Research Article
AP-Attack: A Novel User Re-identification Attack On Mobility Datasets
@INPROCEEDINGS{10.4108/eai.7-11-2017.2273573, author={Mohamed Maouche and Sonia Ben Mokhtar and Sara Bouchenak}, title={AP-Attack: A Novel User Re-identification Attack On Mobility Datasets}, proceedings={14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services}, publisher={ACM}, proceedings_a={MOBIQUITOUS}, year={2018}, month={4}, keywords={security location privacy mobility trace re-identifcation attacks protection mechanism}, doi={10.4108/eai.7-11-2017.2273573} }
- Mohamed Maouche
Sonia Ben Mokhtar
Sara Bouchenak
Year: 2018
AP-Attack: A Novel User Re-identification Attack On Mobility Datasets
MOBIQUITOUS
ACM
DOI: 10.4108/eai.7-11-2017.2273573
Abstract
Since the advent of hand held devices (e.g., smartphones, tablets, smart watches) with Ubiquitous computing and the wide popularity of location-based mobile applications, the amount of captured user location data is dramatically increasing. However, the gathering and exploitation of this data by mobile application providers raises many privacy threats as sensitive information can be inferred from it (e.g., home and work locations, religious beliefs, sexual orientations and social relationships). To address this issue a number of data obfuscation techniques (also called Location Privacy Protection Mechanisms or LPPMs) have been proposed in the literature. One of the existing methods to assess the effectiveness of LPPMs is to test them against user re-identifcation attacks. The aim of these attacks is to break user anonymity by re-associating data obfuscated using a given LPPM with user profles built from user past mobility. In this paper, we present AP-Attack a novel re-identifcation attack that relies on a heatmap representation of user mobility data. Our experiments run against three representative LPPMs of the literature using four real mobility datasets show that AP-Attack succeeds in re-identifying up to 79% users in non-obfuscated data, +27% more users than POI-Attack and PIT-Attack two well known state-of-the-art attacks. We also present a simple technique to improve user protection against our attack, which relies on a user-centric application of multiple-LPPMs.