Locationsafe: Granular Location Privacy for Iot Devices

Locationsafe: Granular Location Privacy for Iot Devices

LocationSafe: Granular Location Privacy for IoT Devices Joshua Joy Minh Le Mario Gerla [email protected] [email protected] [email protected] ABSTRACT Today, mobile data owners lack consent and control over the Client Client Client Client release and utilization of their location data. Third party Session Session Session Session applications continuously process and access location data without data owners granular control and without knowl- edge of how location data is being used. The proliferation Privacy of IoT devices will lead to larger scale abuses of trust. Module In this paper we present the first design and implementa- tion of a privacy module built into the GPSD daemon. The GPSD daemon is a low-level GPS interface that runs on GPS enabled devices. The integration of the privacy module en- GPSD sures that data owners have granular control over the release of their GPS location. We describe the design of our privacy GPS module and then evaluate the performance of private GPS Device Driver release and demonstrate that strong privacy guarantees can be built into the GPSD daemon itself with minimal to no overhead. GPS Sensor 1. INTRODUCTION Today data owners' personal mobile devices are constantly being tracked and monitored by third party applications without data owners granular consent and control. Data Figure 1: Privatization occurs before data is re- owners' trust is being continuously violated [4]. leased to the client application. Data owners have a desire to occasionally share their lo- cation data, though desire granular control and approved consent. Third party analysts seek to track data owners data such as location needs finer control on how accurate and continuously. Unfortunately today this tension has resulted how often the location information is released. Users should in disproportionate control being in favor of the third party be able to control the granularity of their personal data that analysts. is released. Users require freedom and control over their own Recent research has tried to improve user behavior in personal data. recognizing permission issues [6], user-defined runtime con- However, these approaches discards several important facts: straints [13], or tools to help developers identify least-privilege 1) these privacy mechanisms protect at the application layer arXiv:1606.09605v1 [cs.CR] 30 Jun 2016 [16]. only and the underlying operating system still has access to Additionally, permission managers (e.g., Android and iOS) all system location APIs 2) granular privacy permission so- offer binary permissions to disable or enable location ser- lutions (e.g., XPrivacy) are only for rooted Android phones vices. However, while this allows data owners to disable lo- 3) there is no compromise between third party analyzers and cation services for applications that do not require location data owners. The expected proliferation of IoT devices will (e.g., Flashlight application) [7], fine grained granularity is further exacerbate these privacy issues. still missing. An Android modification called CynagonMod In this paper, we present the first (to our knowledge) im- has a module called XPrivacy [18]. XPrivacy enables data plementation of a privacy module to GPSD. Figure 1 shows owners to configure random or a static location, empty cell an overview of the flow of queries and responses and demon- ID, blocks geofences from being set, prevents sending NMEA strates that the privatization occurs before releasing the data data to application, prevents cell tower updates from being back to the application. The privacy module ensures that all sent to an application, prevents aGPS, returns empty Wi- GPS data is released according to the data owner's consent Fi scans, and disables activity recognition. Ultimately, this and choice. We demonstrate that appropriate methodolo- provides the data owner control at the application layer. gies can be placed which provides strong location privacy User applications requesting data of users is a binary per- guarantees, yet enable analyzers access to privatized loca- mission, either I share my data or I don't. However, sensitive tion data. 1. A privacy module that integrates into the GPSD soft- Apps only have access to the privatized data and are un- ware (runs on every GPS enabled device) able to directly access GPSD daemon and data. All location data released must be approved by the data owner. 2. A granular privacy interface and control to manage The system should support applications that need real- location privacy settings (e.g., location coarseness and time access to location data. The privacy policy defines release frequency) how frequently the application is allowed to receive updates (express in epochs), how accurate the location data may 3. A performant privacy module with minimal overhead be, and geographical regions as to where the application is allowed to receive location data from. We first describe the architecture and flow of GPSD, we We use a social network messaging application as an ex- then describe our privatization algorithms, then we describe ample. The application may want to know which city an in- our integration with GPSD, and finally we evaluate our dividual is in, though pinpoint location information within scheme. meter accuracy is not required. The data owner is allowed to define both the radius (e.g., city) that is allowed to be 2. RELATED WORK returned as well as the frequency (e.g., say at most every hour). GPSD is a daemon that network enables the GPS sen- Ultimately the data owner has final say over how loca- sor on the majority of mobile embedded systems includ- tion data and the tradeoff between privacy and utility. The ing Android, iOS, Windows Mobile, UAVs, and driverless utility has benefits for third party analysts interesting in cars [9]. On smartphones the network access is limited to learning aggregate behavior. localhost applications only (as opposed to remote applica- tions). GPSD enables unfettered access to location data and 3.2 Performance Goals does not enable or provide any privacy guarantees. Loca- The system should scale gracefully as the number of appli- tionSafe provides a privacy module that provides uniform cations connecting to the GPSD daemon increases. Location private access across all platforms. data will be released within the defined epochs. Mobile device permission systems has received attention in the past. Human interaction studies which seek to en- 3.3 Threat Model hance reader comprehension have been proposed and evalu- Mobile devices (e.g., smartphones, tablets, wearables) are ated [6, 5]. Such systems lack strong and enforacable privacy under the data owner's control. Kernel and underlying OS is guarantees. Static analysis tools have been proposed [19]. vetted and verified (signatures and trusted sources). Focus is Though such systems serve only to notify the data owner not on low level system threats. We assume that the operat- of privacy breaches and are unable to enforce any privacy ing system itself is not malicious and provides a mechanism runtime guarantees. However, these solutions modify the to provide a privacy policy settings manager accessible to underlying OS thus making them specific to a single OS or the data owner. Secure micro kernels such as seL4 address device [20, 18]. Furthermore, these solutions are unable to these issues and are out of scope for this paper. Applications balance the privacy and utility tradeoff, ultimately resulting do not have a system exploit (e.g., rootkit) to circumvent the a binary approach to privacy. system. To guarantee data owner privacy upon the release of data, Applications may try to request data more frequently than various mechanisms have been proposed [12, 14, 11, 2, 3]. the defined epoch. LocationSafe will deny such aggressive Differential privacy has emerged as the strongest of these requests and ensure that data is only released within the privacy mechanisms [2, 3]. The core idea of differential pri- defined epoch. vacy is to provide strong bounds and guarantees on the pri- Applications may act as sybils and send false application vacy leakage when multiple aggregate analytics are run de- IDs in order to confuse the GPSD daemon. LocationSafe spite the presence or absence of a single data owner from will treat sybil applications accordingly using data owner the dataset. This privacy mechanism is provided by adding defined defaults. Thus, sybil applications may either be re- differentially private noise to the aggregrate answer. As op- ceive location data using default privacy configurations or posed to the originally proposed differentially private mech- not at all. anism which first collects data in a centralize database and then privatizes the release of the data, LocationSafe im- 3.4 Privacy Goals mediately privatizes the data at the data source (sensor) in Data owners should be able to limit how frequently an real-time. application access location data. Data owners should also be able to define fine-grained access to location data. Appli- 3. GOALS AND PROBLEM STATEMENT cations for which the data owner feels the application does We now describe the system goals, performance goals, not meter level accuracy, the data owner should be allowed to define a radius from which the location value can be re- threat model, and privacy goals of LocationSafe. turned from. Additionally, for scenarios where fine-grained 3.1 System Goals location is required, the data owner can define a grid system from which potential locations can be returned from. There should be well defined and enforced constraints re- GPS sensor data is only accessible via GPSD. garding third party application's (apps) access to location data. The data owner should be able to specify the con- straints such as how accurate location information should 4. ARCHITECTURE be disclosed and how frequent the location data should be Figure 2 depicts the main components GPSD event loop: disclosed. accepting new client connections, accepting new client sub- accuracy.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    5 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us