skip to main content
10.1145/3356994.3365501acmconferencesArticle/Chapter ViewAbstractPublication PagesgisConference Proceedingsconference-collections
research-article

Bokeh: obfuscating physical infrastructure maps

Published:05 November 2019Publication History

ABSTRACT

Physical infrastructures that facilitate e.g., delivery of power, water and communication capabilities are of intrinsic importance in our daily lives. Accurate maps of physical infrastructures are important for permitting, maintenance, repair and growth but can be considered a commercial and/or security risk. In this paper, we describe a method for obfuscating physical infrastructure maps that removes sensitive details while preserving key features that are important in commercial and research applications. We employ a three-tiered approach: tier 1 does simple location fuzzing, tier 2 maintains connectivity details but randomizes node/link locations, while at tier 3 only distributional properties of a network are preserved. We implement our tiered approach in a tool called Bokeh which operates on GIS shapefiles that include detailed location information of infrastructure and produces obfuscated maps. We describe a case study that applies Bokeh to a number of Internet Service Provider maps. The case study highlights how each tier removes increasing amounts of detail from maps. We discuss how Bokeh can be generally applied to other physical infrastructures or in local services that are increasingly used for e-marketing.

References

  1. [n.d.]. More Insights On Alleged DDoS Attack Against Liberia Using Mirai Botnet. https://thehackernews.com/2016/11/ddos-attack-mirailiberia.html.Google ScholarGoogle Scholar
  2. Charu C Aggarwal, Yao Li, and S Yu Philip. 2011. On the hardness of graph anonymization. In Data Mining (ICDM). IEEE.Google ScholarGoogle Scholar
  3. Hidaytet Aksu, Demet Aksoy, and Ibrahim Korpeogluy. 2013. A Study of Localization Metrics: Evaluation of Position Errors in Wireless Sensor Networks. Computer Networks 55, 15 (2013).Google ScholarGoogle Scholar
  4. Lars Backstrom, Cynthia Dwork, and Jon Kleinberg. 2007. Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography. In Proceedings of the 16th international conference on World Wide Web. ACM.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Smriti Bhagat, Graham Cormode, Balachander Krishnamurthy, and Divesh Srivastava. 2009. Class-based graph anonymization for social network data. Proceedings of the VLDB Endowment 2, 1 (2009).Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Alireza Bigdeli, Ali Tizghadam, and Alberto Leon-Garcia. 2009. Comparison of Network Criticality, Algebraic Connectivity, and other Graph Metrics. In Proceedings of the 1st Annual Workshop on Simplifying Complex Network for Practitioners. ACM.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Ilker Nadi Bozkurt, Anthony Aguirre, Balakrishnan Chandrasekaran, P. Brighten Godfrey, Gregory Laughlin, Bruce Maggs, and Ankit Singla. 2017. Why Is the Internet so Slow?!. In Proceedings of the Passive and Active Measurement Conference.Google ScholarGoogle ScholarCross RefCross Ref
  8. CAIDA. 2018. Archipelago (Ark) Measurement Infrastructure. http://www.caida.org/projects/ark/.Google ScholarGoogle Scholar
  9. Jordi Casas-Roma, Jordi Herrera-Joancomartí, and Vicenç; Torra. 2013. Evolutionary algorithm for graph anonymization. arXiv preprint arXiv:1310.0229 (2013).Google ScholarGoogle Scholar
  10. Joseph Chabarek, Joel Sommers, Paul Barford, Cristian Estan, David Tsiang, and Steve Wright. 2008. Power awareness in network design and routing. In INFOCOM. The 27th Conference on Computer Communications. IEEE.Google ScholarGoogle ScholarCross RefCross Ref
  11. James Cheng, Ada Wai-chee Fu, and Jia Liu. 2010. K-isomorphism: privacy preserving network publication against structural attacks. In Proceedings of the ACM SIGMOD International Conference on Management of data. ACM.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Jonathan Chew. 2015. Somebody is Cutting Internet Cables, Causing Massive Outages. Fortune Magazine (2015).Google ScholarGoogle Scholar
  13. Scott Coull, Charles Wright, Fabian Monrose, Michael Collins, and Michael Reiter. 2007. Playing DevilÃŢs Advocate: Inferring Sensitive Information from Anonymized Network Traces. In Proceedings of Network and Distributed System Security Symposium (NDSS). Internet Society.Google ScholarGoogle Scholar
  14. Ramakrishnan Durairajan and Paul Barford. 2017. A Techno-Economic Framework for Broadband Deployment in Underserved Areas. ACM SIGCOMM Computer Communication Review 47, 2 (2017).Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Ramakrishnan Durairajan, Paul Barford, Joel Sommers, and Walter Willinger. 2015. InterTubes: A study of the US long-haul fiber-optic infrastructure. In ACM SIGCOMM Computer Communication Review, Vol. 45. ACM.Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Ramakrishnan Durairajan, Subhadip Ghosh, Xin Tang, Paul Barford, and Brian Eriksson. 2013. Internet Atlas: a Geographic Database of the Internet. In Proceedings of the 5th ACM workshop on HotPlanet. ACM.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. E. Blanton. 2018. Tcpurify. http://brewformulas.org/Tcpurify.Google ScholarGoogle Scholar
  18. E.Kohler. 2018. IPSUMDUMP. http://read.seas.harvard.edu/~kohler/ipsumdump/.Google ScholarGoogle Scholar
  19. Brian Eriksson and Mark Crovella. 2013. Understanding geolocation accuracy using network geometry. In INFOCOM. IEEE.Google ScholarGoogle Scholar
  20. ESRI. 2018. ESRI ArcGIS Shapefiles. https://doc.arcgis.com/en/arcgis-online/reference/shapefiles.htm.Google ScholarGoogle Scholar
  21. F. Gringoli. 2018. tcpanon. http://netweb.ing.unibs.it/~ntw/tools/tcpanon/.Google ScholarGoogle Scholar
  22. Michalis Faloutsos, Petros Faloutsos, and Christos Faloutsos. 1999. On power-law relationships of the internet topology. In ACM SIGCOMM computer communication review, Vol. 29. ACM.Google ScholarGoogle Scholar
  23. K. Fawaz and K. Shin. 2014. Location Privacy Protection for Smartphone Users. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. ACM.Google ScholarGoogle Scholar
  24. G. Minshall. 2018. TCPDPRIV. http://ita.ee.lbl.gov/html/contrib/tcpdpriv.html.Google ScholarGoogle Scholar
  25. Manaf Gharaibeh, Anant Shah, Bradley Huffaker, Han Zhang, Roya Ensafi, and Christos Papadopoulos. 2017. A Look at Router Geolocation in Public and Commercial Databases. In Proceedings of the ACM Internet Measurement Conference. ACM.Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. S. Guha, M. Jain, and V. Padmanabhan. 2012. Koi: a location-privacy platform for smartphone apps. In Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation. ACM.Google ScholarGoogle Scholar
  27. John W Hager, James F Behensky, and Brad W Drew. 1989. The Universal Grids: Universal Transverse Mercator (UTM) and Universal Polar Stereographic (UPS). Edition 1. Technical Report. DEFENSE MAPPING AGENCY HYDROGRAPHIC/TOPOGRAPHIC CENTER WASHINGTON DC.Google ScholarGoogle Scholar
  28. ASM Hasan, Qiang Qu, Chengming Li, Lifei Chen, and Qingshan Jiang. 2018. An Effective Privacy Architecture to Preserve User Trajectories in Reward-Based LBS Applications. ISPRS International Journal of Geo-Information 7, 2 (2018).Google ScholarGoogle ScholarCross RefCross Ref
  29. Michael Hay, Gerome Miklau, David Jensen, Don Towsley, and Philipp Weis. 2008. Resisting structural re-identification in anonymized social networks. Proceedings of the VLDB Endowment 1, 1 (2008).Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Brandon Heller, Rob Sherwood, and Nick McKeown. 2012. The Controller Placement Problem. In Proceedings of the First Workshop on Hot Topics in Software Defined Networks. ACM.Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Alex Hern. 2018. Fitness Tracking App Strava Gives Away Locations of Secret US Army Bases. The Guardian (2018).Google ScholarGoogle Scholar
  32. Internet2. 2014. Network Flow Data Privacy Policy. https://www.internet2.edu/policies/network-flow-data-privacy-policy/.Google ScholarGoogle Scholar
  33. Shouling Ji, Weiqing Li, Prateek Mittal, Xin Hu, and Raheem A Beyah. 2015. SecGraph: A Uniform and Open-source Evaluation System for Graph Data Anonymization and De-anonymization.. In USENIX Security Symposium.Google ScholarGoogle Scholar
  34. Shouling Ji, Weiqing Li, Mudhakar Srivatsa, and Raheem Beyah. 2014. Structural data de-anonymization: Quantification, practice, and implications. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security. ACM.Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Simon Knight, Hung X Nguyen, Nick Falkner, Rhys Bowden, and Matthew Roughan. 2011. The Internet Topology Zoo. IEEE Journal on Selected Areas in Communications 29, 9 (2011).Google ScholarGoogle ScholarCross RefCross Ref
  36. Sumeeet Kumar and Kathleen Carley. 2017. Simulating DDOS attacks on the us fiber-optics internet infrastructure. In Proceedings of the Winter Simulation Conference. IEEE.Google ScholarGoogle Scholar
  37. Lun Li, David Alderson, Walter Willinger, and John Doyle. 2004. A first-principles approach to understanding the Internet's router-level topology. In ACM SIGCOMM Computer Communication Review, Vol. 34. ACM.Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Yidong Li and Hong Shen. 2010. Anonymizing graphs against weight-based attacks. In Data Mining Workshops (ICDMW). IEEE.Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Kun Liu and Evimaria Terzi. 2008. Towards identity anonymization on graphs. In Proceedings of the ACM SIGMOD international conference on Management of data. ACM.Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. Xuesong Lu, Yi Song, and Stéphane Bressan. 2012. Fast identity anonymization on graphs. In International Conference on Database and Expert Systems Applications. Springer.Google ScholarGoogle ScholarCross RefCross Ref
  41. Matthew Luckie, Amogh Dhamdhere, Bradley Huffaker, David Clark, et al. 2016. Bdrmap: Inference of borders between IP networks. In Proceedings of the 2016 Internet Measurement Conference. ACM.Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. Harsha V Madhyastha, Tomas Isdal, Michael Piatek, Colin Dixon, Thomas Anderson, Arvind Krishnamurthy, and Arun Venkataramani. 2006. iPlane: An information plane for distributed services. In Proceedings of the 7th symposium on Operating systems design and implementation. USENIX Association.Google ScholarGoogle Scholar
  43. Priya Mahadevan, Calvin Hubble, Dmitri Krioukov, Bradley Huffaker, and Amin Vahdat. 2007. Orbis: rescaling degree correlations to generate annotated Internet topologies. In ACM SIGCOMM Computer Communication Review, Vol. 37. ACM.Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. Alberto Medina, Anukool Lakhina, Ibrahim Matta, and John Byers. 2001. BRITE: An approach to universal topology generation. In Modeling, Analysis and Simulation of Computer and Telecommunication Systems, 2001. Proceedings. Ninth International Symposium on. IEEE.Google ScholarGoogle ScholarCross RefCross Ref
  45. Roland Meier, Petar Tsankov, Vincent Lenders, Laurent Vanbever, and Martin Vechev. 2018. NetHide: secure and practical network topology obfuscation. In Proceedings of the 27th USENIX Security Symposium. 693--709.Google ScholarGoogle Scholar
  46. Arvind Narayanan and Vitaly Shmatikov. 2009. De-anonymizing social networks. In Security and Privacy. IEEE.Google ScholarGoogle Scholar
  47. Hiep H Nguyen, Abdessamad Imine, and Michael Rusinowitch. 2014. A maximum variance approach for graph anonymization. In International Symposium on Foundations and Practice of Security. Springer.Google ScholarGoogle Scholar
  48. P. Mahadevan. 2018. Analyzing and Generating Network Topologies with Orbis. http://www.sysnet.ucsd.edu/~pmahadevan/topo_research/topo.html.Google ScholarGoogle Scholar
  49. Ruoming Pang, Mark Allman, Vern Paxson, and Jason Lee. 2006. The devil and packet trace anonymization. ACM SIGCOMM Computer Communication Review 36, 1 (2006).Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. Ruoming Pang and Vern Paxson. 2003. A high-level programming environment for packet trace anonymization and transformation. In Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communications. ACM.Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. PROJ contributors. 2018. PROJ coordinate transformation software library. Open Source Geospatial Foundation. http://proj4.org/Google ScholarGoogle Scholar
  52. R. Kulkarni. 2018. A Dissertation So Good It Might Be Classified. https://www.wired.com/2004/01/a-dissertation-so-good-it-might-be-classified/.Google ScholarGoogle Scholar
  53. Pierangela Samarati and Latanya Sweeney. 1998. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. Technical Report. Technical report, SRI International.Google ScholarGoogle Scholar
  54. Yuval Shavitt and Eran Shir. 2005. DIMES: Let the Internet measure itself. ACM SIGCOMM Computer Communication Review 35, 5 (2005).Google ScholarGoogle ScholarDigital LibraryDigital Library
  55. Neil Spring, Ratul Mahajan, David Wetherall, and Thomas Anderson. 2004. Measuring ISP topologies with Rocketfuel. IEEE/ACM Transactions on Networking (ToN) 12, 1 (2004).Google ScholarGoogle ScholarDigital LibraryDigital Library
  56. Volker Stocker, Georgios Smaragdakis, William Lehr, and Steven Bauer. 2016. Content may be King, but (Peering) Location matters: A Progress Report on the Evolution of Content Delivery in the Internet. In Proceedings of the 27th European Regional Conference. International Telecommunications Society (ITS).Google ScholarGoogle Scholar
  57. Henry Stommel. 2017. Lost islands: The story of islands that have vanished from nautical charts. Courier Dover Publications.Google ScholarGoogle Scholar
  58. Hongsuda Tangmunarunkit, Ramesh Govindan, Sugih Jamin, Scott Shenker, and Walter Willinger. 2002. Network topology generators: Degree-based vs. structural. In ACM SIGCOMM Computer Communication Review, Vol. 32. ACM.Google ScholarGoogle ScholarDigital LibraryDigital Library
  59. BK Tripathy and GK Panda. 2010. A new approach to manage security against neighborhood attacks in social networks. In Advances in Social Networks Analysis and Mining (ASONAM). IEEE.Google ScholarGoogle Scholar
  60. Bernard M Waxman. 1988. Routing of multipoint connections. IEEE journal on selected areas in communications 6, 9 (1988).Google ScholarGoogle Scholar
  61. Wentao Wu, Yanghua Xiao, Wei Wang, Zhenying He, and Zhihui Wang. 2010. K-symmetry model for identity anonymization in social networks. In Proceedings of the 13th international conference on extending database technology. ACM.Google ScholarGoogle ScholarDigital LibraryDigital Library
  62. Jun Xu, Jinliang Fan, Mostafa Ammar, and Sue B Moon. 2001. On the design and performance of prefix-preserving IP traffic trace anonymization. In Proceedings of the 1st ACM SIGCOMM Workshop on Internet Measurement. ACM.Google ScholarGoogle ScholarDigital LibraryDigital Library
  63. Jun Xu, Jinliang Fan, Mostafa H Ammar, and Sue B Moon. 2002. Prefix-preserving ip address anonymization: Measurement-based security evaluation and a new cryptography-based scheme. In Network Protocols. IEEE.Google ScholarGoogle Scholar
  64. Bin Zhou and Jian Pei. 2008. Preserving privacy in social networks against neighborhood attacks. In Data Engineering. ICDE. IEEE.Google ScholarGoogle Scholar
  65. Lei Zou, Lei Chen, and M Tamer Özsu. 2009. K-automorphism: A general framework for privacy preserving network publication. Proceedings of the VLDB Endowment 2, 1 (2009).Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Bokeh: obfuscating physical infrastructure maps

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      LocalRec '19: Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Location-based Recommendations, Geosocial Networks and Geoadvertising
      November 2019
      92 pages
      ISBN:9781450369633
      DOI:10.1145/3356994

      Copyright © 2019 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 5 November 2019

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      LocalRec '19 Paper Acceptance Rate6of12submissions,50%Overall Acceptance Rate17of26submissions,65%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader