Privacy-Preserving Time-Sharing Services for Autonomous Vehicles

Sharing the Autonomous Vehicles (AV) has the potential to be the ultimate solution for overcoming the cost problem of these type of vehicles to fundamentally change the transportation systems. AVs enable the time sharing services where AV owners share their AVs at the times they don't need them. Such sharing could reduce the cost by enabling the owner to share the cost of the vehicle with other users. However, these services raise a severe privacy concern as the shared location and route data of the users are considered highly private and sensitive. In this paper we propose a privacy- preserving time-sharing scheme for AVs. Our approach enables the owner and the requester to perform a privacy-preserving matching on their transportation needs over the server without disclosing their routes to the server. To do so we use a set of Points of Interest (POI) locations as intermediate destinations in travel paths. Only if the matching is conflict-free and efficient, the owner and the requester share the details of the routes. We also show the accuracy of the proposed approach through extensive simulations on real data. It is shown that our enhanced POI selection scheme, with consideration of the traffic information and patterns in the area, outperforms the baseline scheme where the POIs are chosen randomly. Furthermore, it shows that our scheme achieves high accuracy in terms of resulting in false negatives compared to the ground truth.

[1]  Ruixuan Li,et al.  Efficient multi-keyword ranked query over encrypted data in cloud computing , 2014, Future Gener. Comput. Syst..

[2]  John Krumm,et al.  Inference Attacks on Location Tracks , 2007, Pervasive.

[3]  Xiaohui Liang,et al.  Fully Anonymous Profile Matching in Mobile Social Networks , 2013, IEEE Journal on Selected Areas in Communications.

[4]  Xiaohui Liang,et al.  A Secure Handshake Scheme with Symptoms-Matching for mHealthcare Social Network , 2011, Mob. Networks Appl..

[5]  Steven E. Shladover,et al.  Potential Cyberattacks on Automated Vehicles , 2015, IEEE Transactions on Intelligent Transportation Systems.

[6]  Jean-Pierre Hubaux,et al.  Privacy in Mobile Computing for Location-Sharing-Based Services , 2011, PETS.

[7]  John Krumm,et al.  A survey of computational location privacy , 2009, Personal and Ubiquitous Computing.

[8]  Gabriel Ghinita,et al.  Privacy for Location-based Services , 2013, Privacy for Location-based Services.

[9]  Berk Sunar,et al.  Exploring the Feasibility of Fully Homomorphic Encryption , 2015, IEEE Transactions on Computers.

[10]  Jung Hee Cheon,et al.  A Hybrid Scheme of Public-Key Encryption and Somewhat Homomorphic Encryption , 2015, IEEE Transactions on Information Forensics and Security.

[11]  Jean-Yves Le Boudec,et al.  Quantifying Location Privacy , 2011, 2011 IEEE Symposium on Security and Privacy.

[12]  Jelena V. Misic,et al.  Efficient Privacy-Preserving Chatting Scheme with Degree of Interest Verification for Vehicular Social Networks , 2014, 2015 IEEE Global Communications Conference (GLOBECOM).