an overview of location privacy for mobile computing

56
©2009 Carnegie Mellon University : 1 An Overview of Location Privacy for Mobile Computing Jason Hong [email protected]

Upload: lauren

Post on 03-Feb-2016

17 views

Category:

Documents


0 download

DESCRIPTION

An Overview of Location Privacy for Mobile Computing. Jason Hong [email protected]. Ubiquity of Location-Enabled Devices. [Berg Insight ‘10]. 2009: 150 million GPS-equipped phones shipped 2014: 770 million GPS-equipped phones expected to ship (~ 5x increase!) - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: An Overview of Location Privacy for Mobile Computing

©2

00

9 C

arn

eg

ie M

ello

n U

niv

ers

ity :

1

An Overview of Location Privacy for Mobile Computing

Jason [email protected]

Page 2: An Overview of Location Privacy for Mobile Computing

©2

01

1 C

arn

eg

ie M

ello

n U

niv

ers

ity :

2

Ubiquity of Location-Enabled Devices

•2009: 150 million GPS-equipped phones shipped

•2014: 770 million GPS-equipped phones expected to ship (~ 5x increase!)

•Future: Every mobile device will be location-enabled

2

[Berg Insight ‘10]

Page 3: An Overview of Location Privacy for Mobile Computing

©2

01

1 C

arn

eg

ie M

ello

n U

niv

ers

ity :

3

Location-Based Services Growing

3

Page 4: An Overview of Location Privacy for Mobile Computing

©2

01

1 C

arn

eg

ie M

ello

n U

niv

ers

ity :

4

Lots of Location-Based Services

4

Claims over 5 million users

Page 5: An Overview of Location Privacy for Mobile Computing

©2

01

1 C

arn

eg

ie M

ello

n U

niv

ers

ity :

5Potential Benefits of Location

• Okayness checking• Micro-coordination• Games

– Exploring a city

• Info retrieval / filtering– Ex. geotagging of photos

• Activity recognition– Ex. walking, driving, bus

• Improving trust– Co-locations to infer tie strength and trust

Page 6: An Overview of Location Privacy for Mobile Computing

©2

01

1 C

arn

eg

ie M

ello

n U

niv

ers

ity :

6Potential Risks

• Little sister• Undesired social obligations• Wrong inferences• Over-monitoring by employers

Failing to address accidents and legitimate concerns could blunt

adoption of a promising technology

Page 7: An Overview of Location Privacy for Mobile Computing

©2

01

1 C

arn

eg

ie M

ello

n U

niv

ers

ity :

7Protecting Location Privacy

• System architecture– How you get location– Where and how data stored and used

• User interface and policies– When is it shared– How is it displayed

• User studies– How do people manage in practice

Page 8: An Overview of Location Privacy for Mobile Computing

©2

01

1 C

arn

eg

ie M

ello

n U

niv

ers

ity :

8Protecting Location Privacy

• System architecture– How you get location– Where and how data stored and used

• User interface and policies– When is it shared– How is it displayed

• User studies– How do people manage in practice

Page 9: An Overview of Location Privacy for Mobile Computing

©2

01

1 C

arn

eg

ie M

ello

n U

niv

ers

ity :

9

How You Get and Use Location

• Some location-based content,even if old, still useful

• Different time-to-live

Shah Amini et al, Caché: Caching Location-Enhanced Contentto Improve User Privacy. (Under Review)

Real-time

Daily

Weekly

Monthly

Yearly

Traffic, Parking spots, Friend Finder

Weather, Social events, Coupons

Movie schedules, Ads, Yelp!

Geocaches, Bus schedules

Maps, Store locations, Restaurants

Page 10: An Overview of Location Privacy for Mobile Computing

©2

01

1 C

arn

eg

ie M

ello

n U

niv

ers

ity :

10

How You Get and Use Location

• Pre-fetch all the content you might need for a geographic area in advance– SELECT * from DB where City=‘Pittsburgh’

• Then, use it locally on your device only– We assume that you determine your

location locally using WiFi or GPS– So a content provider would only know

you are in Pittsburgh

Page 11: An Overview of Location Privacy for Mobile Computing

©2

01

1 C

arn

eg

ie M

ello

n U

niv

ers

ity :

11

Feasibility of Pre-Fetching

• Are people’s mobility patterns regular?– Pre-fetching useful only if we can

predict where people will be– Locaccino: Top 20 of 4000, 460k traces– Place naming: 26 people, 118k traces

• For each person, 5mi radius around two most common places (home + work) accounts for what % of mobility data?

Page 12: An Overview of Location Privacy for Mobile Computing

©2

01

1 C

arn

eg

ie M

ello

n U

niv

ers

ity :

12

Feasibility of Pre-Fetching

5mi

Work

Home

Page 13: An Overview of Location Privacy for Mobile Computing

©2

01

1 C

arn

eg

ie M

ello

n U

niv

ers

ity :

13

Feasibility of Pre-Fetching

Radius

5mi

10mi

15mi

Locaccino

86%

87%

87%

Place Naming

79%

84%

86%

Page 14: An Overview of Location Privacy for Mobile Computing

©2

01

1 C

arn

eg

ie M

ello

n U

niv

ers

ity :

14

Feasibility of Pre-Fetching

• Content doesn’t change that often– Average amount of change per day

(over 5 months)

• Downloading it doesn’t take long– NYC has 250k POI = 100MB, 65MB for map

Page 15: An Overview of Location Privacy for Mobile Computing

©2

01

1 C

arn

eg

ie M

ello

n U

niv

ers

ity :

15

Caché Toolkit

• Android background service for apps– Apps modified to make requests to service

– User specifies home and work locations– Caché service pre-fetches content in

background when plugged in and WiFi– Caché also gets content for your

region if you spend night there

Page 16: An Overview of Location Privacy for Mobile Computing

©2

01

1 C

arn

eg

ie M

ello

n U

niv

ers

ity :

16

Protecting Location Privacy

• System architecture– How you get location– Where and how data stored and used

• User interface and policies– When is it shared– How is it displayed

• User studies– How do people manage in practice

Page 17: An Overview of Location Privacy for Mobile Computing

©2

01

1 C

arn

eg

ie M

ello

n U

niv

ers

ity :

17

Why People Use Foursquare

• Started in Mar 2009, 5 million users• After two decades of research,

finally a LBS beyond navigation– Large graveyard of location apps– Critical mass of devices and developers

• Opportunity to study value proposition and how people manage privacy

Janne Lindqvist et al, I’m the Mayor of My House: Examining Why People Use a Social-Driven Location Sharing Application, CHI 2011

Page 18: An Overview of Location Privacy for Mobile Computing

©2

01

1 C

arn

eg

ie M

ello

n U

niv

ers

ity :

18

What is Foursquare?

• “Foursquare is a mobile application that makes cities easier to use and more interesting to explore. It is a friend-finder, a social city guide and a game that challenges users to experience new things, and rewards them for doing so. Foursquare lets users "check in" to a place when they're there, tell friends where they are and track the history of where they've been and who they've been there with.”

Page 19: An Overview of Location Privacy for Mobile Computing

©2

01

1 C

arn

eg

ie M

ello

n U

niv

ers

ity :

19

How Does Foursquare Work?

• Check-in– See list of nearby places– Manually select a place– “Off the grid” option – Can create new places– Facebook + Twitter too

• Can see check-ins of friends, plus who else is at your location

Page 20: An Overview of Location Privacy for Mobile Computing

©2

01

1 C

arn

eg

ie M

ello

n U

niv

ers

ity :

20

How Does Foursquare Work?

Page 21: An Overview of Location Privacy for Mobile Computing

©2

01

1 C

arn

eg

ie M

ello

n U

niv

ers

ity :

21

How Does Foursquare Work?

Leave tips for others

Page 22: An Overview of Location Privacy for Mobile Computing

©2

01

1 C

arn

eg

ie M

ello

n U

niv

ers

ity :

22

How Does Foursquare Work?

Earn badges for activities

Page 23: An Overview of Location Privacy for Mobile Computing

©2

01

1 C

arn

eg

ie M

ello

n U

niv

ers

ity :

23

How Does Foursquare Work?

Become mayor of a place if youhave most check-ins in past 60 days

Wean Hall http://foursquare.com/venue/209221 Gates http://foursquare.com/venue/174205

Page 24: An Overview of Location Privacy for Mobile Computing

©2

01

1 C

arn

eg

ie M

ello

n U

niv

ers

ity :

24

News of the Weird

• People fighting to be mayors of a place– One pair eventually got engaged

• Some people mayor of 30+ places• Some businesses offering discounts to

mayors

Page 25: An Overview of Location Privacy for Mobile Computing

©2

01

1 C

arn

eg

ie M

ello

n U

niv

ers

ity :

25

Three-Part Study of Foursquare

• Why do people use foursquare?– How do they manage privacy concerns?– Surprising uses?

• Interviews with early adopters of LBS (N=6)

• First survey to understand range of uses of foursquare (N=18)

• Second survey to understand details of use, especially privacy (N=219)

Page 26: An Overview of Location Privacy for Mobile Computing

©2

01

1 C

arn

eg

ie M

ello

n U

niv

ers

ity :

26

Why People Check-In

• Principal components analysis based on survey data– See paper for details

• Foursquare’s mission statement quite accurate– Fun (mayorships, badges)– Keep in touch with friends– Explore a city– Personal history

Page 27: An Overview of Location Privacy for Mobile Computing

©2

01

1 C

arn

eg

ie M

ello

n U

niv

ers

ity :

27

Privacy IssuesWhy people don’t check-in

• Presentation of Self issues– Didn’t want to be seen

in McDonalds or fast food– Boring places, or at Doctor’s

• Didn’t want to spam friends– Facebook and Twitter

• Didn’t want to reveal location of home– Tension: “Home” to signal availability– Tension: Some checked-in everywhere

Page 28: An Overview of Location Privacy for Mobile Computing

©2

01

1 C

arn

eg

ie M

ello

n U

niv

ers

ity :

28

Privacy Issues

Page 29: An Overview of Location Privacy for Mobile Computing

©2

01

1 C

arn

eg

ie M

ello

n U

niv

ers

ity :

29

Privacy Issues

• Surprisingly few concerns about stalkers– Only 9/219 participants (but early adopters)

• Checking in when leaving (safety)– Surprising use, 29 people said they did this– 71 people (32%) used for okayness checking

• Over half of participants had a stranger on their friends list– Want to know where interesting people go– Perceived like Twitter followers– Suggests separating Friends from friends

Page 30: An Overview of Location Privacy for Mobile Computing

©2

01

1 C

arn

eg

ie M

ello

n U

niv

ers

ity :

30

Protecting Location Privacy

• System architecture– How you get location– Where and how data stored and used

• User interface and policies– When is it shared– How is it displayed

• User studies– How do people manage in practice

Page 31: An Overview of Location Privacy for Mobile Computing

©2

01

1 C

arn

eg

ie M

ello

n U

niv

ers

ity :

31

Sharing One’s Location

• Place naming– “Hey mom, I am at 55.66N 12.59E.”

vs “Home”

• User study + machine learning to model how people name places– Semantic: business, function, personal– Geographic: city, street, building

Jialiu Lin et al, Modeling People’s Place Naming Preferencesin Location Sharing, Ubicomp 2010

Page 32: An Overview of Location Privacy for Mobile Computing

©2

01

1 C

arn

eg

ie M

ello

n U

niv

ers

ity :

32

Sharing One’s Location

• Location abstractions

share nothing &

no social benefits

share precise location (GPS) &

max social benefits

Page 33: An Overview of Location Privacy for Mobile Computing

©2

01

1 C

arn

eg

ie M

ello

n U

niv

ers

ity :

33

Sharing One’s Location

• Location abstractions

share nothing &

no social benefits

share precise location (GPS) &

max social benefits

use location abstractions to scaffold privacy

concerns

use location abstractions to scaffold privacy

concerns

Page 34: An Overview of Location Privacy for Mobile Computing

©2

01

1 C

arn

eg

ie M

ello

n U

niv

ers

ity :

34

Sharing One’s Location

• Location abstractions

type of description example

geographic 100 Art Rooney AveNear Golden TriangleDowntownPittsburgh

semantic Heinz FieldSteelers vs. BengalsSteelers’ homeFootball field

Page 35: An Overview of Location Privacy for Mobile Computing

©2

01

1 C

arn

eg

ie M

ello

n U

niv

ers

ity :

35

Sharing One’s Location

• Place entropy

Page 36: An Overview of Location Privacy for Mobile Computing

©2

01

1 C

arn

eg

ie M

ello

n U

niv

ers

ity :

36

Understanding Human Behavior at Large Scales

• Capabilities of today’s mobile devices– Location, sound, proximity, motion– Call logs, SMS logs, pictures

• We can now analyze real-world social networks and human behaviors at unprecedented fidelity and scale

• 2.8m location sightings of 489 volunteers in Pittsburgh

Page 37: An Overview of Location Privacy for Mobile Computing

©2

01

1 C

arn

eg

ie M

ello

n U

niv

ers

ity :

37

• Insert graph here• Describe entropy

Page 38: An Overview of Location Privacy for Mobile Computing

©2

01

1 C

arn

eg

ie M

ello

n U

niv

ers

ity :

38

Early Results

• Can predict Facebook friendships based on co-location patterns– 67 different features

• Intensity and Duration• Location diversity (entropy)• Mobility• Specificity (TF-IDF)• Graph structure (mutual neighbors, overlap)

– 92% accuracy in predicting friend/not

Justin Cranshaw et al, Bridging the Gap BetweenPhysical Location and Online Social Networks, Ubicomp 2010

Page 39: An Overview of Location Privacy for Mobile Computing

©2

01

1 C

arn

eg

ie M

ello

n U

niv

ers

ity :

39

39

Using features such a location entropy significantly improves performance over shallow features such as number of co-locations

Page 40: An Overview of Location Privacy for Mobile Computing

©2

01

1 C

arn

eg

ie M

ello

n U

niv

ers

ity :

40

40

Inte

nsity

feat

ures

Inte

nsity

feat

ures

Num

ber

of

co-

loca

t ions

Num

ber

of

co-

loca

t ions

With

out intensit

y

Full model

Page 41: An Overview of Location Privacy for Mobile Computing

©2

01

1 C

arn

eg

ie M

ello

n U

niv

ers

ity :

41

Early Results

• Can predict number of friends based on mobility patterns– People who go out often, on weekends,

and to high entropy places tend to have more friends

– (Didn’t check age though)

Justin Cranshaw et al, Bridging the Gap BetweenPhysical Location and Online Social Networks, Ubicomp 2010

Page 42: An Overview of Location Privacy for Mobile Computing

©2

01

1 C

arn

eg

ie M

ello

n U

niv

ers

ity :

42

Entropy Related to Location Privacy

Page 43: An Overview of Location Privacy for Mobile Computing

©2

01

1 C

arn

eg

ie M

ello

n U

niv

ers

ity :

43

Ongoing Work

• Managing geotagged photos• Enhanced social graph• Understanding real-world human

behavior at large scales

Page 44: An Overview of Location Privacy for Mobile Computing

©2

01

1 C

arn

eg

ie M

ello

n U

niv

ers

ity :

44

Managing Geotagged Photos

• 4.3% Flickr photos, 3% YouTube, 1% Craigslist photos geotagged

• Idea: Use place entropy to differentiate between public / private

• But need to radically scale up entropy– 2.8m sightings, 489 volunteers, N years

Wired Magazine story

Page 45: An Overview of Location Privacy for Mobile Computing

©2

01

1 C

arn

eg

ie M

ello

n U

niv

ers

ity :

45

Calculating Entropy from Flickr

Page 46: An Overview of Location Privacy for Mobile Computing

©2

01

1 C

arn

eg

ie M

ello

n U

niv

ers

ity :

46

Foursquare Check-in Data

• Viz of 566k check-ins in NYC

Page 47: An Overview of Location Privacy for Mobile Computing

©2

01

1 C

arn

eg

ie M

ello

n U

niv

ers

ity :

47

Enhanced Social Graph

• Family, friends, co-workers, acquaintances all mixed together

• Gay friends and 12yo swimmers

• Family friends and high school friends

• Friends and boss• My personal use

Page 48: An Overview of Location Privacy for Mobile Computing

©2

01

1 C

arn

eg

ie M

ello

n U

niv

ers

ity :

48

Enhanced Social Graph

• Create a more sophisticated graph that captures tie strength and relationship

• Take call data, SMS, FB use, co-locations

• More appropriate sharing

Page 49: An Overview of Location Privacy for Mobile Computing

©2

01

1 C

arn

eg

ie M

ello

n U

niv

ers

ity :

49

Understanding Human Behavior at Large Scales

• What does me going to a placesay about me and that place?

• Scale up to thousands of people, what does it say about people in a city?

Page 50: An Overview of Location Privacy for Mobile Computing

©2

01

1 C

arn

eg

ie M

ello

n U

niv

ers

ity :

50

Understanding Human Behavior at Large Scales

• Utility for individuals– Predict onset of depression– Infer physical decline– Predict personality type

• Utility for groups– Architecture and urban design– Use of public resources (e.g. buses) – Traffic Behavioral Inventory (TBI)– Ride-sharing estimates– What do Pittsburgher’s do?– What do Chinese people in Pittsburgh do?

Page 51: An Overview of Location Privacy for Mobile Computing

©2

01

1 C

arn

eg

ie M

ello

n U

niv

ers

ity :

51

Understanding Human Behavior at Large Scales

• Get location from thousands of people in a city– Or, what if we could give smart phone to every

incoming freshman?

• New metrics to describe people and places– Churn, transience, burst

• Ways of sharing data with other researchers while maintaining privacy of individuals?– Very high cost in collecting data– How to offer k-anonymity (or other) guarantees?– Privacy server rather than sharing data

Page 52: An Overview of Location Privacy for Mobile Computing

©2

01

1 C

arn

eg

ie M

ello

n U

niv

ers

ity :

52

Research Angle of Attack

Sensed DataLocation, sound, proximity, motion

Computer DataFacebook, Call Logs,

SMS logs

Intermediate MetricsCharacterize People and Places at Large Scale

Human Phenomena We Care AboutPrivacy, Health Care, Relationships,

Info Overload, Architecture, Urban Design

Privacy M

od

els

Page 53: An Overview of Location Privacy for Mobile Computing

©2

01

1 C

arn

eg

ie M

ello

n U

niv

ers

ity :

53

End-User Privacy in HCI

• 137 page article surveying privacy in HCI and CSCW

Iachello and Hong, End-User Privacy in Human-Computer Interaction, Foundations and Trends in Human-Computer

Interaction

Page 54: An Overview of Location Privacy for Mobile Computing

©2

01

1 C

arn

eg

ie M

ello

n U

niv

ers

ity :

54

Page 55: An Overview of Location Privacy for Mobile Computing

©2

01

1 C

arn

eg

ie M

ello

n U

niv

ers

ity :

55

WYEP Summer FestivalBlizzard …same guyTrigger happy guyRandom peak

EventEvent

Non-eventNon-event

2010 Photos in Pittsburgh

Page 56: An Overview of Location Privacy for Mobile Computing

©2

01

1 C

arn

eg

ie M

ello

n U

niv

ers

ity :

56