Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

access icon openaccess Private routing and ride-sharing using homomorphic encryption

Loading full text...

Full text loading...

/deliver/fulltext/iet-cps/5/4/IET-CPS.2019.0042.html;jsessionid=2dbpegxp9yhyr.x-iet-live-01?itemId=%2fcontent%2fjournals%2f10.1049%2fiet-cps.2019.0042&mimeType=html&fmt=ahah

References

    1. 1)
      • 56. Tran, J., Farokhi, F., Cantoni, M., et al: ‘Implementing homomorphic encryption based secure feedback control’, Control Eng. Pract., 2019. In Press.
    2. 2)
      • 42. Cheon, J.H., Han, K., Hong, S.M., et al: ‘Toward a secure drone system: flying with real-time homomorphic authenticated encryption’, IEEE Access, 2018, 6, pp. 2432524339.
    3. 3)
      • 35. Aïvodji, U.M., Huguenin, K., Huguet, M.J., et al: ‘SRide: a privacy-preserving ridesharing system’. Proc. 11th ACM Conf. on Security & Privacy in Wireless and Mobile Networks, Stockholm, Sweeden, 2018, pp. 4050.
    4. 4)
      • 48. Kolesnikov, V., Schneider, T.: ‘Improved garbled circuit: free XOR gates and applications’. Int. Colloquium on Automata, Languages, and Programming, Reykjavik, Iceland, 2008, pp. 486498.
    5. 5)
      • 1. Besselink, B., Turri, V., van de Hoef, S.H., et al: ‘Cyber-physical control of road freight transport’, Proc. IEEE, 2016, 104, (5), pp. 11281141.
    6. 6)
      • 5. Jaworski, P., Edwards, T., Moore, J., et al: ‘Cloud computing concept for intelligent transportation systems’. 2011 14th Int. IEEE Conf. on Intelligent Transportation Systems (ITSC), Washington, DC, USA., 2011, pp. 391936.
    7. 7)
      • 55. Dwork, C.: ‘Differential privacy: a survey of results’. Int. Conf. on Theory and Applications of Models of Computation, Xi'an, China, 2008, pp. 119.
    8. 8)
      • 45. Yao, A.C.: ‘Protocols for secure computations’. 1982. 23rd Annual Symp. on Foundations of Computer Science (SFCS ’08), Chicago, Illinois, USA., 1982, pp. 160164.
    9. 9)
      • 2. Hoh, B., Gruteser, M., Herring, R., et al: ‘Virtual trip lines for distributed privacy-preserving traffic monitoring’. Proc. of the 6th Int. Conf. on Mobile Systems, Applications, and Services (MobiSys ’08), New York, NY, USA, 2008, pp. 1528.
    10. 10)
      • 52. Yi, X., Paulet, R., Bertino, E.: ‘Homomorphic encryption and applications’, ‘Springer briefs in computer science’ (Springer International Publishing, 2014).
    11. 11)
      • 32. Rajendran, B., Pandey, A.K., Bindhumadhava, B.: ‘Secure and privacy preserving digital payment’. 2017 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computed, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI), 2017, pp. 15.
    12. 12)
      • 22. Beresford, A.R., Stajano, F.: ‘Location privacy in pervasive computing’, IEEE Pervasive Comput., 2003, 2, (1), pp. 4655.
    13. 13)
      • 43. Damgård, I., Pastro, V., Smart, N., et al: ‘Multiparty computation from somewhat homomorphic encryption’. Advances in Cryptology (CRYPTO 2012), 2012, pp. 643662.
    14. 14)
      • 25. Kido, H., Yanagisawa, Y., Satoh, T.: ‘An anonymous communication technique using dummies for location-based services’. Proc. of Int. Conf. on Pervasive Services, Santorini, Greece, 2005, pp. 8897.
    15. 15)
      • 10. Kargl, F., Friedman, A., Boreli, R.: ‘Differential privacy in intelligent transportation systems’. Proc. of the Sixth ACM Conf. on Security and Privacy in Wireless and Mobile Networks, Budapest, Hungary, 2013, pp. 107112.
    16. 16)
      • 41. Alexandru, A.B., Pappas, G.J.: ‘Encrypted LQG using labeled homomorphic encryption’. Proc. 10th ACM/IEEE Int. Conf. on Cyber-Physical Systems, Montreal, Canada, 2019, pp. 129140.
    17. 17)
      • 29. Badsha, S., Yi, X., Khalil, I., et al: ‘Privacy preserving location recommendations’. Int. Conf. on Web Information Systems Engineering, Dubai, United Arab Emirates, 2017, pp. 502516.
    18. 18)
      • 7. Timpner, J., Schürmann, D., Wolf, L.: ‘Trustworthy parking communities: helping your neighbor to find a space’, IEEE Trans. Dependable Secur. Comput., 2016, 13, (1), pp. 120132.
    19. 19)
      • 30. Yang, S., Tang, S., Zhang, X.: ‘Privacy-preserving k nearest neighbor query with authentication on road networks’, J. Parallel Distrib. Comput., 2019, 134, pp. 2536.
    20. 20)
      • 37. Pagnin, E., Gunnarsson, G., Talebi, P., et al: ‘TOPPool: time-aware optimized privacy-preserving ridesharing’, Proc. Privacy Enhancing Technol., 2019, 2019, (4), pp. 93111.
    21. 21)
      • 38. Farokhi, F., Shames, I., Batterham, N.: ‘Secure and private cloud-based control using semi-homomorphic encryption’. Proc. Sixth IFAC Workshop on Distributed Estimation and Control in Networked Systems, Tokyo, Japan, 2016.
    22. 22)
      • 53. Cormen, T.H., Leiserson, C.E., Rivest, R.L., et al: ‘Introduction to algorithms’ (MIT Press, USA., 2001).
    23. 23)
      • 14. De-Montjoye, Y.A., Hidalgo, C.A., Verleysen, M., et al: ‘Unique in the crowd: the privacy bounds of human mobility’, Sci. Rep., 2013, 3, p. 1376.
    24. 24)
      • 51. Paillier, P.: ‘Public-key cryptosystems based on composite degree residuosity classes’. Advances in Cryptology — 1999 Proc. Int. Conf. on the Theory and Application of Cryptographic Techniques (EUROCRYPT ’99), Prague, Czech Republic, 2–6 May 1999, pp. 223238.
    25. 25)
      • 31. Li, H., Dan, G., Borisov, N., et al: ‘Janus: privacy-preserving billing for dynamic charging of electric vehicles’ (University of Illinois at Urbana-Champaign, USA., 2019) Available at https://www.ideals.illinois.edu/handle/2142/104027.
    26. 26)
      • 50. Farokhi, F., Shames, I., Johansson, K.H.: ‘Private and secure coordination of matchmaking for heavy-duty vehicle platooning’. Proc. IFAC World Congress, Toulouse, France, 2017.
    27. 27)
      • 11. Canepa, E.S., Claudel, C.G.: ‘A framework for privacy and security analysis of probe-based traffic information systems’. Proc. Second ACM Int. Conf. on High Confidence Networked Systems, Philadelphia, Pennsylvania, USA., 2013, pp. 2532.
    28. 28)
      • 44. Gentry, C., Halevi, S., Smart, N.P.: ‘Homomorphic evaluation of the AES circuit’. Advances in Cryptology (CRYPTO 2012), 2012, pp. 850867.
    29. 29)
      • 17. Yi, X., Bertino, E.: ‘Private searching for single and conjunctive keywords on streaming data’. Proc. of the Tenth Annual ACM Workshop on Privacy in the Electronic Society, Chicago, Illinois, USA., 2011, pp. 153158.
    30. 30)
      • 13. Ogden, K.: ‘Privacy issues in electronic toll collection’, Transp Res C, Emerg Technol, 2001, 9, (2), pp. 123134.
    31. 31)
      • 16. Ostrovsky, R., Skeith, E.W.: ‘Private searching on streaming data’, J. Cryptol., 2007, 20, (4), pp. 397430.
    32. 32)
      • 60. Thierry, V.: ‘Handbook of mathematics’ (Books on Demand, Germany, 2015).
    33. 33)
      • 28. Ardagna, C.A., Cremonini, M., di Vimercati, S.D.C., et al: ‘An obfuscation-based approach for protecting location privacy’, IEEE Trans. Dependable Secur. Comput., 2011, 8, (1), pp. 1327.
    34. 34)
      • 3. Fries, R.N., Gahrooei, M.R., Chowdhury, M., et al: ‘Meeting privacy challenges while advancing intelligent transportation systems’, Transp Res C, Emerg Technol, 2012, 25, pp. 3445.
    35. 35)
      • 59. Kamm, L., Willemson, J.: ‘Secure floating point arithmetic and private satellite collision analysis’, Int. J. Inf. Secur., 2015, 14, (6), pp. 531548.
    36. 36)
      • 4. Yu, R., Kang, J., Huang, X., et al: ‘Mixgroup: accumulative pseudonym exchanging for location privacy enhancement in vehicular social networks’, IEEE Trans. Dependable Secur. Comput., 2016, 13, (1), pp. 93105.
    37. 37)
      • 33. Aïvodji, U.M., Gambs, S., Huguet, M.J., et al: ‘Meeting points in ridesharing: a privacy-preserving approach’, Transp Res C, Emerg Technol, 2016, 72, pp. 239253.
    38. 38)
      • 57. Cavallar, S., Dodson, B., Lenstra, A., et al: ‘Factorization of RSA-140 using the number field sieve’. Int. Conf. Theory and Application of Cryptology and Information Security, Kobe, Japan, 1999, pp. 195207.
    39. 39)
      • 21. Myles, G., Friday, A., Davies, N.: ‘Preserving privacy in environments with location-based applications’, IEEE Pervasive Comput., 2003, 2, (1), pp. 5664.
    40. 40)
      • 40. Lin, Y., Farokhi, F., Shames, I., et al: ‘Secure control of nonlinear systems using semi-homomorphic encryption’. 2018 IEEE Conf. on Decision and Control (CDC), Miami Beach, FL, USA., 2018, pp. 50025007.
    41. 41)
      • 39. Kogiso, K., Fujita, T.: ‘Cyber-security enhancement of networked control systems using homomorphic encryption’. Proc. 54th Annual Conf. on Decision and Control, Osaka, Japan, 2015, pp. 68366843.
    42. 42)
      • 27. Kerschbaum, F., Lim, H.W., Gudymenko, I.: ‘Privacy-preserving billing for eticketing systems in public transportation’. Proc. 12th ACM Workshop on Privacy in the Electronic Society, Berlin, Germany, 2013, pp. 143154.
    43. 43)
      • 36. Hallgren, P., Orlandi, C., Sabelfeld, A.: ‘Privatepool: privacy-preserving ridesharing’. 2017 IEEE 30th Computer Security Foundations Symp. (CSF), Santa Barbara, CA, USA., 2017, pp. 276291.
    44. 44)
    45. 45)
      • 15. Gao, J., Sun, L., Cai, M.: ‘Quantifying privacy vulnerability of individual mobility traces: a case study of license plate recognition data’, Transp Res C, Emerg Technol, 2019, 104, pp. 7894.
    46. 46)
      • 9. Cui, L., Xie, G., Qu, Y., et al: ‘Security and privacy in smart cities: challenges and opportunities’, IEEE Access, 2018, 6, pp. 4613446145.
    47. 47)
      • 18. Yi, X., Bertino, E., Vaidya, J., et al: ‘Private searching on streaming data based on keyword frequency’, IEEE Trans. Dependable Secur. Comput., 2014, 11, (2), pp. 155167.
    48. 48)
      • 12. Farokhi, F., Shames, I.: ‘Preserving privacy of agents in participatory-sensing schemes for traffic estimation’. Proc. 55th IEEE Conf. on Decision and Control, Las Vegas, NV, USA., 2016.
    49. 49)
      • 58. Chaum, D., Crépeau, C., Damgard, I.: ‘Multiparty unconditionally secure protocols’. Proc. 20th Annual ACM Symp. on Theory of Computing, Chicago, Illinois, USA., 1988, pp. 1119.
    50. 50)
      • 49. Kreuter, B., Shelat, A., Shen, C.H.: ‘Billion-gate secure computation with malicious adversaries’. USENIX Security Symp., Bellevue, WA, USA., 2012, vol. 12, pp. 285300.
    51. 51)
      • 6. Hoh, B., Iwuchukwu, T., Jacobson, Q., et al: ‘Enhancing privacy and accuracy in probe vehicle-based traffic monitoring via virtual trip lines’, IEEE Trans. Mob. Comput., 2012, 11, (5), pp. 849864.
    52. 52)
      • 54. Even, S., Goldreich, O., Lempel, A.: ‘A randomized protocol for signing contracts’, Commun. ACM, 1985, 28, (6), pp. 637647.
    53. 53)
      • 23. Bamba, B., Liu, L., Pesti, P., et al: ‘Supporting anonymous location queries in mobile environments with privacygrid’. Proc. 17th Int. Conf. on World Wide Web, Beijing, China, 2008, pp. 237246.
    54. 54)
      • 20. Vora, A.V., Hegde, S.: ‘Keyword-based private searching on cloud data along with keyword association and dissociation using cuckoo filter’, Int. J. Inf. Secur., 2019, 18, (3), pp. 305319.
    55. 55)
      • 8. Troncoso, C., Danezis, G., Kosta, E., et al: ‘Pripayd: privacy-friendly pay-as-you-drive insurance’, IEEE Trans. Dependable Secur. Comput., 2011, 8, (5), pp. 742755.
    56. 56)
      • 19. Boneh, D., Waters, B.: ‘Conjunctive, subset, and range queries on encrypted data’. Proc. Fourth Theory of Cryptography Conf. (TCC 2007), Amsterdam, The Netherlands, 21–24 February 2007, pp. 535554.
    57. 57)
      • 47. Lindell, Y., Pinkas, B.: ‘An efficient protocol for secure two-party computation in the presence of malicious adversaries’. Annual Int. Conf. on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, 2007, pp. 5278.
    58. 58)
      • 46. Lindell, Y., Pinkas, B.: ‘A proof of security of Yao's protocol for two-party computation’, J. Cryptol., 2009, 22, (2), pp. 161188.
    59. 59)
      • 26. Paulet, R., Kaosar, M.G., Yi, X., et al: ‘Privacy-preserving and content-protecting location based queries’, IEEE Trans. Knowl. Data Eng., 2014, 26, (5), pp. 12001210.
    60. 60)
      • 24. Yi, X., Paulet, R., Bertino, E.: ‘Nearest neighbor queries with location privacy’, ‘Homomorphic encryption and applications’ (Springer International Publishing, 2014), pp. 8199.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-cps.2019.0042
Loading

Related content

content/journals/10.1049/iet-cps.2019.0042
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address