Skip to main content

Unique on the Road: Re-identification of Vehicular Location-Based Metadata

  • Conference paper
  • First Online:

Abstract

For digging individuals’ information from anonymous metadata, usually the first step is to identify the entities in metadata and associate them with persons in the real world. If an entity in metadata is uniquely re-identified, its host is possibly confronting a serious privacy disclosure problem. In this paper, we study the privacy issue in VLBS (Vehicular Location-Based Service) by investigating the re-identification problem of vehicular location-based metadata in a VLBS server. We find that the trajectories of vehicles are highly unique after studying 131 millions mobility traces of taxis in Shenzhen and 1.1 billions of taxis in Shanghai. More specifically, with the help of the urban road maps, four spatio-temporal points are sufficient to uniquely identify vehicles, achieving an accuracy of 95.35%. This indicates that there is a high risk of privacy leakage when VLBS applications are widely deployed.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Wang, C., Tang, S., Yang, L., Guo, Y., Li, F., Jiang, C.: Modeling data dissemination in online social networks: a geographical perspective on bounding network traffic load. In: Proceedings of ACM MobiHoc (2014)

    Google Scholar 

  2. Cheng Wang, L., Shao, Z.L., Yang, L., Li, X.-Y., Jiang, C.: Capacity scaling of wireless social networks. IEEE Trans. Parallel Distrib. Syst. 26(7), 1839–1850 (2015)

    Article  Google Scholar 

  3. Theodorakopoulos, G., Shokri, R., Troncoso, C., Hubaux, J.-P., Le Boudec, J.-Y.: Prolonging the hide-and-seek game: optimal trajectory privacy for location-based services. In: Proceedings of ACM WPES (2014)

    Google Scholar 

  4. Hwang, R.-H., Hsueh, Y.-L., Chung, H.-W.: A novel time-obfuscated algorithm for trajectory privacy protection. IEEE Trans. Serv. Comput. 7(2), 126–139 (2014)

    Article  Google Scholar 

  5. Guo, M., Jin, X., Pissinou, N., Zanlongo, S., Carbunar, B., Iyengar, S.S.: In-network trajectory privacy preservation. ACM Comput. Surv. (CSUR) 48(2), 23 (2015)

    Article  Google Scholar 

  6. Shin, K.G., Ju, X., Chen, Z., Chen, X.: Privacy protection for users of location-based services. IEEE Wirel. Commun. 19(1), 30–39 (2012)

    Article  Google Scholar 

  7. Pan, J., Zuo, Z., Zhanyi, X., Jin, Q.: Privacy protection for lbs in mobile environments. Int. J. Secur. Appl. 9(1), 249–258 (2015)

    Google Scholar 

  8. Zhu, J., Kim, K.-H., Mohapatra, P., Congdon, P.: An adaptive privacy-preserving scheme for location tracking of a mobile user. In: Proceedings of IEEE SECON (2013)

    Google Scholar 

  9. Corser, G., Huirong, F., Shu, T., D’Errico, P., Ma, W.-J.: Endpoint protection zone (EPZ): protecting LBS user location privacy against deanonymization and collusion in vehicular networks. In: Proceedings of IEEE ICCVE (2013)

    Google Scholar 

  10. Gkoulalas-Divanis, A., Stephenson, M.: Method and system for anonymization in continuous location-based services. US Patent 9,135,452, September 15 2015

    Google Scholar 

  11. Song, D., Sim, J., Park, K., Song, M.: A privacy-preserving continuous location monitoring system for location-based services. Int. J. Distrib. Sens. Netw. 2015, 14 (2015)

    Google Scholar 

  12. Montazeri, Z., Houmansadr, A., Pishro-Nik, H.: Defining perfect location privacy using anonymization. In: Proceedings of IEEE CISS (2016)

    Google Scholar 

  13. Feldman, D., Sugaya, A., Sung, C., Rus, D.: iDiary: from GPS signals to a text-searchable diary. In: Proceedings of ACM SenSys (2013)

    Google Scholar 

  14. Zhang, Y., Tan, C.C., Xu, F., Han, H., Li, Q.: Vproof: lightweight privacy-preserving vehicle location proofs. IEEE Trans. Veh. Technol. 64(1), 378–385 (2015)

    Article  Google Scholar 

  15. Rongxing, L., Li, X., Luan, T.H., Liang, X., Shen, X.: Pseudonym changing at social spots: an effective strategy for location privacy in vanets. IEEE Trans. Veh. Technol. 61(1), 86–96 (2012)

    Article  Google Scholar 

  16. Rongxing, L., Lin, X., Liang, X., Shen, X.: A dynamic privacy-preserving key management scheme for location-based services in vanets. IEEE Trans. Intell. Transp. Syst. 13(1), 127–139 (2012)

    Article  Google Scholar 

  17. Forster, D., Lohr, H., Kargl, F.: Decentralized enforcement of k-anonymity for location privacy using secret sharing. In: Proceedings of IEEE VNC (2015)

    Google Scholar 

  18. Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertainty Fuzziness Knowl.-Based Syst. 10(05), 557–570 (2002)

    Article  MathSciNet  MATH  Google Scholar 

  19. Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of ACM MobiSys (2003)

    Google Scholar 

  20. Beresford, A.R., Stajano, F.: Mix zones: user privacy in location-aware services. In: Proceedings of IEEE PerCom (2004)

    Google Scholar 

  21. Gedik, B., Liu, L.: Location privacy in mobile systems: a personalized anonymization model. In: Proceedings of IEEE ICDCS (2005)

    Google Scholar 

  22. Rebollo-Monedero, D., Forné, J., Pallarès, E., Parra-Arnau, J.: A modification of the lloyd algorithm for k-anonymous quantization. Inf. Sci. 222, 185–202 (2013)

    Article  MathSciNet  MATH  Google Scholar 

  23. Qiu, F., Fan, W., Chen, G.: Slicer: a slicing-based k-anonymous privacy preserving scheme for participatory sensing. In: Proceedings of IEEE MAAS (2013)

    Google Scholar 

  24. Stokes, K., Farràs, O.: Linear spaces and transversal designs: k-anonymous combinatorial configurations for anonymous database search notes. Des. Codes Crypt. 71(3), 503–524 (2014)

    Article  MathSciNet  MATH  Google Scholar 

  25. de Montjoye, Y.-A., Radaelli, L., Singh, V.K., et al.: Unique in the shopping mall: on the reidentifiability of credit card metadata. Science 347(6221), 536–539 (2015)

    Article  Google Scholar 

  26. de Montjoye, Y.-A., Hidalgo, C.A., Verleysen, M., Blondel, V.D.: Unique in the crowd: the privacy bounds of human mobility. Sci. Rep. 3 (2013)

    Google Scholar 

  27. Google Maps. https://www.google.com/maps

Download references

Acknowledgements

The research of authors is partially supported by the National Natural Science Foundation of China (NSFC) under Grants 61571331, the Integrated Project for Major Research Plan of the National Natural Science Foundation of China under Grant 91218301, Fok Ying-Tong Education Foundation for Young Teachers in the Higher Education Institutions of China under Grant 151066, “Shuguang Program” from Shanghai Education Development Foundation under Grant 14SG20, the Shanghai Science and Technology Innovation Action Plan Project under Grant 16511100901, and the Shanghai Innovation Action Project under Grant 16DZ1100200. We thank all anonymous reviewers for their insightful comments.

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Cheng Wang or Changjun Jiang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Xiao, Z., Wang, C., Han, W., Jiang, C. (2017). Unique on the Road: Re-identification of Vehicular Location-Based Metadata. In: Deng, R., Weng, J., Ren, K., Yegneswaran, V. (eds) Security and Privacy in Communication Networks. SecureComm 2016. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 198. Springer, Cham. https://doi.org/10.1007/978-3-319-59608-2_28

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-59608-2_28

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-59607-5

  • Online ISBN: 978-3-319-59608-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics