ABSTRACT
In the flowering of ubiquitous computing, networks like the Internet of Things and the Internet of Vehicles have contributed to connecting objects and sharing location services in broad environments like smart cities bringing many benefits to citizens. However, these services yield massive and unrestricted mobility data of citizens that pose privacy concerns, among them recovering the identity of citizens with linking attacks. Although several privacy mechanisms have been proposed to solve anonymization problems, there are few studies about their behavior and analysis of the data quality anonymized by these techniques. In this paper, we introduce the anonymization quality. For this, we propose analyzing the mix-zones metrics Amount of Cars on Mix-zone (ACM), Interval of Arrival Time between Cars on Mix-zones (ITM), and Activation Time of the Mix-zone (ATM) for characterizing and evaluating the impacts of anonymization quality over time and space in mobility data. The results showed that mix-zone metrics reflect anonymization behavior and can measure the anonymization quality over time. This insight can contribute significantly to building privacy proposes based on anonymization more effectively than based only on traffic flow. To our knowledge, this is the first work that uses mix-zones metrics analysis to observe the anonymization behavior in quality terms.
- Alastair R Beresford and Frank Stajano. 2003. Location privacy in pervasive computing. IEEE Pervasive computing 1 (2003), 46--55.Google ScholarDigital Library
- Alastair R Beresford and Frank Stajano. 2004. Mix zones: User privacy in location-aware services. In Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second IEEE Annual Conference on. IEEE, 127--131.Google ScholarCross Ref
- Shan Chang, Chao Li, Hongzi Zhu, Ting Lu, and Qiang Li. 2018. Revealing Privacy Vulnerabilities of Anonymous Trajectories. IEEE TVT (2018).Google ScholarCross Ref
- Zhenyu Chen, Yanyan Fu, Min Zhang, Zhenfeng Zhang, and Hao Li. 2018. A Flexible Mix-Zone Selection Scheme Towards Trajectory Privacy Protection. In 17th IEEE TrustCom. 1180--1186.Google Scholar
- Chi-Yin Chow and Mohamed F Mokbel. 2011. Trajectory privacy in location-based services and data publication. ACM Sigkdd Explorations Newsletter 13, 1 (2011), 19--29.Google ScholarDigital Library
- Ekler P de Mattos, Augusto CSA Domingues, Bruno P Santos, Heitor S Ramos, and Antonio AF Loureiro. 2022. The Impact of Mobility on Location Privacy: A Perspective on Smart Mobility. IEEE Systems Journal (2022).Google Scholar
- Augusto CSA Domingues, Ekler Paulino de Mattos, Fabrício A Silva, Heitor S Ramos, and Antonio AF Loureiro. 2021. Social Mix-zones: Anonymizing Personal Information on Contact Tracing Data. In Proceedings of the 18th ACM Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, & Ubiquitous Networks. 81--88.Google ScholarDigital Library
- F Julien, M Raya, M Felegyhazi, and P Papadimitratos. 2007. Mixzones for location privacy in vehicular networks. In Workshop on Wireless Networking for Intelligent Transportation Systems (WiN-ITS).Google Scholar
- Mohammad Khodaei and Panos Papadimitratos. 2020. Cooperative location privacy in vehicular networks: why simple mix zones are not enough. IEEE Internet of Things Journal 8, 10 (2020), 7985--8004.Google ScholarCross Ref
- Ekler P. Mattos, Augusto C.S.A. Domingues, and Antonio A. F. Loureiro. 2019. Give Me Two Points and I'll Tell You Who You Are. In Proceedings of the IEEE Intelligent Vehicles Symposium (IV'19). IEEE.Google Scholar
- Sara Paiva, Mohd Abdul Ahad, Sherin Zafar, Gautami Tripathi, Aqeel Khalique, and Imran Hussain. 2020. Privacy and security challenges in smart and sustainable mobility. SN Applied Sciences 2 (2020), 1--10.Google ScholarCross Ref
- Balaji Palanisamy and Ling Liu. 2014. Attack-resilient mix-zones over road networks: architecture and algorithms. IEEE TMC 14, 3 (2014), 495--508.Google Scholar
- Luca Pappalardo and Filippo Simini. 2018. Data-driven generation of spatio-temporal routines in human mobility. Data Mining and Knowledge Discovery 32, 3 (2018), 787--829.Google ScholarDigital Library
- Michal Piorkowski, Natasa Sarafijanovic-Djukic, and Matthias Grossglauser. 2009. CRAWDAD dataset epfl/mobility (v. 2009-02--24). Downloaded from https://crawdad.org/epfl/mobility/20090224. https://doi.org/10.15783/C7J010Google ScholarCross Ref
- Nirupama Ravi, C Mani Krishna, and Israel Koren. 2019. Enhancing Vehicular Anonymity in ITS: A New Scheme for Mix Zones and their Placement. IEEE Transactions on Vehicular Technology (2019).Google Scholar
- Alisson Renan Svaigen, Heitor S Ramos, Linnyer B Ruiz, and Antonio AF Loureiro. 2019. Dynamic Temporal Mix-Zone Placement Approach for Location-Based Services Privacy. In 2019 IEEE LATINCOM. 1--6.Google Scholar
- Anna Izabel J Tostes, Fátima de LP Duarte-Figueiredo, Renato Assunção, Juliana Salles, and Antonio AF Loureiro. 2013. From data to knowledge: City-wide traffic flows analysis and prediction using bing maps. In Proceedings of the 2nd ACM SIGKDD international workshop on urban computing. 1--8.Google ScholarDigital Library
- Christian Vaas, Mohammad Khodaei, Panos Papadimitratos, and Ivan Martinovic. 2018. Nowhere to hide? Mix-zones for private pseudonym change using chaff vehicles. In 2018 IEEE Vehicular Networking Conference (VNC). IEEE, 1--8.Google ScholarCross Ref
- Yuye Zhou and Dongmei Zhang. 2019. Double Mix-Zone for Location Privacy in VANET. In 7th Int'l Conf. on Info. Tech.: IoT and Smart City. 322--327.Google Scholar
Index Terms
- Behind the Mix-Zones Scenes: On the Evaluation of the Anonymization Quality
Recommendations
Social Mix-zones: Anonymizing Personal Information on Contact Tracing Data
PE-WASUN '21: Proceedings of the 18th ACM Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, & Ubiquitous NetworksIn many different contexts, the encounter between two or more individuals opens a window in which information can be exchanged. Considering Mobile Ad hoc Networks (MANETs) scenarios, encounters - also called contacts - are used to transfer data between ...
Slicing who slices: Anonymization quality evaluation on deployment, privacy, and utility in mix-zones
AbstractIn the flowering of ubiquitous computing, technologies like the Internet of Things and the Internet of Vehicles have contributed to connecting objects and sharing location services in broad environments like smart cities bringing many benefits to ...
Highlights- Anonymization quality framework to elect mix-zones and their positioning algorithms.
- Evaluation of the framework in terms of coverage, privacy, and utility in mix-zones.
- Utility Analysis of anonymized data with a social metric used ...
Protect your Data and I'll Show Its Utility: A Practical View about Mix-zones Impacts on Mobility Data for Smart City Applications
PE-WASUN '23: Proceedings of the Int'l ACM Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, & Ubiquitous NetworksWhen designing smart cities' building blocks, mobility data plays a fundamental role in applications and services. However, mobility data usually comes with unrestricted location of its corresponding entities (e.g., citizens and vehicles) and poses ...
Comments