PROS: A Privacy-Preserving Route-Sharing Service via Vehicular Fog Computing

In vehicular networks, route sharing is a novel cloud-computing service, where users form groups with their friends, set up a common destination, and share real-time locations and routes. However, to form these groups, users have to upload their group formation or participation requests to a remote service provider that consumes a significant amount of network bandwidths and incurs an increase in the response delay. Meanwhile, users’ sensitive information, such as identity and location, along with their group privacy, such as social graphs are entirely exposed to the service provider, thereby causing critical user privacy threats. Herein, we first introduce fog computing into a route-sharing service model in vehicular networks, where fog nodes preprocess user data. Second, group privacy is defined and three new attacks are considered, namely, member impersonation attack, group affiliation attack, and unlimited participation attack, under this model. Third, the privacy-preserving route-sharing (PROS) scheme is proposed to protect user and group privacy by utilizing improved anonymous authentication, rate limiting pseudonyms, modified privacy-preserving equality test, and location geo-indistinguishability. Finally, the security and privacy of the PROS scheme is analyzed and extensive experiments are conducted to compare its efficiency with existing schemes.

[1]  Mohsen Guizani,et al.  Big Data Mining of Users’ Energy Consumption Patterns in the Wireless Smart Grid , 2018, IEEE Wireless Communications.

[2]  Qiong Huang,et al.  Privacy-Preserving Location Sharing Services for Social Networks , 2017, IEEE Transactions on Services Computing.

[3]  Xuemin Shen,et al.  Securing Fog Computing for Internet of Things Applications: Challenges and Solutions , 2018, IEEE Communications Surveys & Tutorials.

[4]  Mingwu Zhang,et al.  Efficient Public Key Encryption With Equality Test Supporting Flexible Authorization , 2015, IEEE Transactions on Information Forensics and Security.

[5]  Xiaodong Lin,et al.  Secure Automated Valet Parking: A Privacy-Preserving Reservation Scheme for Autonomous Vehicles , 2018, IEEE Transactions on Vehicular Technology.

[6]  Pandi Vijayakumar,et al.  EAAP: Efficient Anonymous Authentication With Conditional Privacy-Preserving Scheme for Vehicular Ad Hoc Networks , 2017, IEEE Transactions on Intelligent Transportation Systems.

[7]  Pin-Han Ho,et al.  ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[8]  Mohsen Guizani,et al.  An effective key management scheme for heterogeneous sensor networks , 2007, Ad Hoc Networks.

[9]  Arun Kumar Sangaiah,et al.  CenLocShare: A centralized privacy-preserving location-sharing system for mobile online social networks , 2017, Future Gener. Comput. Syst..

[10]  Liehuang Zhu,et al.  Achieving differential privacy of trajectory data publishing in participatory sensing , 2017, Inf. Sci..

[11]  Hovav Shacham,et al.  Short Group Signatures , 2004, CRYPTO.

[12]  Ben Y. Zhao,et al.  Preserving Location Privacy in Geosocial Applications , 2014, IEEE Transactions on Mobile Computing.

[13]  Raja Lavanya,et al.  Fog Computing and Its Role in the Internet of Things , 2019, Advances in Computer and Electrical Engineering.

[14]  Liehuang Zhu,et al.  ASAP: An Anonymous Smart-Parking and Payment Scheme in Vehicular Networks , 2020, IEEE Transactions on Dependable and Secure Computing.

[15]  Rajeev Motwani,et al.  Link Privacy in Social Networks , 2008, ICDE.

[16]  Xiaodong Lin,et al.  Efficient and Privacy-Preserving Carpooling Using Blockchain-Assisted Vehicular Fog Computing , 2019, IEEE Internet of Things Journal.

[17]  Mohsen Guizani,et al.  Secure and Efficient Time Synchronization in Heterogeneous Sensor Networks , 2008, IEEE Transactions on Vehicular Technology.

[18]  Jian Pei,et al.  Preserving Privacy in Social Networks Against Neighborhood Attacks , 2008, 2008 IEEE 24th International Conference on Data Engineering.

[19]  Sangtae Ha,et al.  Clarifying Fog Computing and Networking: 10 Questions and Answers , 2017, IEEE Communications Magazine.

[20]  Ali A. Ghorbani,et al.  A Lightweight Privacy-Preserving Data Aggregation Scheme for Fog Computing-Enhanced IoT , 2017, IEEE Access.

[21]  Taeho Jung,et al.  Search me if you can: Privacy-preserving location query service , 2012, 2013 Proceedings IEEE INFOCOM.

[22]  Rajasekhar Mungara,et al.  A Routing-Driven Elliptic Curve Cryptography based Key Management Scheme for Heterogeneous Sensor Networks , 2014 .

[23]  Xiaodong Lin,et al.  A Privacy-Preserving Vehicular Crowdsensing-Based Road Surface Condition Monitoring System Using Fog Computing , 2017, IEEE Internet of Things Journal.

[24]  Chase Qishi Wu,et al.  Secure cell relay routing protocol for sensor networks , 2005, PCCC 2005. 24th IEEE International Performance, Computing, and Communications Conference, 2005..

[25]  Catuscia Palamidessi,et al.  Geo-indistinguishability: differential privacy for location-based systems , 2012, CCS.

[26]  Jan Camenisch,et al.  Efficient Group Signature Schemes for Large Groups (Extended Abstract) , 1997, CRYPTO.

[27]  Elaine Shi,et al.  Opaak: using mobile phones to limit anonymous identities online , 2012, MobiSys '12.

[28]  Xiaojiang Du,et al.  A survey of key management schemes in wireless sensor networks , 2007, Comput. Commun..

[29]  Mohsen Guizani,et al.  Transactions papers a routing-driven Elliptic Curve Cryptography based key management scheme for Heterogeneous Sensor Networks , 2009, IEEE Transactions on Wireless Communications.