|COOKIES: By using this website you agree that we can place Google Analytics Cookies on your device for performance monitoring.|
Quantifying Location Privacy
If you have a question about this talk, please contact Eiko Yoneki.
The popularity of personal communication devices leads to serious concerns about privacy in general, and location privacy in particular. As a response to these issues, a number of Location-Privacy Protection Mechanisms (LPPMs) have been proposed during the last decade. However, their assessment and comparison remains problematic because of the absence of a systematic method to quantify them. In particular, the assumptions about the attacker’s model tend to be incomplete, with the risk of a possibly wrong estimation of the users’ location privacy.
I will talk about how we address these issues by providing a formal framework for the analysis of LPP Ms; it captures, in particular, the prior information that might be available to the attacker, and various attacks that he can perform. By formalizing the adversary’s performance, we propose and justify the right metric to quantify location privacy. We find that popular privacy metrics, such as k-anonymity and entropy, do not correlate well with the success of the adversary in inferring users’ locations.
Joint work with R. Shokri, J.-Y. Le Boudec, and J.-P. Hubaux.
Bio: George Theodorakopoulos is a Lecturer/Senior Lecturer at the University of Derby. He received his B.Sc. at the National Technical University of Athens (NTUA), Greece, and his M.Sc. and Ph.D. at the University of Maryland, in 2002, 2004 and 2007, respectively. From 2007 to 2011, he was a senior researcher at EPFL working with Prof. Jean-Yves Le Boudec.
His research is on network security, privacy, and trust. Together with his Ph.D. advisor, John S. Baras, he has received the best paper award at WiSe’04, the 2007 IEEE ComSoc Leonard Abraham prize, and he has co-authored the book “Path Problems in Networks” on algebraic (semiring) generalizations of shortest path algorithms and their applications to networking problems.
This talk is part of the Computer Laboratory Systems Research Group Seminar series.
This talk is included in these lists:
Note that ex-directory lists are not shown.
Other listsScience meets Faith Engineers Without Borders - Training Physics of Living Matter lectures
Other talksPolicy Mobilities and Education Policy Research What’s new (and what isn’t) in improving quality and safety in healthcare Evolutionary hypotheses and early human development: findings from the Wirral Child Health and Development Study Unorthodox Interactions at Work Bayesian ERGMs -- computational and modelling challenges The Anne McLaren Lecture