A Digital Twin-based Privacy Enhancement Mechanism for the Automotive Industry

This paper discusses a Digital Twin demonstrator for privacy enhancement in the automotive industry. Here, the Digital Twin demonstrator is presented as a method for the design and implementation of privacy enhancement mechanisms, and is used to detect privacy concerns and minimize breaches and associated risks to which smart car drivers can be exposed through connected infotainment applications and services. The Digital Twin-based privacy enhancement demonstrator is designed to simulate variety of conditions that can occur in the smart car ecosystem. We firstly identify the core stakeholders (actors) in the smart car ecosystem, their roles and exposure to privacy vulnerabilities and associated risks. Secondly, we identify assets that consume and generate sensitive privacy data in smart cars, their functionalities, and relevant privacy concerns and risks. Thirdly, we design an infrastructure for collecting (i) real-time sensor data from smart cars and their assets, and (ii) environmental data, road and traffic data, generated through operational driving lifecycle. In order to ensure compliance of the collected data with privacy policies and regulations, e.g. with GDPR requirements for enforcement of the data subject’s rights, we design methods for the Digital Twin-based privacy enhancement demonstrator that are based on behavioural analytics informed by GDPR. We also perform data anonymization to minimize privacy risks and enable actions such as sending an automatic informed consent to the stakeholders.

[1]  Jee-Hyong Lee,et al.  An approach for multi-label classification by directed acyclic graph with label correlation maximization , 2016, Inf. Sci..

[2]  David Chaum,et al.  Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.

[3]  Michael W. Grieves,et al.  Digital Twin: Mitigating Unpredictable, Undesirable Emergent Behavior in Complex Systems , 2017 .

[4]  Ling Liu,et al.  Role-based and time-bound access and management of EHR data , 2014, Secur. Commun. Networks.

[5]  Pierangela Samarati,et al.  Exploiting cryptography for privacy-enhanced access control: A result of the PRIME Project , 2010, J. Comput. Secur..

[6]  Elisa Bertino,et al.  Privacy-preserving Digital Identity Management for Cloud Computing , 2009, IEEE Data Eng. Bull..

[7]  Archana Ganapathi,et al.  Analysis and Lessons from a Publicly Available Google Cluster Trace , 2010 .

[8]  Eric Horvitz,et al.  Patient controlled encryption: ensuring privacy of electronic medical records , 2009, CCSW '09.

[9]  Dimitrios Gunopulos,et al.  Discovering similar multidimensional trajectories , 2002, Proceedings 18th International Conference on Data Engineering.

[10]  Michael Dahlin,et al.  Machine Learning for On-Line Hardware Reconfiguration , 2007, IJCAI.

[11]  Xing Xie,et al.  Collaborative location and activity recommendations with GPS history data , 2010, WWW '10.

[12]  Geoffrey E. Hinton,et al.  Restricted Boltzmann machines for collaborative filtering , 2007, ICML '07.

[13]  Ruoyu Wu,et al.  Secure sharing of electronic health records in clouds , 2012, 8th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom).

[14]  Jan Camenisch,et al.  Design and implementation of the idemix anonymous credential system , 2002, CCS '02.

[15]  Arkajit Dey,et al.  PseudoID: Enhancing Privacy in Federated Login , 2010 .

[16]  Isaac Agudo,et al.  BlindIdM: A privacy-preserving approach for identity management as a service , 2014, International Journal of Information Security.

[17]  Thad Starner,et al.  Learning Significant Locations and Predicting User Movement with GPS , 2002, Proceedings. Sixth International Symposium on Wearable Computers,.

[18]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[19]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[20]  Henry A. Kautz,et al.  Inferring High-Level Behavior from Low-Level Sensors , 2003, UbiComp.

[21]  Jie Xu,et al.  An Approach for Characterizing Workloads in Google Cloud to Derive Realistic Resource Utilization Models , 2013, 2013 IEEE Seventh International Symposium on Service-Oriented System Engineering.

[22]  Xin Li,et al.  Conditional Restricted Boltzmann Machines for Multi-label Learning with Incomplete Labels , 2015, AISTATS.

[23]  Samee Ullah Khan,et al.  > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < 1 , 2008 .

[24]  Hiroki Arimura,et al.  Pattern Mining from Trajectory GPS Data , 2012, 2012 IIAI International Conference on Advanced Applied Informatics.

[25]  Siu-Ming Yiu,et al.  SPICE - Simple Privacy-Preserving Identity-Management for Cloud Environment , 2012, ACNS.

[26]  Geoffrey E. Hinton,et al.  Factored conditional restricted Boltzmann Machines for modeling motion style , 2009, ICML '09.

[27]  B. Schölkopf,et al.  Modeling Human Motion Using Binary Latent Variables , 2007 .

[28]  Ian Sommerville,et al.  Workload Classification & Software Energy Measurement for Efficient Scheduling on Private Cloud Platforms , 2011, ArXiv.

[29]  Dimitrios Gunopulos,et al.  Efficient Mining of Spatiotemporal Patterns , 2001, SSTD.

[30]  ZhangRui,et al.  Role-based and time-bound access and management of EHR data , 2014 .

[31]  Henry A. Kautz,et al.  Learning and inferring transportation routines , 2004, Artif. Intell..

[32]  Arshdeep Bahga,et al.  Synthetic Workload Generation for Cloud Computing Applications , 2011, J. Softw. Eng. Appl..

[33]  Hsien-Hsin S. Lee,et al.  Constructing a Non-Linear Model with Neural Networks for Workload Characterization , 2006, 2006 IEEE International Symposium on Workload Characterization.

[34]  Jian-Guo Bau,et al.  Secure Dynamic Access Control Scheme of PHR in Cloud Computing , 2012, Journal of Medical Systems.

[35]  Spyros Antonatos,et al.  FPVI: A scalable method for discovering privacy vulnerabilities in microdata , 2016, 2016 IEEE International Smart Cities Conference (ISC2).

[36]  Richard S. Sutton,et al.  Reinforcement Learning: An Introduction , 1998, IEEE Trans. Neural Networks.

[37]  Michael Backes,et al.  PRIMA: Privacy-Preserving Identity and Access Management at Internet-Scale , 2016, 2018 IEEE International Conference on Communications (ICC).

[38]  Javier López,et al.  Integrating OpenID with proxy re-encryption to enhance privacy in cloud-based identity services , 2012, 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings.

[39]  Thad Starner,et al.  Using GPS to learn significant locations and predict movement across multiple users , 2003, Personal and Ubiquitous Computing.

[40]  Sonali Aggarwal,et al.  Characterization of Hadoop Jobs Using Unsupervised Learning , 2010, 2010 IEEE Second International Conference on Cloud Computing Technology and Science.

[41]  Paresh Keshubhai Nakrani Smart Car Technologies: A Comprehensive Study of the State of the Art with Analysis and Trends , 2015 .

[42]  Chita R. Das,et al.  Towards characterizing cloud backend workloads: insights from Google compute clusters , 2010, PERV.

[43]  Jiawei Han,et al.  Efficient mining of partial periodic patterns in time series database , 1999, Proceedings 15th International Conference on Data Engineering (Cat. No.99CB36337).