Proceedings 2018 Network and Distributed System Security Symposium 2018
DOI: 10.14722/ndss.2018.23211
|View full text |Cite
|
Sign up to set email alerts
|

De-anonymization of Mobility Trajectories: Dissecting the Gaps between Theory and Practice

Abstract: Abstract-Human mobility trajectories are increasingly collected by ISPs to assist academic research and commercial applications. Meanwhile, there is a growing concern that individual trajectories can be de-anonymized when the data is shared, using information from external sources (e.g. online social networks). To understand this risk, prior works either estimate the theoretical privacy bound or simulate de-anonymization attacks on synthetically created (small) datasets. However, it is not clear how well the t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 40 publications
(12 citation statements)
references
References 40 publications
0
9
0
Order By: Relevance
“…In absence of these practical considerations, studies may lead to overpessimistic claims on privacy risks, which are instead mitigated when attacks are run in the wild. The recent work by Wang et al [138], who show that figures on attack success rates in the literature are largely exaggerated when considering closer-to-reality settings, is a first evidence in this sense. However, it is not a definitive one, as the authors still retain many assumptions that simplify the attacker's work.…”
Section: Realistic and Credible Risk Assessmentsmentioning
confidence: 95%
See 1 more Smart Citation
“…In absence of these practical considerations, studies may lead to overpessimistic claims on privacy risks, which are instead mitigated when attacks are run in the wild. The recent work by Wang et al [138], who show that figures on attack success rates in the literature are largely exaggerated when considering closer-to-reality settings, is a first evidence in this sense. However, it is not a definitive one, as the authors still retain many assumptions that simplify the attacker's work.…”
Section: Realistic and Credible Risk Assessmentsmentioning
confidence: 95%
“…The first test at scale is that recently performed by Wang et al [138]. They leverage an impressive collection of large-scale real-world datasets 12 to carry out a comparative analysis of record linkage attacks proposed in the literature, including those by Ma et al [89], Rossi and Musolesi [111], Cecaj et al [27,28], and Riederer et al [110].…”
Section: Record Linkage Via Diverse Sampling Of Trajectory Micro-datamentioning
confidence: 99%
“…Recently, Wang et al [67] explored the discrepancies between the theory and practice of re-identification attacks. They leveraged a large ground-truth dataset containing 2 million users, and two smaller external datasets collected over the same population to match against the former.…”
Section: Re-identificationmentioning
confidence: 99%
“…However, this approach allows to use datasets of any size, for example to assess the scalability of algorithms to largescale datasets. Indeed, very few researchers have access to extremely large datasets (e.g., the dataset with 1.5 million individuals used by De Montjoye et al [62] or the dataset of 2.1 million individuals used by Wang et al [67]).…”
Section: F Mobility Datasetsmentioning
confidence: 99%
“…The group of unsupervised methods based on behaviour analysis are performed in [19]. It is presumed that a web application under attack acts different from regular operation.…”
Section: Related Researchmentioning
confidence: 99%