14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services

Research Article

AP-Attack: A Novel User Re-identification Attack On Mobility Datasets

  • @INPROCEEDINGS{10.4108/eai.7-11-2017.2273573,
        author={Mohamed Maouche and Sonia Ben Mokhtar and Sara Bouchenak},
        title={AP-Attack: A Novel User Re-identification Attack On Mobility Datasets},
        proceedings={14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services},
        publisher={ACM},
        proceedings_a={MOBIQUITOUS},
        year={2018},
        month={4},
        keywords={security location privacy mobility trace re-identifcation attacks protection mechanism},
        doi={10.4108/eai.7-11-2017.2273573}
    }
    
  • Mohamed Maouche
    Sonia Ben Mokhtar
    Sara Bouchenak
    Year: 2018
    AP-Attack: A Novel User Re-identification Attack On Mobility Datasets
    MOBIQUITOUS
    ACM
    DOI: 10.4108/eai.7-11-2017.2273573
Mohamed Maouche,*, Sonia Ben Mokhtar1, Sara Bouchenak1
  • 1: LIRIS INSA-Lyon
*Contact email: mohamed.maouche@insa-lyon.fr

Abstract

Since the advent of hand held devices (e.g., smartphones, tablets, smart watches) with Ubiquitous computing and the wide popularity of location-based mobile applications, the amount of captured user location data is dramatically increasing. However, the gathering and exploitation of this data by mobile application providers raises many privacy threats as sensitive information can be inferred from it (e.g., home and work locations, religious beliefs, sexual orientations and social relationships). To address this issue a number of data obfuscation techniques (also called Location Privacy Protection Mechanisms or LPPMs) have been proposed in the literature. One of the existing methods to assess the effectiveness of LPPMs is to test them against user re-identifcation attacks. The aim of these attacks is to break user anonymity by re-associating data obfuscated using a given LPPM with user profles built from user past mobility. In this paper, we present AP-Attack a novel re-identifcation attack that relies on a heatmap representation of user mobility data. Our experiments run against three representative LPPMs of the literature using four real mobility datasets show that AP-Attack succeeds in re-identifying up to 79% users in non-obfuscated data, +27% more users than POI-Attack and PIT-Attack two well known state-of-the-art attacks. We also present a simple technique to improve user protection against our attack, which relies on a user-centric application of multiple-LPPMs.