1 / 18

Virtual Trip Lines for Distributed Privacy-Preserving Traffic Monitoring

Virtual Trip Lines for Distributed Privacy-Preserving Traffic Monitoring. Baik Hoh, Marco Gruteser WINLAB / ECE Dept., Rutgers University Ryan Herring, Jeff Ban a , Dan Work, Juan-Carlos Herrera, Alexandre Bayen Civil Engineering Dept., UC Berkeley Murali Annavaram , Quinn Jacobson

gent
Télécharger la présentation

Virtual Trip Lines for Distributed Privacy-Preserving Traffic Monitoring

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Virtual Trip Lines for Distributed Privacy-Preserving Traffic Monitoring Baik Hoh, Marco Gruteser WINLAB / ECE Dept., Rutgers University Ryan Herring, Jeff Bana, Dan Work, Juan-Carlos Herrera, AlexandreBayen Civil Engineering Dept., UC Berkeley MuraliAnnavaram, Quinn Jacobson Nokia Research Center Presentation By: SaurabhHukerikar 30th March 2009

  2. Introduction • Virtual trip lines • Geographic markers that indicate where vehicles should provide location updates • Aggregating and cloaking several location updates based on trip line identifiers for privacy by preventing updates from VTL’s deemed private. • Distributed architecture

  3. The Conventions • Eye witness reports • Traffic cameras • Loop detectors • Cellular base station hand-off • In-Vehicle Transponders (IVTs) and License Plate Readers (LPRs).

  4. Privacy risks & threat model • www.privacyrights.org • Preserving privacy in GPS traces via uncertainty-aware path cloaking • [B. Hoh, M. Gruteser, H. Xiong, and A. Alrabady] • Spatio-temporal characteristics of the data allows tracking and re- identification of anonymous vehicles when user density is low. • Consecutive location samples from a vehicle exhibit temporal and spatial correlation, paths of individual vehicles can be reconstructed from a mix of anonymous samples belonging to several vehicles • Process can be formalized and automated through target tracking algorithms • Algorithms generally predict the target position using the last known speed and heading information and then decide which next sample to link to the same vehicle through Maximum Likelihood Detection

  5. Privacy Metrics • Mean Time To Confusion(MTTC) • Mean Distance To Confusion(MDTC) • Tracking Uncertainity

  6. Traffic Monitoring With Virtual Trip Lines Virtual trip lines control disclosure of location by sampling in space Handset VTL generator ID proxy server Traffic monitoring service provider Virtual trip line (VTL): [id; x1; y1; x2; y2; d]

  7. VTL Placement: Minimum Spacing Speed variation Penetration & Speed – impact on Minimum spacing

  8. VTL Placement: Road Layout If trip lines are placed immediately before or after intersections, an adversary may be able to follow vehicles paths based on speed differences

  9. VTL Placement: Minimum Spacing – Speed consideration

  10. Experimental Evaluation RMS error of about 80 seconds Travel time of each link is computed with the length of a link and the mean speed that is obtained by averaging out speed readings from probe vehicles during an aggregation interval.

  11. Experimental Evaluation – Privacy v Accuracy Trade-Off • Distance-to-confusionwith two different sets of anonymous flow updates from both • The evenly spaced VTLs (with exclusion area) and • The evenly spaced VTLs (without exclusion area) • 1 – 2 % penetration • 500 meters exclusion area • Sets of equidistant trip lines with minimum spacing varying from 333 ft (100 meters) to 1670 ft (500 meters) • Uncertainty threshold of 0.2

  12. Privacy v Accuracy Trade-Off • The travel time estimation generally improves with an increasing number of VTLs • Two successive anonymous updates that are sampled longer than 800 feet apart experience high tracking uncertainty. • Existence of the exclusion area

  13. Experimental Evaluation Source: http://www.calccit.org/projects/PDF-2008/Mobile%20Century%20Fact%20Sheet.pdf

  14. Critique • Energy requirements • - dash board charger • Processing and Communication overhead on Client phone • Real time? • - Distributed architecture • Exclusion of VTLs • - Generic exclusion risks undercoverage • - Individualized exclusion processing overhead or configuration

  15. “The TomTom devices with HD Traffic all use a built-in receiver including a SIM-card. Does this mean that I can be traced? TomTom takes privacy of personal information very seriously, and the information retreived is entirely anonymous. TomTom only uses information about the speed and direction travelled of TomTom device users. We don't know anything about the devices themselves, nor who owns them” “Data generated from the mobile phones is completely anonymous. TomTom, and has information about user direction and speed only - not the type of device, nor the owner of the mobile phone.” WEBLINK: TomTom High Definition Source: http://www.tomtom.com/services

  16. WEBLINK:

  17. Questions?

  18. Thank-you

More Related