ABSTRACT
Physical infrastructures that facilitate e.g., delivery of power, water and communication capabilities are of intrinsic importance in our daily lives. Accurate maps of physical infrastructures are important for permitting, maintenance, repair and growth but can be considered a commercial and/or security risk. In this paper, we describe a method for obfuscating physical infrastructure maps that removes sensitive details while preserving key features that are important in commercial and research applications. We employ a three-tiered approach: tier 1 does simple location fuzzing, tier 2 maintains connectivity details but randomizes node/link locations, while at tier 3 only distributional properties of a network are preserved. We implement our tiered approach in a tool called Bokeh which operates on GIS shapefiles that include detailed location information of infrastructure and produces obfuscated maps. We describe a case study that applies Bokeh to a number of Internet Service Provider maps. The case study highlights how each tier removes increasing amounts of detail from maps. We discuss how Bokeh can be generally applied to other physical infrastructures or in local services that are increasingly used for e-marketing.
- [n.d.]. More Insights On Alleged DDoS Attack Against Liberia Using Mirai Botnet. https://thehackernews.com/2016/11/ddos-attack-mirailiberia.html.Google Scholar
- Charu C Aggarwal, Yao Li, and S Yu Philip. 2011. On the hardness of graph anonymization. In Data Mining (ICDM). IEEE.Google Scholar
- Hidaytet Aksu, Demet Aksoy, and Ibrahim Korpeogluy. 2013. A Study of Localization Metrics: Evaluation of Position Errors in Wireless Sensor Networks. Computer Networks 55, 15 (2013).Google Scholar
- Lars Backstrom, Cynthia Dwork, and Jon Kleinberg. 2007. Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography. In Proceedings of the 16th international conference on World Wide Web. ACM.Google ScholarDigital Library
- Smriti Bhagat, Graham Cormode, Balachander Krishnamurthy, and Divesh Srivastava. 2009. Class-based graph anonymization for social network data. Proceedings of the VLDB Endowment 2, 1 (2009).Google ScholarDigital Library
- Alireza Bigdeli, Ali Tizghadam, and Alberto Leon-Garcia. 2009. Comparison of Network Criticality, Algebraic Connectivity, and other Graph Metrics. In Proceedings of the 1st Annual Workshop on Simplifying Complex Network for Practitioners. ACM.Google ScholarDigital Library
- Ilker Nadi Bozkurt, Anthony Aguirre, Balakrishnan Chandrasekaran, P. Brighten Godfrey, Gregory Laughlin, Bruce Maggs, and Ankit Singla. 2017. Why Is the Internet so Slow?!. In Proceedings of the Passive and Active Measurement Conference.Google ScholarCross Ref
- CAIDA. 2018. Archipelago (Ark) Measurement Infrastructure. http://www.caida.org/projects/ark/.Google Scholar
- Jordi Casas-Roma, Jordi Herrera-Joancomartí, and Vicenç; Torra. 2013. Evolutionary algorithm for graph anonymization. arXiv preprint arXiv:1310.0229 (2013).Google Scholar
- Joseph Chabarek, Joel Sommers, Paul Barford, Cristian Estan, David Tsiang, and Steve Wright. 2008. Power awareness in network design and routing. In INFOCOM. The 27th Conference on Computer Communications. IEEE.Google ScholarCross Ref
- James Cheng, Ada Wai-chee Fu, and Jia Liu. 2010. K-isomorphism: privacy preserving network publication against structural attacks. In Proceedings of the ACM SIGMOD International Conference on Management of data. ACM.Google ScholarDigital Library
- Jonathan Chew. 2015. Somebody is Cutting Internet Cables, Causing Massive Outages. Fortune Magazine (2015).Google Scholar
- Scott Coull, Charles Wright, Fabian Monrose, Michael Collins, and Michael Reiter. 2007. Playing DevilÃŢs Advocate: Inferring Sensitive Information from Anonymized Network Traces. In Proceedings of Network and Distributed System Security Symposium (NDSS). Internet Society.Google Scholar
- Ramakrishnan Durairajan and Paul Barford. 2017. A Techno-Economic Framework for Broadband Deployment in Underserved Areas. ACM SIGCOMM Computer Communication Review 47, 2 (2017).Google ScholarDigital Library
- Ramakrishnan Durairajan, Paul Barford, Joel Sommers, and Walter Willinger. 2015. InterTubes: A study of the US long-haul fiber-optic infrastructure. In ACM SIGCOMM Computer Communication Review, Vol. 45. ACM.Google ScholarDigital Library
- Ramakrishnan Durairajan, Subhadip Ghosh, Xin Tang, Paul Barford, and Brian Eriksson. 2013. Internet Atlas: a Geographic Database of the Internet. In Proceedings of the 5th ACM workshop on HotPlanet. ACM.Google ScholarDigital Library
- E. Blanton. 2018. Tcpurify. http://brewformulas.org/Tcpurify.Google Scholar
- E.Kohler. 2018. IPSUMDUMP. http://read.seas.harvard.edu/~kohler/ipsumdump/.Google Scholar
- Brian Eriksson and Mark Crovella. 2013. Understanding geolocation accuracy using network geometry. In INFOCOM. IEEE.Google Scholar
- ESRI. 2018. ESRI ArcGIS Shapefiles. https://doc.arcgis.com/en/arcgis-online/reference/shapefiles.htm.Google Scholar
- F. Gringoli. 2018. tcpanon. http://netweb.ing.unibs.it/~ntw/tools/tcpanon/.Google Scholar
- Michalis Faloutsos, Petros Faloutsos, and Christos Faloutsos. 1999. On power-law relationships of the internet topology. In ACM SIGCOMM computer communication review, Vol. 29. ACM.Google Scholar
- K. Fawaz and K. Shin. 2014. Location Privacy Protection for Smartphone Users. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. ACM.Google Scholar
- G. Minshall. 2018. TCPDPRIV. http://ita.ee.lbl.gov/html/contrib/tcpdpriv.html.Google Scholar
- Manaf Gharaibeh, Anant Shah, Bradley Huffaker, Han Zhang, Roya Ensafi, and Christos Papadopoulos. 2017. A Look at Router Geolocation in Public and Commercial Databases. In Proceedings of the ACM Internet Measurement Conference. ACM.Google ScholarDigital Library
- S. Guha, M. Jain, and V. Padmanabhan. 2012. Koi: a location-privacy platform for smartphone apps. In Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation. ACM.Google Scholar
- John W Hager, James F Behensky, and Brad W Drew. 1989. The Universal Grids: Universal Transverse Mercator (UTM) and Universal Polar Stereographic (UPS). Edition 1. Technical Report. DEFENSE MAPPING AGENCY HYDROGRAPHIC/TOPOGRAPHIC CENTER WASHINGTON DC.Google Scholar
- ASM Hasan, Qiang Qu, Chengming Li, Lifei Chen, and Qingshan Jiang. 2018. An Effective Privacy Architecture to Preserve User Trajectories in Reward-Based LBS Applications. ISPRS International Journal of Geo-Information 7, 2 (2018).Google ScholarCross Ref
- Michael Hay, Gerome Miklau, David Jensen, Don Towsley, and Philipp Weis. 2008. Resisting structural re-identification in anonymized social networks. Proceedings of the VLDB Endowment 1, 1 (2008).Google ScholarDigital Library
- Brandon Heller, Rob Sherwood, and Nick McKeown. 2012. The Controller Placement Problem. In Proceedings of the First Workshop on Hot Topics in Software Defined Networks. ACM.Google ScholarDigital Library
- Alex Hern. 2018. Fitness Tracking App Strava Gives Away Locations of Secret US Army Bases. The Guardian (2018).Google Scholar
- Internet2. 2014. Network Flow Data Privacy Policy. https://www.internet2.edu/policies/network-flow-data-privacy-policy/.Google Scholar
- Shouling Ji, Weiqing Li, Prateek Mittal, Xin Hu, and Raheem A Beyah. 2015. SecGraph: A Uniform and Open-source Evaluation System for Graph Data Anonymization and De-anonymization.. In USENIX Security Symposium.Google Scholar
- Shouling Ji, Weiqing Li, Mudhakar Srivatsa, and Raheem Beyah. 2014. Structural data de-anonymization: Quantification, practice, and implications. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security. ACM.Google ScholarDigital Library
- Simon Knight, Hung X Nguyen, Nick Falkner, Rhys Bowden, and Matthew Roughan. 2011. The Internet Topology Zoo. IEEE Journal on Selected Areas in Communications 29, 9 (2011).Google ScholarCross Ref
- Sumeeet Kumar and Kathleen Carley. 2017. Simulating DDOS attacks on the us fiber-optics internet infrastructure. In Proceedings of the Winter Simulation Conference. IEEE.Google Scholar
- Lun Li, David Alderson, Walter Willinger, and John Doyle. 2004. A first-principles approach to understanding the Internet's router-level topology. In ACM SIGCOMM Computer Communication Review, Vol. 34. ACM.Google ScholarDigital Library
- Yidong Li and Hong Shen. 2010. Anonymizing graphs against weight-based attacks. In Data Mining Workshops (ICDMW). IEEE.Google ScholarDigital Library
- Kun Liu and Evimaria Terzi. 2008. Towards identity anonymization on graphs. In Proceedings of the ACM SIGMOD international conference on Management of data. ACM.Google ScholarDigital Library
- Xuesong Lu, Yi Song, and Stéphane Bressan. 2012. Fast identity anonymization on graphs. In International Conference on Database and Expert Systems Applications. Springer.Google ScholarCross Ref
- Matthew Luckie, Amogh Dhamdhere, Bradley Huffaker, David Clark, et al. 2016. Bdrmap: Inference of borders between IP networks. In Proceedings of the 2016 Internet Measurement Conference. ACM.Google ScholarDigital Library
- Harsha V Madhyastha, Tomas Isdal, Michael Piatek, Colin Dixon, Thomas Anderson, Arvind Krishnamurthy, and Arun Venkataramani. 2006. iPlane: An information plane for distributed services. In Proceedings of the 7th symposium on Operating systems design and implementation. USENIX Association.Google Scholar
- Priya Mahadevan, Calvin Hubble, Dmitri Krioukov, Bradley Huffaker, and Amin Vahdat. 2007. Orbis: rescaling degree correlations to generate annotated Internet topologies. In ACM SIGCOMM Computer Communication Review, Vol. 37. ACM.Google ScholarDigital Library
- Alberto Medina, Anukool Lakhina, Ibrahim Matta, and John Byers. 2001. BRITE: An approach to universal topology generation. In Modeling, Analysis and Simulation of Computer and Telecommunication Systems, 2001. Proceedings. Ninth International Symposium on. IEEE.Google ScholarCross Ref
- Roland Meier, Petar Tsankov, Vincent Lenders, Laurent Vanbever, and Martin Vechev. 2018. NetHide: secure and practical network topology obfuscation. In Proceedings of the 27th USENIX Security Symposium. 693--709.Google Scholar
- Arvind Narayanan and Vitaly Shmatikov. 2009. De-anonymizing social networks. In Security and Privacy. IEEE.Google Scholar
- Hiep H Nguyen, Abdessamad Imine, and Michael Rusinowitch. 2014. A maximum variance approach for graph anonymization. In International Symposium on Foundations and Practice of Security. Springer.Google Scholar
- P. Mahadevan. 2018. Analyzing and Generating Network Topologies with Orbis. http://www.sysnet.ucsd.edu/~pmahadevan/topo_research/topo.html.Google Scholar
- Ruoming Pang, Mark Allman, Vern Paxson, and Jason Lee. 2006. The devil and packet trace anonymization. ACM SIGCOMM Computer Communication Review 36, 1 (2006).Google ScholarDigital Library
- Ruoming Pang and Vern Paxson. 2003. A high-level programming environment for packet trace anonymization and transformation. In Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communications. ACM.Google ScholarDigital Library
- PROJ contributors. 2018. PROJ coordinate transformation software library. Open Source Geospatial Foundation. http://proj4.org/Google Scholar
- R. Kulkarni. 2018. A Dissertation So Good It Might Be Classified. https://www.wired.com/2004/01/a-dissertation-so-good-it-might-be-classified/.Google Scholar
- Pierangela Samarati and Latanya Sweeney. 1998. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. Technical Report. Technical report, SRI International.Google Scholar
- Yuval Shavitt and Eran Shir. 2005. DIMES: Let the Internet measure itself. ACM SIGCOMM Computer Communication Review 35, 5 (2005).Google ScholarDigital Library
- Neil Spring, Ratul Mahajan, David Wetherall, and Thomas Anderson. 2004. Measuring ISP topologies with Rocketfuel. IEEE/ACM Transactions on Networking (ToN) 12, 1 (2004).Google ScholarDigital Library
- Volker Stocker, Georgios Smaragdakis, William Lehr, and Steven Bauer. 2016. Content may be King, but (Peering) Location matters: A Progress Report on the Evolution of Content Delivery in the Internet. In Proceedings of the 27th European Regional Conference. International Telecommunications Society (ITS).Google Scholar
- Henry Stommel. 2017. Lost islands: The story of islands that have vanished from nautical charts. Courier Dover Publications.Google Scholar
- Hongsuda Tangmunarunkit, Ramesh Govindan, Sugih Jamin, Scott Shenker, and Walter Willinger. 2002. Network topology generators: Degree-based vs. structural. In ACM SIGCOMM Computer Communication Review, Vol. 32. ACM.Google ScholarDigital Library
- BK Tripathy and GK Panda. 2010. A new approach to manage security against neighborhood attacks in social networks. In Advances in Social Networks Analysis and Mining (ASONAM). IEEE.Google Scholar
- Bernard M Waxman. 1988. Routing of multipoint connections. IEEE journal on selected areas in communications 6, 9 (1988).Google Scholar
- Wentao Wu, Yanghua Xiao, Wei Wang, Zhenying He, and Zhihui Wang. 2010. K-symmetry model for identity anonymization in social networks. In Proceedings of the 13th international conference on extending database technology. ACM.Google ScholarDigital Library
- Jun Xu, Jinliang Fan, Mostafa Ammar, and Sue B Moon. 2001. On the design and performance of prefix-preserving IP traffic trace anonymization. In Proceedings of the 1st ACM SIGCOMM Workshop on Internet Measurement. ACM.Google ScholarDigital Library
- Jun Xu, Jinliang Fan, Mostafa H Ammar, and Sue B Moon. 2002. Prefix-preserving ip address anonymization: Measurement-based security evaluation and a new cryptography-based scheme. In Network Protocols. IEEE.Google Scholar
- Bin Zhou and Jian Pei. 2008. Preserving privacy in social networks against neighborhood attacks. In Data Engineering. ICDE. IEEE.Google Scholar
- Lei Zou, Lei Chen, and M Tamer Özsu. 2009. K-automorphism: A general framework for privacy preserving network publication. Proceedings of the VLDB Endowment 2, 1 (2009).Google ScholarDigital Library
Index Terms
- Bokeh: obfuscating physical infrastructure maps
Recommendations
Cinematic Bokeh rendering for real scenes
CVMP '15: Proceedings of the 12th European Conference on Visual Media ProductionIn this work, we present a novel approach for rendering high-quality Bokeh and depth-of-field for real, non-computer graphics scenes by synthesizing a real lens and involving depth. Although this discipline is well-known to methods in computer graphics, ...
Assessing the impact of graphical quality on automatic text recognition in digital maps
Converting geographic features (e.g., place names) in map images into a vector format is the first step for incorporating cartographic information into a geographic information system (GIS). With the advancement in computational power and algorithm ...
A Visual Tool to Help Select Photogenic Locations
IV '15: Proceedings of the 2015 19th International Conference on Information VisualisationA photogenic location is a good place to take photos. It generally has beautiful scenery, historical structures, etc. When amateur photographers plan a photo trip, they often decide beforehand on photogenic locations to visit. They collect information ...
Comments