A Novel Privacy Preserving Scheme for Cloud-Enabled Internet of Vehicles Users

The Internet of Vehicles (IoV) is the Internet of Things where “things” refer to vehicles. Due to its huge amount of shared data and various types of offered services, relying on the use of cloud as infrastructure is fundamental. Most of road services, regardless of whether they are of an infotainment or a safety type, use location and identity information. As a consequence, the privacy of road users is threatened, and therefore preserving such privacy and safety has also become essential. This chapter presents an overview of existing privacy-preserving strategies and develops a proposal for a novel solution which allows its users to benefit from cloud-enabled IoV location-based services and safety applications, anonymously and securely. The performance of the proposed solution is studied by simulating it against a modeled global passive attacker and comparing it to a state-of-the-art solution. The results are optimistic and out-perform the ones compared with. The scheme ensures that the privacy is preserved with more than 70% against semantic, syntactic, observation mapping, and linkage mapping attacks.

[1]  Abdelwahab Boualouache,et al.  A Survey on Pseudonym Changing Strategies for Vehicular Ad-Hoc Networks , 2017, IEEE Communications Surveys & Tutorials.

[2]  Ranvijay,et al.  A state-of-art approach to misbehaviour detection and revocation in VANET: survey , 2018, Int. J. Ad Hoc Ubiquitous Comput..

[3]  Josep Domingo-Ferrer,et al.  Preserving Security and Privacy in Large-Scale VANETs , 2011, ICICS.

[4]  Depeng Jin,et al.  Vehicular Fog Computing: A Viewpoint of Vehicles as the Infrastructures , 2016, IEEE Transactions on Vehicular Technology.

[5]  Imran Memon,et al.  Pseudonym changing strategy with multiple mix zones for trajectory privacy protection in road networks , 2018, Int. J. Commun. Syst..

[6]  Radha Poovendran,et al.  AMOEBA: Robust Location Privacy Scheme for VANET , 2007, IEEE Journal on Selected Areas in Communications.

[7]  Karim Emara,et al.  Safety-aware Location Privacy in Vehicular Ad-hoc Networks , 2016 .

[8]  Lukács Adrienn,et al.  What is Privacy? The History and Definition of Privacy , 2016 .

[9]  Jianqing Li,et al.  Effectively Changing Pseudonyms for Privacy Protection in VANETs , 2009, 2009 10th International Symposium on Pervasive Systems, Algorithms, and Networks.

[10]  Huibin Xu,et al.  An Effective Scheme for Location Privacy in VANETs , 2014, J. Networks.

[11]  Mario Gerla,et al.  Internet of vehicles: From intelligent grid to autonomous cars and vehicular clouds , 2014, 2014 IEEE World Forum on Internet of Things (WF-IoT).

[12]  Yao Zhao,et al.  An efficient adaptive failure detection mechanism for cloud platform based on volterra series , 2014 .

[13]  Maxim Raya,et al.  Mix-Zones for Location Privacy in Vehicular Networks , 2007 .

[14]  Zhongliang Deng,et al.  Location monitoring approach: multiple mix-zones with location privacy protection based on traffic flow over road networks , 2018, Multimedia Tools and Applications.

[15]  Hanna Bogucka,et al.  Location privacy attacks and defenses in cloud-enabled internet of vehicles , 2016, IEEE Wireless Communications.

[16]  Yang Xiang,et al.  A novel organizing scheme of single topic user group based on trust chain model in social network , 2018, Int. J. Commun. Syst..

[17]  Frank Kargl,et al.  Pseudonym Schemes in Vehicular Networks: A Survey , 2015, IEEE Communications Surveys & Tutorials.

[18]  Abdelwahab Boualouache,et al.  TAPCS: Traffic-aware pseudonym changing strategy for VANETs , 2017, Peer-to-Peer Netw. Appl..

[19]  Louis D. Brandeis,et al.  The Right to Privacy , 1890 .

[20]  Tianhan Gao,et al.  Independent Mix Zone for Location Privacy in Vehicular Networks , 2018, IEEE Access.

[21]  Tao Zhang,et al.  Special Section on Telematics Advances for Vehicular Communication Networks , 2012, IEEE Trans. Veh. Technol..

[22]  Panagiotis Papadimitratos,et al.  Efficient, Scalable, and Resilient Vehicle-Centric Certificate Revocation List Distribution in VANETs , 2018, WISEC.

[23]  Benamar Kadri,et al.  A Survey on Cyber Security Evolution and Threats: Biometric Authentication Solutions , 2017 .

[24]  Reza Shokri,et al.  On the Optimal Placement of Mix Zones , 2009, Privacy Enhancing Technologies.

[25]  Shangguang Wang,et al.  An overview of Internet of Vehicles , 2014 .

[26]  Xiaohui Liang,et al.  Pseudonym Changing at Social Spots: An Effective Strategy for Location Privacy in VANETs , 2012, IEEE Transactions on Vehicular Technology.

[27]  Chin-Teng Lin,et al.  Internet of Vehicles: Motivation, Layered Architecture, Network Model, Challenges, and Future Aspects , 2016, IEEE Access.