Skip to main content
Top

2019 | OriginalPaper | Chapter

11. A Novel Privacy Preserving Scheme for Cloud-Enabled Internet of Vehicles Users

Authors : Leila Benarous, Benamar Kadri

Published in: Security, Privacy and Trust in the IoT Environment

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The Internet of Vehicles (IoV) is the Internet of Things where “things” refer to vehicles. Due to its huge amount of shared data and various types of offered services, relying on the use of cloud as infrastructure is fundamental. Most of road services, regardless of whether they are of an infotainment or a safety type, use location and identity information. As a consequence, the privacy of road users is threatened, and therefore preserving such privacy and safety has also become essential. This chapter presents an overview of existing privacy-preserving strategies and develops a proposal for a novel solution which allows its users to benefit from cloud-enabled IoV location-based services and safety applications, anonymously and securely. The performance of the proposed solution is studied by simulating it against a modeled global passive attacker and comparing it to a state-of-the-art solution. The results are optimistic and out-perform the ones compared with. The scheme ensures that the privacy is preserved with more than 70% against semantic, syntactic, observation mapping, and linkage mapping attacks.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Kaiwartya O, Abdullah AH, Cao Y, Altameem A, Prasad M, Lin CT, Liu X (2016) Internet of Vehicles: motivation, layered architecture, network model, challenges, and future aspects. IEEE Access 4:5356–5373CrossRef Kaiwartya O, Abdullah AH, Cao Y, Altameem A, Prasad M, Lin CT, Liu X (2016) Internet of Vehicles: motivation, layered architecture, network model, challenges, and future aspects. IEEE Access 4:5356–5373CrossRef
2.
go back to reference Yang FC, Wang SG, Li JL et al (2014) An overview of Internet of Vehicles. China Commun 11(10):1–15CrossRef Yang FC, Wang SG, Li JL et al (2014) An overview of Internet of Vehicles. China Commun 11(10):1–15CrossRef
3.
go back to reference Mu MP, Khan KUR (2015) Vehicular cloud computing: leading towards tomorrow’s Internet of Vehicles. J Wirel Sens Netw 2(1):1–10 Mu MP, Khan KUR (2015) Vehicular cloud computing: leading towards tomorrow’s Internet of Vehicles. J Wirel Sens Netw 2(1):1–10
4.
go back to reference Lucero S (2016) C-V2X offers a cellular alternative to IEEE 802.11p/DSRC. IHS TECHNOLOGY Internet Everything 3:1–3 Lucero S (2016) C-V2X offers a cellular alternative to IEEE 802.11p/DSRC. IHS TECHNOLOGY Internet Everything 3:1–3
5.
go back to reference Hou XS, Li Y, Chen M et al (2016) Vehicular fog computing: a viewpoint of vehicles as the infrastructures. IEEE Trans Veh Technol 65(6):3860–3873CrossRef Hou XS, Li Y, Chen M et al (2016) Vehicular fog computing: a viewpoint of vehicles as the infrastructures. IEEE Trans Veh Technol 65(6):3860–3873CrossRef
6.
go back to reference Qin B, Wu QH, Ferrer JD et al (2011) Preserving security and privacy in large scale VANETS. In: 13th International conference on information and communications security, Beijing, China Qin B, Wu QH, Ferrer JD et al (2011) Preserving security and privacy in large scale VANETS. In: 13th International conference on information and communications security, Beijing, China
7.
go back to reference Pfleeger CP, Pfleeger SL, Margulies J (2015) Security in computing, 5th edn. Prentice Hall, Upper Saddle River, NJ Pfleeger CP, Pfleeger SL, Margulies J (2015) Security in computing, 5th edn. Prentice Hall, Upper Saddle River, NJ
8.
go back to reference Benarous L, Kadri B, Bouridane A (2017) A survey on cyber security evolution and threats: biometric authentication solutions. In: Jiang R, Al-maadeed S, Bouridane A, Crookes P, Beghdadi A (eds) Biometric security and privacy. Signal processing for security technologies. Springer, Cham Benarous L, Kadri B, Bouridane A (2017) A survey on cyber security evolution and threats: biometric authentication solutions. In: Jiang R, Al-maadeed S, Bouridane A, Crookes P, Beghdadi A (eds) Biometric security and privacy. Signal processing for security technologies. Springer, Cham
9.
go back to reference Singh DR, Yadav RS (2018) A state-of-art approach to misbehaviour detection and revocation in VANET: survey. Int J Ad Hoc Ubiquitous Comput 28(2):77–93CrossRef Singh DR, Yadav RS (2018) A state-of-art approach to misbehaviour detection and revocation in VANET: survey. Int J Ad Hoc Ubiquitous Comput 28(2):77–93CrossRef
10.
go back to reference Khodaei M, Papadimitratos P (2018) Efficient, scalable, and resilient vehicle-centric certificate revocation list distribution in VANETs. In: Proceedings of the 11th ACM conference on security & privacy in wireless and mobile networks Khodaei M, Papadimitratos P (2018) Efficient, scalable, and resilient vehicle-centric certificate revocation list distribution in VANETs. In: Proceedings of the 11th ACM conference on security & privacy in wireless and mobile networks
11.
go back to reference Fangchun Y, Shangguang W, Jinglin L, Zhihan L, Qibo S (2014) An overview of Internet of Vehicles. China Commun 11(10):1–15 Fangchun Y, Shangguang W, Jinglin L, Zhihan L, Qibo S (2014) An overview of Internet of Vehicles. China Commun 11(10):1–15
12.
go back to reference Gerla M, Lee EK, Pau G, Lee U (2014) Internet of Vehicles: from intelligent grid to autonomous cars and vehicular clouds. Internet of Things (WF-IoT), IEEE World Forum Gerla M, Lee EK, Pau G, Lee U (2014) Internet of Vehicles: from intelligent grid to autonomous cars and vehicular clouds. Internet of Things (WF-IoT), IEEE World Forum
13.
go back to reference Kang J, Yu R, Huang X, Jonsson M, Bogucka H, Gjessing S, Zhang Y (2016) Location privacy attacks and defenses in cloud-enabled internet of Vehicles. IEEE Wirel Commun 23(5):52–59CrossRef Kang J, Yu R, Huang X, Jonsson M, Bogucka H, Gjessing S, Zhang Y (2016) Location privacy attacks and defenses in cloud-enabled internet of Vehicles. IEEE Wirel Commun 23(5):52–59CrossRef
14.
go back to reference Warren SD, Brandeis LD (1890) The right to privacy. Harvard Law Review, pp 193–220 Warren SD, Brandeis LD (1890) The right to privacy. Harvard Law Review, pp 193–220
15.
go back to reference Lukács A (2016) What is privacy? The history and definition of privacy, University of Szeged Lukács A (2016) What is privacy? The history and definition of privacy, University of Szeged
16.
go back to reference Boualouache A (2016) Security and privacy in vehicular networks. Dissertation, University of sciences and Technology Houari Boumediene (USTHB) Boualouache A (2016) Security and privacy in vehicular networks. Dissertation, University of sciences and Technology Houari Boumediene (USTHB)
17.
go back to reference Petit J, Schaub F, Feiri M, Kargl F (2015) Pseudonym schemes in vehicular networks: a survey. IEEE Commun Surv Tutor 17(1):228–255CrossRef Petit J, Schaub F, Feiri M, Kargl F (2015) Pseudonym schemes in vehicular networks: a survey. IEEE Commun Surv Tutor 17(1):228–255CrossRef
18.
go back to reference Boualouache A, Senouci SM, Moussaoui S (2017) A survey on pseudonym changing strategies for vehicular ad-hoc networks. IEEE Communications Surveys & Tutorials Boualouache A, Senouci SM, Moussaoui S (2017) A survey on pseudonym changing strategies for vehicular ad-hoc networks. IEEE Communications Surveys & Tutorials
19.
go back to reference Committee of Intelligent Transportation Systems (2013) IEEE standard for wireless access in vehicular environments–security services for applications and management messages. IEEE Std 1609:2 Committee of Intelligent Transportation Systems (2013) IEEE standard for wireless access in vehicular environments–security services for applications and management messages. IEEE Std 1609:2
20.
go back to reference Sampigethaya K, Li M, Huang L, Poovendran R (2007) AMOEBA: robust location privacy scheme for VANET. IEEE J Sel Areas Commun 25:8CrossRef Sampigethaya K, Li M, Huang L, Poovendran R (2007) AMOEBA: robust location privacy scheme for VANET. IEEE J Sel Areas Commun 25:8CrossRef
21.
go back to reference Xingjun S, Huibin X (2014) An effective scheme for location privacy in VANETs. J Netw 9(8):2239 Xingjun S, Huibin X (2014) An effective scheme for location privacy in VANETs. J Netw 9(8):2239
22.
go back to reference Freudiger J, Raya M, Félegyházi M, Papadimitratos P, Hubaux JP (2007) Mix-zones for location privacy in vehicular networks. In: ACM workshop on wireless networking for intelligent transportation systems Freudiger J, Raya M, Félegyházi M, Papadimitratos P, Hubaux JP (2007) Mix-zones for location privacy in vehicular networks. In: ACM workshop on wireless networking for intelligent transportation systems
23.
go back to reference Memon I, Chen L, Arain QA, Memon H, Chen G (2018) Pseudonym changing strategy with multiple mix zones for trajectory privacy protection in road networks. Int J Commun Syst 31:1 Memon I, Chen L, Arain QA, Memon H, Chen G (2018) Pseudonym changing strategy with multiple mix zones for trajectory privacy protection in road networks. Int J Commun Syst 31:1
24.
go back to reference Arain QA, Memon I, Deng Z, Memon MH, Mangi FA, Zubedi A (2018) Location monitoring approach: multiple mix-zones with location privacy protection based on traffic flow over road networks. Multimed Tools Appl 77(5):5563–5607CrossRef Arain QA, Memon I, Deng Z, Memon MH, Mangi FA, Zubedi A (2018) Location monitoring approach: multiple mix-zones with location privacy protection based on traffic flow over road networks. Multimed Tools Appl 77(5):5563–5607CrossRef
25.
go back to reference Guo N, Ma L, Gao T (2018) Independent mix zone for location privacy in vehicular networks. IEEE Access 6:16842–16850CrossRef Guo N, Ma L, Gao T (2018) Independent mix zone for location privacy in vehicular networks. IEEE Access 6:16842–16850CrossRef
26.
go back to reference Freudiger J, Shokri R, Hubaux JP (2009) On the optimal placement of mix zones. In: International symposium on privacy enhancing technologies symposium. Springer, Berlin, HeidelbergCrossRef Freudiger J, Shokri R, Hubaux JP (2009) On the optimal placement of mix zones. In: International symposium on privacy enhancing technologies symposium. Springer, Berlin, HeidelbergCrossRef
27.
go back to reference Lu R, Lin X, Luan TH, Liang X, Shen X (2012) Pseudonym changing at social spots: an effective strategy for location privacy in VANETS. IEEE Trans Veh Technol 61:1CrossRef Lu R, Lin X, Luan TH, Liang X, Shen X (2012) Pseudonym changing at social spots: an effective strategy for location privacy in VANETS. IEEE Trans Veh Technol 61:1CrossRef
30.
go back to reference Emara K (2016) Safety-aware location privacy in vehicular ad-hoc networks, Dissertation, University of München Emara K (2016) Safety-aware location privacy in vehicular ad-hoc networks, Dissertation, University of München
31.
go back to reference Liao J, Li J (2009) Effectively changing pseudonyms for privacy protection in VANETS. In: 10th IEEE international symposium on pervasive systems, algorithms, and networks (ISPAN) Liao J, Li J (2009) Effectively changing pseudonyms for privacy protection in VANETS. In: 10th IEEE international symposium on pervasive systems, algorithms, and networks (ISPAN)
32.
go back to reference Boualouache A, Moussaoui S (2017) TAPCS: traffic-aware pseudonym changing strategy for VANETs. Peer-to-Peer Netw Appl 10(4):1008–1020CrossRef Boualouache A, Moussaoui S (2017) TAPCS: traffic-aware pseudonym changing strategy for VANETs. Peer-to-Peer Netw Appl 10(4):1008–1020CrossRef
Metadata
Title
A Novel Privacy Preserving Scheme for Cloud-Enabled Internet of Vehicles Users
Authors
Leila Benarous
Benamar Kadri
Copyright Year
2019
DOI
https://doi.org/10.1007/978-3-030-18075-1_11

Premium Partner