MobiHide: A Mobile Peer-to-Peer System
for Anonymous Location-Based Queries
Gabriel Ghinita, Panos Kalnis, Spiros Skiadopoulos
National University of Singapore
and
University of Peloponnese, Greece
Location-Based Services
LBS users
Location server is NOT
trusted
Mobile devices with GPS
capabilities
NN and Range Queries
“Find closest hospital to
my present location”
Google Maps, Mapquest,
Microsoft Live, etc.
Privacy? Anonymity?
2
Problem Statement
Hide IP address and username
But user location may disclose identity
Triangulation of device signal
Publicly available databases
Physical surveillance
How to preserve query source anonymity?
Even when exact user locations are known
3
K-Anonymity [Swe02]
Quasi-identifier
Age ZipCode
42
46
50
54
48
56
25000
35000
20000
40000
50000
55000
Disease
Name
Flu
AIDS
Cancer
Gastritis
Dyspepsia
Bronchitis
Andy
Bill
Ken
Nash
Mike
Sam
(a) Microdata
Age ZipCode
42
46
50
54
48
56
25000
35000
20000
40000
50000
55000
(b) Voting Registration List (public)
[Swe02] L. Sweeney. k-Anonymity: A Model for Protecting Privacy. Int. J. of Uncertainty,
Fuzziness and Knowledge-Based Systems, 10(5):557-570, 2002.
4
K-Anonymity (cont.)
Age
42-46
42-46
50-54
50-54
48-56
48-56
ZipCode
Disease
25000-35000
Flu
25000-35000
AIDS
20000-40000 Cancer
20000-40000 Gastritis
50000-55000 Dyspepsia
50000-55000 Bronchitis
(a) 2-anonymous microdata
Name
Andy
Bill
Ken
Nash
Mike
Sam
Age ZipCode
42
46
50
54
48
56
25000
35000
20000
40000
50000
55000
(b) Voting Registration List (public)
5
Anonymizing Spatial Region
Identification probability ≤ 1/K
6
Centralized Anonymizer
Intermediate tier between users and LBS
Bottleneck and single point of
attack/failure
7
MobiHide – Fully Distributed
8
Existing Work: CloakP2P [Chow06]
Find K-1 NN of query source
Source likely to be closest to ASR center
Vulnerable to “center-of-ASR” attack
NOT SECURE !!!
uq
5-ASR
[Chow06] – Chow et al, A Peer-to-Peer Spatial Cloaking Algorithm for Anonymous Locationbased Services, ACM GIS ’06
9
Existing Work: PRIVE [GKS07]
Aq has the reciprocity property iff
i.
ii.
|AS| ≥ K
ui,uj AS, ui ASj uj ASi
[GKS07] – PRIVÉ: Anonymous Location-based Queries in Distributed Mobile Systems , WWW ‘07
10
PRIVE (cont.)
Based on Hilbert space-filling curve
index users by Hilbert value of location
partition Hilbert sequence into “K-buckets”
11
PRIVE (cont.)
Based on Hilbert space-filling curve
index users by Hilbert value of location
partition Hilbert sequence into “K-buckets”
Start
End
12
PRIVÉ Hierarchical Architecture
But requires “global knowledge”
Global rank of query source required
PRIVÉ employs an annotated tree index
13
Motivation
PRIVE
More secure
MobiHide
CloakP2P
Faster
14
MobiHide
Uses Hilbert transformation
Key Idea
Remove the need for global knowledge
Allow random group formation
Scalable DHT infrastructure employed
Chord DHT
15
MobiHide: Group Formation
K
16
MobiHide: Example
17
MobiHide: Privacy
MobiHide is not reciprocal
Privacy guaranty for uniform query
distribution only
But offers strong privacy features in
practice, even for skewed distribution
18
Correlation Attack (K = 4)
27 33 43 56 58 3 5 10 15 18
U6
U5
U8
U6 U7 U8 U9 U10 U1 U2 U3 U4 U5
U7
U4
U9
U3
U10
U1
U2
•4-anonymity not achieved
•However: Difficult attack in
practice
19
MobiHide Implementation
Two-layer Chord DHT
Each Chord node is a cluster of users
Bounded cluster size [,3)
20
User Join/Cluster Split
21
Load Balancing & Fault Tolerance
Load Balancing
Cluster head rotation mechanism
Fault Tolerance
Chord Periodic Stabilization Protocol
Leader election protocol
In case of cluster head failure
22
Experimental Setup
San Francisco Bay Area road network
Network-based Generator of Moving
Objects*
Up to 10000 users
Velocities from 18 to 68 km/h
Uniform and skewed query distribution
* T. Brinkhoff. A Framework for Generating Network-Based Moving Objects. Geoinformatica,
6(2):153–180, 2002.
23
“Center-of-ASR” Attack
24
Correlation Attack
25
ASR Formation Latency
Response Time (sec)
26
Points to Remember
LBS Privacy an important concern
Existing solutions are either not secure …
… or not scalable
MobiHide
Privacy guaranty for uniform query workload
Good best-effort privacy for skewed workload
Excellent scalability inherited from Chord DHT
27
Bibliography on LBS Privacy
http://anonym.comp.nus.edu.sg
28
Bibliography
[Chow06] – Mokbel et al, A Peer-to-Peer Spatial Cloaking
Algorithm for Anonymous Location-based Services, ACM GIS ’06
[Gru03] - Gruteser et al, Anonymous Usage of Location-Based
Services Through Spatial and Temporal Cloaking, MobiSys 2003
[GKS07] – Ghinita G., Kalnis P., Skiadopoulos S., PRIVÉ: Anonymous Location-based Queries in Distributed Mobile Systems,
WWW 2007
[Mok06] – Mokbel et al, The New Casper: Query Processing for
Location Services without Compromising Privacy, VLDB 2006
29