access icon free Enhancing privacy in collaborative traffic-monitoring systems using autonomous location update

Collaborative traffic-monitoring (CTM) systems exploit the location information continuously collected from vehicles. Location data are very sensitive information that made privacy a major obstacle for the widespread usage of CTM systems. The way how this data are generated and used is very important for users' privacy and data quality as well. Recently, two CTM approaches have been proposed, the first relies on a dedicated infrastructure that is called vehicular ad hoc networks (VANETs), and the second utilises the existing underlying infrastructure such as cellular and wireless networks. In this study, the authors propose a privacy aware collaborative traffic monitoring system (PA-CTM) that considers the privacy and security properties of VANETs and existing infrastructures. PA-CTM provides a client server architecture that relies on existing infrastructures and enhances privacy by: (i) Using a robust pseudonym providing system for anonymous access. Pseudonyms enable users to be authenticated anonymously by the traffic server without having their identities revealed. It also allows revealing identities for law enforcement purposes when necessary. Users are able to change their pseudonyms and hence hide their complete trajectory information form traffic server. (ii) Utilising a novel autonomous location update mechanism (ALUM) that does not rely on a trusted third party and uses only local parameters (speed and direction) for triggering a location update or pseudonym change. These performance results showed that ALUM is effective for traffic monitoring in terms of both privacy and utility.

Inspec keywords: data privacy; client-server systems; computer network security; computerised monitoring; traffic information systems; sensor fusion; groupware; vehicular ad hoc networks

Other keywords: ALUM; vehicle location information; CTM approaches; cellular networks; VANET privacy properties; robust pseudonym providing system; client server architecture; traffic server; autonomous location update mechanism; VANET security properties; user privacy; vehicular ad hoc networks; privacy aware collaborative traffic monitoring system; sensitive information; data quality; PA-CTM system; anonymous access; wireless networks; privacy enhancement

Subjects: Computerised instrumentation; Sensor fusion; Computer communications; Traffic engineering computing; Data security; Mobile radio systems; Computer networks and techniques; Groupware

References

    1. 1)
      • 2. Hoh, B., Gruteser, M.: ‘Protecting location privacy through path confusion’. First Int. Conf. on Security and Privacy for Emerging Areas in Communications Networks, Proc., 2005, pp. 194205.
    2. 2)
      • 16. Gedik, B., Liu, L.: ‘Protecting location privacy with personalized k-anonymity: architecture and algorithms,IEEE Trans. Mobile Comput., 2008, 7, pp. 118 (doi: 10.1109/TMC.2007.1062).
    3. 3)
      • 5. Song, J.H., Wong, V.W.S., Leung, V.C.M.: ‘Wireless location privacy protection in vehicular ad-hoc networks’, Mobile Netw. Appl., 2010, 15, pp. 160171 (doi: 10.1007/s11036-009-0167-4).
    4. 4)
      • 6. Hoh, B., Gruteser, M., Herring, R., et al: ‘Virtual Trip Lines for Distributed Privacy-Preserving Traffic Monitoring’. Proc. Sixth Int. Conf. on Mobile Systems (Mobisys'08), Applications, and Services, 2008, pp. 1528.
    5. 5)
      • 8. Kaplan, E., Pedersen, T.B., Savas, E., Saygin, Y.: ‘Discovering private trajectories using background information’, Data Knowl. Eng., 2010, 69, pp. 723736 (doi: 10.1016/j.datak.2010.02.008).
    6. 6)
      • 22. Amro, B., Saygin, Y., Levi, A.: ‘PA-CTM: privacy aware collaborative traffic monitoring system using autonomous location update mechanism’, Fourth ACM SIGSPATIAL Int. Workshop on Security and Privacy in GIS and LBS SPRINGL 11, Chicago, USA, 2011.
    7. 7)
      • 17. Hu, H.B., Xu, J.L., Lee, D.L.: ‘PAM: an efficient and privacy-aware monitoring framework for continuously moving objects’, IEEE Trans. Knowl. Data Eng., 2010, 22, pp. 404419 (doi: 10.1109/TKDE.2009.86).
    8. 8)
      • 12. Dotzer, F.: ‘Privacy issues in vehicular ad hoc networks,’ Danezis, G., Martin, D., (Eds.) ‘Privacy enhancing technologies’, vol. 3856, 2006, pp. 197209.
    9. 9)
      • 19. Amro, B., Levi, A., Saygin, Y.: ‘CoRPPS: collusion resistant pseudonym providing system’. Third IEEE Int. Conf. on Privacy, Security, Risk and Trust (PASSAT'11)Boston, USA, 2011.
    10. 10)
      • 13. Zhang, C.Y., Huang, Y.: ‘Cloaking locations for anonymous location based services: a hybrid approach,Geoinformatica, 2009, 13, pp. 159182 (doi: 10.1007/s10707-008-0047-2).
    11. 11)
      • 14. Chi-Yin, C., Mohamed, F.M., Xuan, L.: ‘A peer-to-peer spatial cloaking algorithm for anonymous location-based service’. Proc. 14th Annual ACM Int. Symp. on Advances in Geographic Information Systems Arlington, 2006.
    12. 12)
      • 18. Amro, B., Saygin, Y., Levi, A.: ‘P2-CTM: privacy preserving collaborative traffic monitoring’, in Proceedings of the Third ACM SIGSPATIAL Int. Workshop on Security and Privacy in GIS and LBS, 2010.
    13. 13)
      • 24. Municipal Transportation Agency: ‘San Francesco transportation fact sheet.’, San Francesco, November 20102010.
    14. 14)
      • 23. Brinkhoff, T.: ‘A framework for generating network-based moving objects’, Geoinformatica, 2002, 6, pp. 153180 (doi: 10.1023/A:1015231126594).
    15. 15)
      • 4. Buttyan, L., Holczer, T., Vajda, I.: ‘On the effectiveness of changing pseudonyms to provide location privacy in VANETs’, in Security and Privacy in Ad-hoc and Sensor Networks (LNCS, 4572) 2007, pp. 129141.
    16. 16)
      • 1. Nadler, J.: ‘Traffic congestion and air quality.’ Association of Governments, Los Angeles2007.
    17. 17)
      • 11. Gerlach, M., Guttler, F.: ‘Privacy in VANETs using changing pseudonyms – ideal and real’, Vehicular Technology Conf.: IEEE 65th, 2007, pp. 25212525.
    18. 18)
      • 20. Sistla, P., Wolfson, O., Chamberlain, S., Dao, S.: ‘Modeling and querying moving objects’, Proc. Thirteenth Int. Conf. Data Engineering, 1997.
    19. 19)
      • 9. Raya, M., Papadimitratos, P., Hubaux, J.P.: ‘Securing vehicular communications,IEEE Wirel. Commun., 2006, 13, pp. 815 (doi: 10.1109/WC-M.2006.250352).
    20. 20)
      • 21. Hoh, B., Gruteser, M., Xiong, H., Alrabady, A.: ‘Preserving privacy in GPS traces via uncertainty-aware path cloaking’. Proc. 14th ACM Conf. Computer and Communications Security (CCS'07), 2007, pp. 161171.
    21. 21)
      • 3. Calandriello, G., Papadimitratos, P., Hubaux, J.P., Lioy, A.: ‘Efficient and robust pseudonymous authentication in VANET.Proc. Fourth ACM Int. Workshop on VANETS, USA, 2007, pp. 1927.
    22. 22)
      • 25. Lewis, J.S., Rachlow, J.L., Garton, E.O., Vierling, L.A.: ‘Effects of habitat on GPS collar performance: using data screening to reduce location error’, J. Appl. Ecol., 2007, 44, pp. 663671 (doi: 10.1111/j.1365-2664.2007.01286.x).
    23. 23)
      • 7. Sampigethaya, K., Li, M.Y., Huang, L.P., Poovendran, R.: ‘AMOEBA: robust location privacy scheme for VANETIEEE J. Sel. Areas Commun., 2007, 25, pp. 15691589 (doi: 10.1109/JSAC.2007.071007).
    24. 24)
      • 10. Freudiger, J., Raya, M., Felegyhazi, M.: ‘Mix-zones for location privacy in vehicular networks’, Proc. WiN-ITS, 2007.
    25. 25)
      • 15. Samarati, P.: ‘Protecting respondents' identities in microdata release’, IEEE Trans. Knowl. Data Eng., 2001, 13, pp. 10101027 (doi: 10.1109/69.971193).
    26. 26)
      • 2. Hoh, B., Gruteser, M.: ‘Protecting location privacy through path confusion’. First Int. Conf. on Security and Privacy for Emerging Areas in Communications Networks, Proc., 2005, pp. 194205.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-its.2011.0212
Loading

Related content

content/journals/10.1049/iet-its.2011.0212
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading