Back to Search
Start Over
No More than What I Post: Preventing Linkage Attacks on Check-in Services
- Source :
- IEEE Transactions on Mobile Computing. 20:620-633
- Publication Year :
- 2021
- Publisher :
- Institute of Electrical and Electronics Engineers (IEEE), 2021.
-
Abstract
- With the flourishing of location based social networks, posting check-ins has become a common practice to document one's daily life. Users usually do not consider check-in records as violations of their privacy. However, through analyzing two real-world check-in datasets, our study shows that check-in records are vulnerable to linkage attacks. Specifically, adversary is able to uniquely re-identify over 52 $\sim$ ∼ 66 percent users in other anonymous mobility datasets and 60 $\sim$ ∼ 80 percent users have more than 60 percent probability leaking unreported mobility records. In addition, we further demonstrate that the privacy sensitivity of check-in records can be more accurately measured by including the information of additional mobility data compared with only looking at check-ins. Based on this observation, we design a partition-and-group framework to integrate the information of check-ins and additional mobility data to attain a novel privacy criterion— $k^{\tau, l}$ k τ , l -anonymity . It ensures adversaries with arbitrary background knowledge cannot use check-ins to re-identify users in other anonymous datasets or learning unreported mobility records. The proposed framework achieves favorable performance against state-of-art baseline in terms of improving check-in utility by 24 $\sim$ ∼ 57 percent while providing stronger privacy guarantee at the same time. We believe this study will open a new angle in attaining both privacy-preserving and useful check-in services.
- Subjects :
- Linkage (software)
Information privacy
Social network
Check-in
Computer Networks and Communications
business.industry
Computer science
Mobile computing
020206 networking & telecommunications
02 engineering and technology
Adversary
Computer security
computer.software_genre
0202 electrical engineering, electronic engineering, information engineering
Electrical and Electronic Engineering
business
Baseline (configuration management)
computer
Software
Anonymity
Subjects
Details
- ISSN :
- 21619875 and 15361233
- Volume :
- 20
- Database :
- OpenAIRE
- Journal :
- IEEE Transactions on Mobile Computing
- Accession number :
- edsair.doi...........14eee84b388fdd7915343b1e4555c73a
- Full Text :
- https://doi.org/10.1109/tmc.2019.2947416