Vehicle Witnesses as a Service: Leveraging Vehicles as Witnesses on the Road in VANET Clouds

Inspired by the dramatic evolution of VANE clouds, this paper proposes a new VANET-cloud service called VWaaS (Vehicle Witnesses as a Service) in which vehicles moving on the road serve as anonymous witnesses of designated events such as a terrorist attack or a deadly accident. When confronted the events, a group of vehicles with mounted cameras collaborate with roadside stationary cameras to take pictures of the site of interest (SoI) around them, and send the pictures to the cloud infrastructure anonymously. The pictures are sent to the cloud in a way that the privacy of the senders can be protected, and kept by the cloud for future investigation. However, for the case that the pictures are used as an evidence of court trial, we made the privacy protection to be conditional and thus can be revoked by authorized entity(s) if necessary.

[1]  Zhendong Ma,et al.  Privacy in inter-vehicular networks: Why simple pseudonym change is not enough , 2010, 2010 Seventh International Conference on Wireless On-demand Network Systems and Services (WONS).

[2]  David Antolino Rivas,et al.  Security on VANETs: Privacy, misbehaving nodes, false information and secure data aggregation , 2011, J. Netw. Comput. Appl..

[3]  T. Elgamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.

[4]  Giovanni Pau,et al.  Pics-on-wheels: Photo surveillance in the vehicular cloud , 2013, 2013 International Conference on Computing, Networking and Communications (ICNC).

[5]  Frank Stajano,et al.  Mix zones: user privacy in location-aware services , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.

[6]  Michael Weber,et al.  Pseudonym-On-Demand: A New Pseudonym Refill Strategy for Vehicular Communications , 2008, 2008 IEEE 68th Vehicular Technology Conference.

[7]  Stephan Olariu,et al.  Towards autonomous vehicular clouds , 2011, EAI Endorsed Trans. Mob. Commun. Appl..

[8]  Victor S. Miller,et al.  Use of Elliptic Curves in Cryptography , 1985, CRYPTO.

[9]  Taher El Gamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.

[10]  Yi Wang,et al.  On full-view coverage in camera sensor networks , 2011, 2011 Proceedings IEEE INFOCOM.

[11]  Xinbing Wang,et al.  Achieving Full View Coverage with Randomly-Deployed Heterogeneous Camera Sensors , 2012, 2012 IEEE 32nd International Conference on Distributed Computing Systems.

[12]  Junggab Son,et al.  TIaaS: Secure Cloud-assisted Traffic Information Dissemination in Vehicular Ad Hoc Networks , 2013, 2013 13th IEEE/ACM International Symposium on Cluster, Cloud, and Grid Computing.

[13]  Heekuck Oh,et al.  Towards Privacy Aware Pseudonymless Strategy for Avoiding Profile Generation in VANET , 2009, WISA.

[14]  Souhwan Jung,et al.  Mutual Identification and Key Exchange Scheme in Secure VANETs Based on Group Signature , 2010, 2010 7th IEEE Consumer Communications and Networking Conference.

[15]  Rui L. Aguiar,et al.  Support of Anonymity in VANETs - Putting Pseudonymity into Practice , 2007, 2007 IEEE Wireless Communications and Networking Conference.

[16]  Reinhard German,et al.  Strong and affordable location privacy in VANETs: Identity diffusion using time-slots and swapping , 2010, 2010 IEEE Vehicular Networking Conference.

[17]  Sangjin Kim,et al.  Rethinking Vehicular Communications: Merging VANET with cloud computing , 2012, 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings.

[18]  Pin-Han Ho,et al.  An Efficient Identity-Based Batch Verification Scheme for Vehicular Sensor Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[19]  Maxim Raya,et al.  Securing vehicular ad hoc networks , 2007, J. Comput. Secur..