Abstract
For digging individuals’ information from anonymous metadata, usually the first step is to identify the entities in metadata and associate them with persons in the real world. If an entity in metadata is uniquely re-identified, its host is possibly confronting a serious privacy disclosure problem. In this paper, we study the privacy issue in VLBS (Vehicular Location-Based Service) by investigating the re-identification problem of vehicular location-based metadata in a VLBS server. We find that the trajectories of vehicles are highly unique after studying 131 millions mobility traces of taxis in Shenzhen and 1.1 billions of taxis in Shanghai. More specifically, with the help of the urban road maps, four spatio-temporal points are sufficient to uniquely identify vehicles, achieving an accuracy of 95.35%. This indicates that there is a high risk of privacy leakage when VLBS applications are widely deployed.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Wang, C., Tang, S., Yang, L., Guo, Y., Li, F., Jiang, C.: Modeling data dissemination in online social networks: a geographical perspective on bounding network traffic load. In: Proceedings of ACM MobiHoc (2014)
Cheng Wang, L., Shao, Z.L., Yang, L., Li, X.-Y., Jiang, C.: Capacity scaling of wireless social networks. IEEE Trans. Parallel Distrib. Syst. 26(7), 1839–1850 (2015)
Theodorakopoulos, G., Shokri, R., Troncoso, C., Hubaux, J.-P., Le Boudec, J.-Y.: Prolonging the hide-and-seek game: optimal trajectory privacy for location-based services. In: Proceedings of ACM WPES (2014)
Hwang, R.-H., Hsueh, Y.-L., Chung, H.-W.: A novel time-obfuscated algorithm for trajectory privacy protection. IEEE Trans. Serv. Comput. 7(2), 126–139 (2014)
Guo, M., Jin, X., Pissinou, N., Zanlongo, S., Carbunar, B., Iyengar, S.S.: In-network trajectory privacy preservation. ACM Comput. Surv. (CSUR) 48(2), 23 (2015)
Shin, K.G., Ju, X., Chen, Z., Chen, X.: Privacy protection for users of location-based services. IEEE Wirel. Commun. 19(1), 30–39 (2012)
Pan, J., Zuo, Z., Zhanyi, X., Jin, Q.: Privacy protection for lbs in mobile environments. Int. J. Secur. Appl. 9(1), 249–258 (2015)
Zhu, J., Kim, K.-H., Mohapatra, P., Congdon, P.: An adaptive privacy-preserving scheme for location tracking of a mobile user. In: Proceedings of IEEE SECON (2013)
Corser, G., Huirong, F., Shu, T., D’Errico, P., Ma, W.-J.: Endpoint protection zone (EPZ): protecting LBS user location privacy against deanonymization and collusion in vehicular networks. In: Proceedings of IEEE ICCVE (2013)
Gkoulalas-Divanis, A., Stephenson, M.: Method and system for anonymization in continuous location-based services. US Patent 9,135,452, September 15 2015
Song, D., Sim, J., Park, K., Song, M.: A privacy-preserving continuous location monitoring system for location-based services. Int. J. Distrib. Sens. Netw. 2015, 14 (2015)
Montazeri, Z., Houmansadr, A., Pishro-Nik, H.: Defining perfect location privacy using anonymization. In: Proceedings of IEEE CISS (2016)
Feldman, D., Sugaya, A., Sung, C., Rus, D.: iDiary: from GPS signals to a text-searchable diary. In: Proceedings of ACM SenSys (2013)
Zhang, Y., Tan, C.C., Xu, F., Han, H., Li, Q.: Vproof: lightweight privacy-preserving vehicle location proofs. IEEE Trans. Veh. Technol. 64(1), 378–385 (2015)
Rongxing, L., Li, X., Luan, T.H., Liang, X., Shen, X.: Pseudonym changing at social spots: an effective strategy for location privacy in vanets. IEEE Trans. Veh. Technol. 61(1), 86–96 (2012)
Rongxing, L., Lin, X., Liang, X., Shen, X.: A dynamic privacy-preserving key management scheme for location-based services in vanets. IEEE Trans. Intell. Transp. Syst. 13(1), 127–139 (2012)
Forster, D., Lohr, H., Kargl, F.: Decentralized enforcement of k-anonymity for location privacy using secret sharing. In: Proceedings of IEEE VNC (2015)
Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertainty Fuzziness Knowl.-Based Syst. 10(05), 557–570 (2002)
Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of ACM MobiSys (2003)
Beresford, A.R., Stajano, F.: Mix zones: user privacy in location-aware services. In: Proceedings of IEEE PerCom (2004)
Gedik, B., Liu, L.: Location privacy in mobile systems: a personalized anonymization model. In: Proceedings of IEEE ICDCS (2005)
Rebollo-Monedero, D., Forné, J., Pallarès, E., Parra-Arnau, J.: A modification of the lloyd algorithm for k-anonymous quantization. Inf. Sci. 222, 185–202 (2013)
Qiu, F., Fan, W., Chen, G.: Slicer: a slicing-based k-anonymous privacy preserving scheme for participatory sensing. In: Proceedings of IEEE MAAS (2013)
Stokes, K., Farràs, O.: Linear spaces and transversal designs: k-anonymous combinatorial configurations for anonymous database search notes. Des. Codes Crypt. 71(3), 503–524 (2014)
de Montjoye, Y.-A., Radaelli, L., Singh, V.K., et al.: Unique in the shopping mall: on the reidentifiability of credit card metadata. Science 347(6221), 536–539 (2015)
de Montjoye, Y.-A., Hidalgo, C.A., Verleysen, M., Blondel, V.D.: Unique in the crowd: the privacy bounds of human mobility. Sci. Rep. 3 (2013)
Google Maps. https://www.google.com/maps
Acknowledgements
The research of authors is partially supported by the National Natural Science Foundation of China (NSFC) under Grants 61571331, the Integrated Project for Major Research Plan of the National Natural Science Foundation of China under Grant 91218301, Fok Ying-Tong Education Foundation for Young Teachers in the Higher Education Institutions of China under Grant 151066, “Shuguang Program” from Shanghai Education Development Foundation under Grant 14SG20, the Shanghai Science and Technology Innovation Action Plan Project under Grant 16511100901, and the Shanghai Innovation Action Project under Grant 16DZ1100200. We thank all anonymous reviewers for their insightful comments.
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Xiao, Z., Wang, C., Han, W., Jiang, C. (2017). Unique on the Road: Re-identification of Vehicular Location-Based Metadata. In: Deng, R., Weng, J., Ren, K., Yegneswaran, V. (eds) Security and Privacy in Communication Networks. SecureComm 2016. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 198. Springer, Cham. https://doi.org/10.1007/978-3-319-59608-2_28
Download citation
DOI: https://doi.org/10.1007/978-3-319-59608-2_28
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-59607-5
Online ISBN: 978-3-319-59608-2
eBook Packages: Computer ScienceComputer Science (R0)