Tis-Bad: A Time Series-Based Deobfuscation Algorithm
Corresponding Author(s) : Miguel Labrador
Investigación e Innovación en Ingenierías,
Vol. 3 Núm. 1 (2015): Enero - Junio
Resumen
En artículo presenta una definición formal de una técnica desofuscación de algoritmos de ofuscación relacionadas con el ruido llamados TIS-BAD (Time Series - Based Deobfuscation) que implementa un promedio móvil ponderado exponencialmente en los datos ofuscado para filtrar el ruido inducido. En la literatura se han realizado muy pocos esfuerzos para presentar este tipo de técnicas formales de desofuscación, siendo esta es una de las principales contribuciones de este trabajo. Evaluamos el algoritmo TIS-BAD en contra de los algoritmos de ofuscación Rand y N-Rand, incluyendo tanto la ubicación como el tiempo de aleatorización, para las rutas rectas y no rectas. Los resultados muestran que el algoritmo de TIS-BAD puede filtrar de 47% a 60% del ruido inducido por los algoritmos de ofuscación, reduciendo considerablemente la protección de la información de ubicación de los usuarios.
Palabras clave
Descargar cita
Endnote/Zotero/Mendeley (RIS)BibTeX
-
1. A. R Pérez, M. Labrador and P. Wightman. Location-Based Information Systems. CRC Computer and Information Science Series. CRC Press, USA, 2011.
2. European GNSS Agency. Opportunities Abound in Growing Location- Based Services
3. H. Muller T. Rodden, A. Friday and A. Dix. A Lightweight Approach to Managing Privacy in Location-Based Services. Technical Report Equator-02-058. CSTR-07-006, University of Nottingham and Lancaster University and University of Bristol, 2002.
4. M. Gruteser and D. Grunwald. Anonymous usage of location-based services through spatial and temporal cloaking. In Proceedings of MobiSys. LCNC 3468/2005, pages 31–42, 2003.
5. W.G. Aref, C.Y. Chow, M.F. Mokbel and G. Walid. Casper*: Query processing for location services without compromising privacy. ACM Transactions in Database Systems, 34:1–48, December 2009.
6. B. Hoh, H. Xiong M. Gruteser, and A. Alrabady. Preserving privacy in gps traces via uncertainty-aware path cloaking. In Proceedings of the 14th ACM conference on Computer and communications security, pages 161–171, New York, NY, USA, 2007. ACM.
7. C. Bettini D. Riboni, L. Pareschi and S. Jajodia. Preserving anonymity of recurrent location-based queries. In Proceedings of International Symposium on Temporal Representation and Reasoning, pages 62–69, 2009.
8. L. Kulik M. Duckham and A. Birtley. A Formal Model of Obfuscation and Negotiation for Location Privacy. In Proceedings of Pervasive - LCNC 3468/2005, pages 243–251, 2005.
9. R. Agrawal y R. Srikant, Privacy-preserving data mining. ACM Sigmod Record, 29:439-450, 2000.
10. P. Wightman, W. Coronell, D. Jabba, M. Jimeno and M. Labrador. Evaluation of Location Obfuscation Techniques for Privacy in Location Based Information Systems. In Proceedings of IEEE Latincom, pages 1– 6, 2011.
11. C.A. Ardagna, M. Cremonini, S. De Capitani di Vimercati, and P. Samarati. An Obfuscation-Based Approach for Protecting Location Privacy. IEEE Transactions on Dependable and Secure Computing, 8(1):13–27, 2011.
12. A. J. Brush, J. Krumm, and J. Scott. Exploring end user preferences for location obfuscation, location-based services, and the value of location. In Proceedings of the 12th ACM international conference on Ubiquitous computing, pages 95–104, 2010.
13. K. Minami and N. Borisov, Protecting location privacy against inference attacks. In Proceedings of the 9th annual ACM workshop on Privacy in the electronic society, pages 123-126, 2010.
14. R. Shokri, G. Theodorakopoulos, J. Y. Le Boudec, J. P. Hubaux, and E. LCA, Quantifying location privacy. In IEEE Symposium on Security and Privacy (S&P), 2011.
15. S. Drape and I. Voiculescu. Creating transformations for matrix obfuscation. In Jens Palsberg and Zhendong Su, editors, Static Analysis, volume 5673 of Lecture Notes in Computer Science, pages 273–292. Springer Berlin / Heidelberg, 2009.
16. S. Drape and I. Voiculescu. The Use of Matrices in Obfuscation. Technical Report CS-RR-08-12, Oxford University Computing Laboratory, 2009.
17. J. Krumm. Inference Attacks on Location Tracks. In Proceedings of Pervasive, pages 127–143, 2007.
Referencias
2. European GNSS Agency. Opportunities Abound in Growing Location- Based Services
3. H. Muller T. Rodden, A. Friday and A. Dix. A Lightweight Approach to Managing Privacy in Location-Based Services. Technical Report Equator-02-058. CSTR-07-006, University of Nottingham and Lancaster University and University of Bristol, 2002.
4. M. Gruteser and D. Grunwald. Anonymous usage of location-based services through spatial and temporal cloaking. In Proceedings of MobiSys. LCNC 3468/2005, pages 31–42, 2003.
5. W.G. Aref, C.Y. Chow, M.F. Mokbel and G. Walid. Casper*: Query processing for location services without compromising privacy. ACM Transactions in Database Systems, 34:1–48, December 2009.
6. B. Hoh, H. Xiong M. Gruteser, and A. Alrabady. Preserving privacy in gps traces via uncertainty-aware path cloaking. In Proceedings of the 14th ACM conference on Computer and communications security, pages 161–171, New York, NY, USA, 2007. ACM.
7. C. Bettini D. Riboni, L. Pareschi and S. Jajodia. Preserving anonymity of recurrent location-based queries. In Proceedings of International Symposium on Temporal Representation and Reasoning, pages 62–69, 2009.
8. L. Kulik M. Duckham and A. Birtley. A Formal Model of Obfuscation and Negotiation for Location Privacy. In Proceedings of Pervasive - LCNC 3468/2005, pages 243–251, 2005.
9. R. Agrawal y R. Srikant, Privacy-preserving data mining. ACM Sigmod Record, 29:439-450, 2000.
10. P. Wightman, W. Coronell, D. Jabba, M. Jimeno and M. Labrador. Evaluation of Location Obfuscation Techniques for Privacy in Location Based Information Systems. In Proceedings of IEEE Latincom, pages 1– 6, 2011.
11. C.A. Ardagna, M. Cremonini, S. De Capitani di Vimercati, and P. Samarati. An Obfuscation-Based Approach for Protecting Location Privacy. IEEE Transactions on Dependable and Secure Computing, 8(1):13–27, 2011.
12. A. J. Brush, J. Krumm, and J. Scott. Exploring end user preferences for location obfuscation, location-based services, and the value of location. In Proceedings of the 12th ACM international conference on Ubiquitous computing, pages 95–104, 2010.
13. K. Minami and N. Borisov, Protecting location privacy against inference attacks. In Proceedings of the 9th annual ACM workshop on Privacy in the electronic society, pages 123-126, 2010.
14. R. Shokri, G. Theodorakopoulos, J. Y. Le Boudec, J. P. Hubaux, and E. LCA, Quantifying location privacy. In IEEE Symposium on Security and Privacy (S&P), 2011.
15. S. Drape and I. Voiculescu. Creating transformations for matrix obfuscation. In Jens Palsberg and Zhendong Su, editors, Static Analysis, volume 5673 of Lecture Notes in Computer Science, pages 273–292. Springer Berlin / Heidelberg, 2009.
16. S. Drape and I. Voiculescu. The Use of Matrices in Obfuscation. Technical Report CS-RR-08-12, Oxford University Computing Laboratory, 2009.
17. J. Krumm. Inference Attacks on Location Tracks. In Proceedings of Pervasive, pages 127–143, 2007.