Privacy protection for spatial trajectories against brute-force attacks

buir.advisorAyday, Erman
dc.contributor.authorArslan, Dorukhan
dc.date.accessioned2018-08-29T14:11:10Z
dc.date.available2018-08-29T14:11:10Z
dc.date.copyright2018-08
dc.date.issued2018-08
dc.date.submitted2018-08-28
dc.descriptionCataloged from PDF version of article.en_US
dc.descriptionThesis (M.S.): Bilkent University, Department of Computer Engineering, İhsan Doğramacı Bilkent University, 2018.en_US
dc.descriptionIncludes bibliographical references (leaves 50-54).en_US
dc.description.abstractThe prevalence of Global Positioning System (GPS) equipped mobile devices and wireless communication technologies have resulted in widespread development of location-based services (LBS). As some typical examples of LBS, routing, tracking, local search, social networking, and context advertising can be given. In terms of update frequency of location, LBS are divided into two categories: snapshot and continuous. Snapshot LBS request a user's location only once to control features. Continuous LBS, on the other hand, require a user's location in a dynamically periodic or on-demand manner. In the course of interaction with a continuous LBS application, the user reveals a sequence of location samples, namely, spatial trajectory, to service provider. Trajectory privacy in such services is of great importance, since adversaries may use the spatio-temporal sequential pattern to disclose the user's personally identi able information (PII) with high certainty. In order to prevent this from happening, service providers generally encrypt spatial trajectory data under the user's password, and then store in their databases. However, potential adversaries may decrypt the encrypted database via a brute-force attack. In other words, they try every possible value for a password until success is achieved. Although using high-entropy passwords have caused inconvenience for adversaries, the encryption schemes of service providers are vulnerable to this type of an attack due to the tendency of users to choose weak passwords. Also, if the rapid evaluation of computing technology and algorithmic advances are taken into consideration, even the use of a large password domain with conventional encryption can lead to the success of a brute-force attack that became feasible computationally. Thus it is crucial to assess privacy threats and take security countermeasures for spatial trajectories. We present a system that incorporates honey encryption (HE) scheme that provides security beyond the brute-force bound in order to o er absolute protection for spatial trajectories against data breaches that involve computationally unbounded adversary. Our technique guarantees that decryption under any password will yield a plausible-looking trajectory. If an adversary decrypts an encrypted trajectory with a wrong password, it cannot eliminate that password, since the system returns an incorrect trajectory that is impossible to distinguish from the correct one. To e ciently encode and decode a spatial trajectory, we build a precise tree-based distribution transforming encoder (DTE) as the fundamental requirement of HE. In addition, we introduce the methods to dynamically update the proposed DTE. To prove the security guarantee of our system, we evalute it considering several attacks with and without side information using a real-life GPS sampling data set taken from 537 taxis over 30 days.en_US
dc.description.provenanceSubmitted by Betül Özen (ozen@bilkent.edu.tr) on 2018-08-29T14:11:10Z No. of bitstreams: 1 10208988.pdf: 621102 bytes, checksum: 4c8980235af59cc7be0211a9a2193001 (MD5)en
dc.description.provenanceMade available in DSpace on 2018-08-29T14:11:10Z (GMT). No. of bitstreams: 1 10208988.pdf: 621102 bytes, checksum: 4c8980235af59cc7be0211a9a2193001 (MD5) Previous issue date: 2018-08en
dc.description.statementofresponsibilityby Dorukhan Arslanen_US
dc.format.extentxii, 54 leaves : charts ; 30 cm.en_US
dc.identifier.itemidB158921
dc.identifier.urihttp://hdl.handle.net/11693/47758
dc.language.isoEnglishen_US
dc.rightsinfo:eu-repo/semantics/openAccessen_US
dc.subjectSpatial Trajectoryen_US
dc.subjectLocation-Based Serviceen_US
dc.subjectLocation Privacyen_US
dc.subjectHoney Encryptionen_US
dc.titlePrivacy protection for spatial trajectories against brute-force attacksen_US
dc.title.alternativeUzamsal gezingelerin kaba güç saldırılarına karşı gizlilik korumasıen_US
dc.typeThesisen_US
thesis.degree.disciplineComputer Engineering
thesis.degree.grantorBilkent University
thesis.degree.levelMaster's
thesis.degree.nameMS (Master of Science)

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
10208988.pdf
Size:
606.54 KB
Format:
Adobe Portable Document Format
Description:
Full printable version
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description: