P2-CTM: privacy preserving collaborative traffic monitoring

Collaborative Traffic Monitoring (CTM) systems exploit the location information continuously collected from cars. Users collaborate by providing their location information to have a global picture of the current traffic in real-time. However, location is very sensitive information. Therefore, privacy is a major obstacle for the widespread usage of CTM systems. In this paper, we present our position for a novel system addressing the security and especially privacy problems of CTM systems. Existing CTM solutions generally use two different methodologies. The first one is the dedicated infrastructure approach, also called VANETs (Vehicular Ad Hoc Networks), where a dedicated infrastructure for communication is deployed. The second methodology utilizes existing wireless networks, such as GSM, GPRS, EDGE, UMTS and Wi-Fi. Our P2-CTM (Privacy Preserving CTM) approach combines the best parts of these two existing approaches. In order to address the privacy challenge in CTM systems, we propose a privacy preserving location update mechanism that meets the requirements of both traffic monitoring and map generation. A privacy metric is adopted to evaluate the location update mechanism. We also discuss the performance issues regarding the location update mechanism. We aim to have a sound indication for our system from the points of view of privacy, security and performance.

[1]  Panagiotis Papadimitratos,et al.  Secure vehicular communication systems: design and architecture , 2008, IEEE Communications Magazine.

[2]  Latanya Sweeney,et al.  Achieving k-Anonymity Privacy Protection Using Generalization and Suppression , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[3]  Michael E. Theologou,et al.  Architecture and Scalability Issues for the Provision of Anonymous Real-Time Mobile Community Services , 2007, 2007 IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications.

[4]  Hui Xiong,et al.  Preserving privacy in gps traces via uncertainty-aware path cloaking , 2007, CCS '07.

[5]  Florian Dötzer,et al.  Privacy Issues in Vehicular Ad Hoc Networks , 2005, Privacy Enhancing Technologies.

[6]  Maxim Raya,et al.  Mix-Zones for Location Privacy in Vehicular Networks , 2007 .

[7]  Panagiotis Papadimitratos,et al.  Efficient and robust pseudonymous authentication in VANET , 2007, VANET '07.

[8]  Pierangela Samarati,et al.  Protecting Respondents' Identities in Microdata Release , 2001, IEEE Trans. Knowl. Data Eng..

[9]  Panagiotis Papadimitratos,et al.  SECURING VEHICULAR COMMUNICATIONS , 2006, IEEE Wireless Communications.

[10]  Mong-Li Lee,et al.  Supporting Frequent Updates in R-Trees: A Bottom-Up Approach , 2003, VLDB.

[11]  George Danezis,et al.  A study on the value of location privacy , 2006, WPES '06.

[12]  Sukho Lee,et al.  Indexing the current positions of moving objects using the lazy update R-tree , 2002, Proceedings Third International Conference on Mobile Data Management MDM 2002.

[13]  Alexandre M. Bayen,et al.  Virtual trip lines for distributed privacy-preserving traffic monitoring , 2008, MobiSys '08.

[14]  Elisa Bertino,et al.  Location Privacy in Moving-Object Environments , 2009, Trans. Data Priv..

[15]  Marco Gruteser,et al.  USENIX Association , 1992 .

[16]  Matthias Gerlach,et al.  Privacy in VANETs using Changing Pseudonyms - Ideal and Real , 2007, 2007 IEEE 65th Vehicular Technology Conference - VTC2007-Spring.

[17]  Marco Gruteser,et al.  Protecting Location Privacy Through Path Confusion , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[18]  Levente Buttyán,et al.  On the Effectiveness of Changing Pseudonyms to Provide Location Privacy in VANETs , 2007, ESAS.

[19]  Ling Liu,et al.  Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms , 2008, IEEE Transactions on Mobile Computing.

[20]  Jianliang Xu,et al.  PAM: An Efficient and Privacy-Aware Monitoring Framework for Continuously Moving Objects , 2010, IEEE Transactions on Knowledge and Data Engineering.