Enhancing privacy in collaborative traffic-monitoring systems using autonomous location update

Collaborative traffic-monitoring (CTM) systems exploit the location information continuously collected from vehicles. Location data are very sensitive information that made privacy a major obstacle for the widespread usage of CTM systems. The way how this data are generated and used is very important for users' privacy and data quality as well. Recently, two CTM approaches have been proposed, the first relies on a dedicated infrastructure that is called vehicular ad hoc networks (VANETs), and the second utilises the existing underlying infrastructure such as cellular and wireless networks. In this study, the authors propose a privacy aware collaborative traffic monitoring system (PA-CTM) that considers the privacy and security properties of VANETs and existing infrastructures. PA-CTM provides a client server architecture that relies on existing infrastructures and enhances privacy by: (i) Using a robust pseudonym providing system for anonymous access. Pseudonyms enable users to be authenticated anonymously by the traffic server without having their identities revealed. It also allows revealing identities for law enforcement purposes when necessary. Users are able to change their pseudonyms and hence hide their complete trajectory information form traffic server. (ii) Utilising a novel autonomous location update mechanism (ALUM) that does not rely on a trusted third party and uses only local parameters (speed and direction) for triggering a location update or pseudonym change. These performance results showed that ALUM is effective for traffic monitoring in terms of both privacy and utility.

[1]  Chi-Yin Chow,et al.  A peer-to-peer spatial cloaking algorithm for anonymous location-based service , 2006, GIS '06.

[2]  Florian Dötzer,et al.  Privacy Issues in Vehicular Ad Hoc Networks , 2005, Privacy Enhancing Technologies.

[3]  Radha Poovendran,et al.  AMOEBA: Robust Location Privacy Scheme for VANET , 2007, IEEE Journal on Selected Areas in Communications.

[4]  Panagiotis Papadimitratos,et al.  Efficient and robust pseudonymous authentication in VANET , 2007, VANET '07.

[5]  Alexandre M. Bayen,et al.  Virtual trip lines for distributed privacy-preserving traffic monitoring , 2008, MobiSys '08.

[6]  Ling Liu,et al.  Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms , 2008, IEEE Transactions on Mobile Computing.

[7]  Thomas Brinkhoff,et al.  A Framework for Generating Network-Based Moving Objects , 2002, GeoInformatica.

[8]  Panagiotis Papadimitratos,et al.  SECURING VEHICULAR COMMUNICATIONS , 2006, IEEE Wireless Communications.

[9]  Victor C. M. Leung,et al.  Wireless Location Privacy Protection in Vehicular Ad-Hoc Networks , 2010, Mob. Networks Appl..

[10]  Levente Buttyán,et al.  On the Effectiveness of Changing Pseudonyms to Provide Location Privacy in VANETs , 2007, ESAS.

[11]  Pierangela Samarati,et al.  Protecting Respondents' Identities in Microdata Release , 2001, IEEE Trans. Knowl. Data Eng..

[12]  Yücel Saygin,et al.  CoRPPS: Collusion Resistant Pseudonym Providing System , 2011, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing.

[13]  Lee A. Vierling,et al.  Effects of habitat on GPS collar performance: using data screening to reduce location error , 2007 .

[14]  Marco Gruteser,et al.  Protecting Location Privacy Through Path Confusion , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[15]  Emre Kaplan,et al.  Discovering private trajectories using background information , 2010, Data Knowl. Eng..

[16]  Yan Huang,et al.  Cloaking locations for anonymous location based services: a hybrid approach , 2009, GeoInformatica.

[17]  Troels B. Sørensen,et al.  In-Band Interference Effects on UTRA LTE Uplink Resource Block Allocation , 2008, VTC Spring 2008 - IEEE Vehicular Technology Conference.

[18]  A. Prasad Sistla,et al.  Modeling and querying moving objects , 1997, Proceedings 13th International Conference on Data Engineering.

[19]  Hui Xiong,et al.  Preserving privacy in gps traces via uncertainty-aware path cloaking , 2007, CCS '07.

[20]  Jianliang Xu,et al.  PAM: An Efficient and Privacy-Aware Monitoring Framework for Continuously Moving Objects , 2010, IEEE Transactions on Knowledge and Data Engineering.