trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
 
Protecting the Crown Jewels from Devastating Data Breaches
Protecting the Crown Jewels from Devastating Data BreachesProtecting the Crown Jewels from Devastating Data Breaches
Protecting the Crown Jewels from Devastating Data Breaches
 

Similaire à Semantic and Sensitivity Aware Location-Privacy Protection for the Internet of Things

On Location-based Services for Patient Empowerment, Guidance and Safety
On Location-based Services for Patient Empowerment, Guidance and SafetyOn Location-based Services for Patient Empowerment, Guidance and Safety
On Location-based Services for Patient Empowerment, Guidance and Safety
Andreas Triantafyllidis
 
Building a Mobile Security Model
Building a Mobile Security Model Building a Mobile Security Model
Building a Mobile Security Model
tmbainjr131
 
TakeDownCon Rocket City: Research Advancements Towards Protecting Critical As...
TakeDownCon Rocket City: Research Advancements Towards Protecting Critical As...TakeDownCon Rocket City: Research Advancements Towards Protecting Critical As...
TakeDownCon Rocket City: Research Advancements Towards Protecting Critical As...
EC-Council
 

Similaire à Semantic and Sensitivity Aware Location-Privacy Protection for the Internet of Things (20)

An Architecture for Privacy-Sensitive Ubiquitous Computing at Mobisys 2004
An Architecture for Privacy-Sensitive Ubiquitous Computing at Mobisys 2004An Architecture for Privacy-Sensitive Ubiquitous Computing at Mobisys 2004
An Architecture for Privacy-Sensitive Ubiquitous Computing at Mobisys 2004
 
Contextual apps for Tizen
Contextual apps for TizenContextual apps for Tizen
Contextual apps for Tizen
 
On Location-based Services for Patient Empowerment, Guidance and Safety
On Location-based Services for Patient Empowerment, Guidance and SafetyOn Location-based Services for Patient Empowerment, Guidance and Safety
On Location-based Services for Patient Empowerment, Guidance and Safety
 
Building a Mobile Security Model
Building a Mobile Security Model Building a Mobile Security Model
Building a Mobile Security Model
 
From Context-awareness to Human Behavior Patterns
From Context-awareness to Human Behavior PatternsFrom Context-awareness to Human Behavior Patterns
From Context-awareness to Human Behavior Patterns
 
Mobi hoc panel_arpanpal
Mobi hoc panel_arpanpalMobi hoc panel_arpanpal
Mobi hoc panel_arpanpal
 
[EUC2014] cODA: An Open-Source Framework to Easily Design Context-Aware Andro...
[EUC2014] cODA: An Open-Source Framework to Easily Design Context-Aware Andro...[EUC2014] cODA: An Open-Source Framework to Easily Design Context-Aware Andro...
[EUC2014] cODA: An Open-Source Framework to Easily Design Context-Aware Andro...
 
wireless networks
wireless networkswireless networks
wireless networks
 
Cps innovation lab kolkata iiest
Cps innovation lab kolkata iiestCps innovation lab kolkata iiest
Cps innovation lab kolkata iiest
 
TakeDownCon Rocket City: Research Advancements Towards Protecting Critical As...
TakeDownCon Rocket City: Research Advancements Towards Protecting Critical As...TakeDownCon Rocket City: Research Advancements Towards Protecting Critical As...
TakeDownCon Rocket City: Research Advancements Towards Protecting Critical As...
 
Save Your Network – Protecting Healthcare Data from Deadly Breaches
Save Your Network – Protecting Healthcare Data from Deadly BreachesSave Your Network – Protecting Healthcare Data from Deadly Breaches
Save Your Network – Protecting Healthcare Data from Deadly Breaches
 
project ppt.pptx
project ppt.pptxproject ppt.pptx
project ppt.pptx
 
Contextual Biometrics
Contextual BiometricsContextual Biometrics
Contextual Biometrics
 
Conference talk: On the Privacy of Frequently Visited User Locations
Conference talk: On the Privacy of Frequently Visited User LocationsConference talk: On the Privacy of Frequently Visited User Locations
Conference talk: On the Privacy of Frequently Visited User Locations
 
Ubiquitous Computing: Privacy Issues
Ubiquitous Computing: Privacy IssuesUbiquitous Computing: Privacy Issues
Ubiquitous Computing: Privacy Issues
 
preserving location privacy in geosocial applications
preserving location privacy in geosocial applicationspreserving location privacy in geosocial applications
preserving location privacy in geosocial applications
 
Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...
Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...
Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...
 
Defending the campus juniper nerworks
Defending the campus juniper nerworksDefending the campus juniper nerworks
Defending the campus juniper nerworks
 
Computer Security: Principles of Information Security
Computer Security: Principles of Information SecurityComputer Security: Principles of Information Security
Computer Security: Principles of Information Security
 
Securing Your Mobile Applications
Securing Your Mobile ApplicationsSecuring Your Mobile Applications
Securing Your Mobile Applications
 

Dernier

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Dernier (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 

Semantic and Sensitivity Aware Location-Privacy Protection for the Internet of Things

  • 1. Semanticand SensitivityAwareLocation-PrivacyProtection for the Internet of Things Berker Ağır, Jean-Paul Calbimonte, Karl Aberer Workshop on Society, Privacy and the Semantic Web -Policy and Technology 2014 20 October2014
  • 2. Introduction •Online Devices •more infiltratingin dailylife •online services & applications •They are capable of sensing their environment and context GPS Accelerometer Barometer Thermometer 2
  • 3. PrivacyUnder Threat •Honest but curious server •Exploits all available data •With limited computational power, tries to infer private information Background knowledge on user history User Events Process according to objectives Perform attack Observed events Privacy Protection Mechanism(s) Application Server 3
  • 4. Location Privacy •Location data carries highly contextual information •Activity tracking •Inferring habits •Physical assault •Rich sensor environment and continuous connectivity •A non-stop and unbalanced threat on privacy 4
  • 5. Common Location-Privacy Protection Approaches ? Obfuscation Perturbation Hiding Anonymization Actual location Observed locations 5
  • 6. Shortcomings of Existing Approaches •Location information is multi- dimensional •Semantics •Not every location / semantic tagmight have the same importance in terms of privacy •Home location •Hospitals, restaurants •Overprotection •Service degradation 6
  • 7. Smart Adversariesand Strategies •Privacy has to be evaluated w.r.t. a real attack scenario •Adaptive protection mechanisms on user device •Move against each other in a strategic game •Location Semantics •User Mobility History •Common-knowledge sensitivities →Inference •Location Semantics •Adversary Modelling •Sensitivity Profile →Real-Time Adaptive Protection User Adversary 7
  • 8. Adaptive Location Privacy Protection 8 Adaptive Privacy Protection Mechanisms Privacy Estimation Module Estimate Candidate obfuscation area Sensitivity Profile Geographical& Semantic User History •Adaptive approach:Past behavior is considered before making a privacy decision •Causality and physical feasibility between transitions
  • 9. Sensitivity Profile Configuration Android application allowing to set semantic and geography based sensitivity levels 9
  • 10. Adaptive Protection in Action 10 Lowsensitivity-university High sensitivity-hospital
  • 11. SemanticLocation Privacy •Whatabout the privacyof the semantics? •Location mightnot matteras long as the user activityisunknown 11 Cinema? Pharmacy? Hotel? Hospital? Bar?
  • 12. EvaluatingPrivacy •What is the adversary’s errorin inferring •users’ geographical locations? •the semantics of user locations? •How confidentis the adversary? •Probabilistic nature of inference •What is the user’s desired privacy level (i.e., sensitivity) for •his geographical location? •the semantics of his location? 12
  • 13. NextSteps& Future Work •Model & implementinferenceconsideringlocation semanticsand user sensitivities •Inferring user activity from a collection of location and semantic tag series •Private attributes such as age, gender, occupation •Reasoningabout causalityin the semanticlevel •Goingto a cinemaafterhavingdinnerat a nearbyrestaurant 13
  • 14. Future Work 14 Health-care (x, y)coordinates Geographical Semantics Visit Interactions/ Relationships Work Treatment Has sick friend Attributes Is Doctor Is Nurse Has Broken Leg Has Cancer Work Place Business Has customer User Adversary