Skip to content
Licensed Unlicensed Requires Authentication Published by De Gruyter Oldenbourg July 31, 2015

Quantifying and protecting location privacy

  • Reza Shokri

    Reza Shokri is a postdoctoral research scholar at the University of Texas at Austin. He obtained his PhD in computer and communication sciences from EPFL in 2013. His research focuses on computational privacy.

    University of Texas at Austin, Computer Science Department

    EMAIL logo

Abstract

This thesis addresses the timely concern of protecting privacy in the age of big data. We identify the two following problems as the fundamental problems in computational privacy: (i) consistently quantifying privacy in different systems and (ii) optimally protecting privacy using obfuscation mechanisms. We cast the problem of quantifying privacy as computing the estimation error in a statistical (Bayesian) inference problem, where an adversary combines his observation, background knowledge and side channel information to estimate the user's sensitive information. This enables us to evaluate privacy of users in different systems, and consistently compare the effectiveness of different privacy protection mechanisms. We also formulate the problem of optimizing user privacy while respecting data utility as an interactive optimization problem (Bayesian Stackelberg game), where both user and adversary want to maximize their own objectives which are in conflict with each other. We apply our methodologies to quantifying and protecting location privacy in location-based services. We also provide an open-source tool, named Location-Privacy and Mobility Meter (LPM), that enables researchers to learn and analyze human mobility models as well as evaluating and comparing different location-privacy preserving mechanisms.

About the author

Reza Shokri

Reza Shokri is a postdoctoral research scholar at the University of Texas at Austin. He obtained his PhD in computer and communication sciences from EPFL in 2013. His research focuses on computational privacy.

University of Texas at Austin, Computer Science Department

Received: 2015-6-14
Accepted: 2015-6-15
Published Online: 2015-7-31
Published in Print: 2015-8-28

©2015 Walter de Gruyter Berlin/Boston

Downloaded on 8.6.2024 from https://www.degruyter.com/document/doi/10.1515/itit-2015-0024/html
Scroll to top button