Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security 2018
DOI: 10.1145/3243734.3243741
|View full text |Cite
|
Sign up to set email alerts
|

Utility-Aware Synthesis of Differentially Private and Attack-Resilient Location Traces

Abstract: Differentially private location trace synthesis (DPLTS) has recently emerged as a solution to protect mobile users' privacy while enabling the analysis and sharing of their location traces. A key challenge in DPLTS is to best preserve the utility in location trace datasets, which is non-trivial considering the high dimensionality, complexity and heterogeneity of datasets, as well as the diverse types and notions of utility. In this paper, we present OptaTrace: a utility-optimized and targeted approach to DPLTS… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
70
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 78 publications
(70 citation statements)
references
References 59 publications
0
70
0
Order By: Relevance
“…Moreover, the problem with the trusted curator model adopted in these methods is its vulnerability to privacy attacks in which an adversary accesses the data gathered by the data curator before the data obfuscation takes place [34] . Several works ( [82], [83], and [84]) show that a well designed perturbation schema can reduce the regularity and uniqueness of any individual users' trajectory RQ3. Therefore the presented methods are robust against attacks that exploit the user's movement regularity.…”
Section: Sliding Window Methodsmentioning
confidence: 99%
“…Moreover, the problem with the trusted curator model adopted in these methods is its vulnerability to privacy attacks in which an adversary accesses the data gathered by the data curator before the data obfuscation takes place [34] . Several works ( [82], [83], and [84]) show that a well designed perturbation schema can reduce the regularity and uniqueness of any individual users' trajectory RQ3. Therefore the presented methods are robust against attacks that exploit the user's movement regularity.…”
Section: Sliding Window Methodsmentioning
confidence: 99%
“…Allocating unnecessary high privacy budgets to such private operation phases will negatively affect location accuracy because it would steal from those private operation phases that do need high privacy budgets to remain accurate. One way for further optimizing the allocation strategy of privacy budget is to use regression-based learning on e [37]. This is a plan of our future work.…”
Section: Theoremmentioning
confidence: 99%
“…Modeling users' mobile behaviors in the mobile applications is an open issue [15], [21]. Literature [22] proposed a utilityaware synthesis of DP trace, which took the trip's distribution, length and start-end points into consideration in the usability perception. Li et al studied the users' mobilitymodeling issues in the mobile social network [23].…”
Section: A Spatiotemporal Mobility Perceptionmentioning
confidence: 99%