Skip to main content
Erschienen in: The Journal of Supercomputing 11/2020

09.12.2019

A survey of local differential privacy for securing internet of vehicles

verfasst von: Ping Zhao, Guanglin Zhang, Shaohua Wan, Gaoyang Liu, Tariq Umer

Erschienen in: The Journal of Supercomputing | Ausgabe 11/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Internet of connected vehicles (IoV) are expected to enable intelligent traffic management, intelligent dynamic information services, intelligent vehicle control, etc. However, vehicles’ data privacy is argued to be a major barrier toward the application and development of IoV, thus causing a wide range of attentions. Local differential privacy (LDP) is the relaxed version of the privacy standard, differential privacy, and it can protect users’ data privacy against the untrusted third party in the worst adversarial setting. Therefore, LDP is potential to protect vehicles’ data privacy in the practical scenario, IoV, although vehicles exhibit unique features, e.g., high mobility, short connection times, etc. To this end, in this paper, we first give an overview of the existing LDP techniques and present the thorough comparisons of these work in terms of advantages, disadvantages, and computation cost, in order to get the readers well acquainted with LDP. Thereafter, we investigate the potential applications of LDP in securing IoV in detail. Last, we direct several future research directions of LDP in IoV, to bridge the gaps between LDP researches and the privacy preservation in IoV. The originality of this survey is that it is the first work to summarize and compare the existing LDP research work and that it also does an pioneering work toward the in-depth analysis of the potential applications of LDP in privacy preservation in IoV.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat Corrigan-Gibbs H, Boneh D (2017) Prio: private, robust, and scalable computation of aggregate statistics. In: Proceeding of NSDI Corrigan-Gibbs H, Boneh D (2017) Prio: private, robust, and scalable computation of aggregate statistics. In: Proceeding of NSDI
4.
Zurück zum Zitat Zhao P, Li J, Zeng F, Xiao F, Wang C, Jiang H, Jiang H (2018) ILLIA: enabling k-anonymity-based privacy preserving against location injection attacks in continuous LBS queries. IEEE Internet Things J 99:1–10 Zhao P, Li J, Zeng F, Xiao F, Wang C, Jiang H, Jiang H (2018) ILLIA: enabling k-anonymity-based privacy preserving against location injection attacks in continuous LBS queries. IEEE Internet Things J 99:1–10
5.
Zurück zum Zitat Jiang H, Zhao P, Wang C (2018) RobLoP: towards robust privacy preserving against location dependent attacks in continuous LBS queries. IEEE/ACM Trans Netw 26(2):1018–1032 Jiang H, Zhao P, Wang C (2018) RobLoP: towards robust privacy preserving against location dependent attacks in continuous LBS queries. IEEE/ACM Trans Netw 26(2):1018–1032
8.
Zurück zum Zitat Zhang Y, Chen Q, Zhong S (2017) Efficient and privacy-preserving min and k th min computations in mobile sensing systems. IEEE Trans Dependable Secure Comput 14(1):9–21 Zhang Y, Chen Q, Zhong S (2017) Efficient and privacy-preserving min and k th min computations in mobile sensing systems. IEEE Trans Dependable Secure Comput 14(1):9–21
9.
Zurück zum Zitat Ben-Sasson E, Chiesa A, Genkin D (2013) SNARKs for c: verifying program executions succinctly and in zero knowledge. In: Advances in Cryptology-CRYPTO, pp 90–108 Ben-Sasson E, Chiesa A, Genkin D (2013) SNARKs for c: verifying program executions succinctly and in zero knowledge. In: Advances in Cryptology-CRYPTO, pp 90–108
11.
Zurück zum Zitat Araki T, Furukawa J, Lindell Y, Nof A, Ohara K (2016) High-throughput semi-honest secure three-party computation with an honest majority. In: Proceedin of ACM SIGSAC Conference on Computer and Communications Security Araki T, Furukawa J, Lindell Y, Nof A, Ohara K (2016) High-throughput semi-honest secure three-party computation with an honest majority. In: Proceedin of ACM SIGSAC Conference on Computer and Communications Security
12.
Zurück zum Zitat Bonawitz K, Ivanov V, Kreuter B, Marcedone A, McMahan HB, Patel S, Ramage D, Segal A, Seth K (2017) Practical secure aggregation for privacy-preserving machine learning. In: Proceeding of ACM SIGSAC Conference on Computer and Communications Security Bonawitz K, Ivanov V, Kreuter B, Marcedone A, McMahan HB, Patel S, Ramage D, Segal A, Seth K (2017) Practical secure aggregation for privacy-preserving machine learning. In: Proceeding of ACM SIGSAC Conference on Computer and Communications Security
13.
Zurück zum Zitat Nguyen T, Xiao T, Yang X, Hui Y, Shin SC, Shin H (2016) Collecting and analyzing data from smart device users with local differential privacy. arXiv preprint arXiv:1606.05053 Nguyen T, Xiao T, Yang X, Hui Y, Shin SC, Shin H (2016) Collecting and analyzing data from smart device users with local differential privacy. arXiv preprint arXiv:​1606.​05053
14.
Zurück zum Zitat Qin Z, Yu T, Yang Y, Khalil I, Xiao X, Ren K (2017) Generating synthetic decentralized social graphs with local differential privacy. In: Proceeding of ACM SIGSAC Conference on Computer and Communications Security, pp 425–438 Qin Z, Yu T, Yang Y, Khalil I, Xiao X, Ren K (2017) Generating synthetic decentralized social graphs with local differential privacy. In: Proceeding of ACM SIGSAC Conference on Computer and Communications Security, pp 425–438
17.
Zurück zum Zitat Erlingsson, ulfar, Pihur V, Korolova A (2014) Rappor: randomized aggregatable privacy-preserving ordinal response. In: Proceeding of ACM SIGSAC conference on computer and communications security, pp 10–23 Erlingsson, ulfar, Pihur V, Korolova A (2014) Rappor: randomized aggregatable privacy-preserving ordinal response. In: Proceeding of ACM SIGSAC conference on computer and communications security, pp 10–23
18.
Zurück zum Zitat Bassily R, Smith A (2015) Local, private, efficient protocols for succinct histograms. In: Proceeding of ACM symposium on Theory of computing, pp 10–19 Bassily R, Smith A (2015) Local, private, efficient protocols for succinct histograms. In: Proceeding of ACM symposium on Theory of computing, pp 10–19
19.
Zurück zum Zitat Qin Z, Yang Y, Yu T, Khalil I, Xiao X, Ren K (2016) Heavy hitter estimation over set-valued data with local differential privacy. In: Proceeding of ACM SIGSAC Conference on Computer and Communications Security, pp 192–203 Qin Z, Yang Y, Yu T, Khalil I, Xiao X, Ren K (2016) Heavy hitter estimation over set-valued data with local differential privacy. In: Proceeding of ACM SIGSAC Conference on Computer and Communications Security, pp 192–203
20.
Zurück zum Zitat Smith A (2011) Privacy-preserving statistical estimation with optimal convergence rates. In: Proceeding of ACM Symposium on Theory of Computing Smith A (2011) Privacy-preserving statistical estimation with optimal convergence rates. In: Proceeding of ACM Symposium on Theory of Computing
21.
Zurück zum Zitat Samet S (2015) Privacy-preserving logistic regression. J Adv Inf Technol 6(3):1–8 Samet S (2015) Privacy-preserving logistic regression. J Adv Inf Technol 6(3):1–8
22.
Zurück zum Zitat Shokri R, Shmatikov V (2015) Privacy-preserving deep learning. In: Proceeding of ACM SIGSAC Conference on Computer and Communications Security Shokri R, Shmatikov V (2015) Privacy-preserving deep learning. In: Proceeding of ACM SIGSAC Conference on Computer and Communications Security
23.
Zurück zum Zitat LeCun Y, Bengio Y, Hinton G (2015) Deep learning. Nature 521(7553):436–444 LeCun Y, Bengio Y, Hinton G (2015) Deep learning. Nature 521(7553):436–444
24.
Zurück zum Zitat Li C, Hay M, Rastogi V, Miklau G, McGregor A (2010) Optimizing linear counting queries under differential privacy. In: Proceeding of ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, pp 123–134 Li C, Hay M, Rastogi V, Miklau G, McGregor A (2010) Optimizing linear counting queries under differential privacy. In: Proceeding of ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, pp 123–134
25.
Zurück zum Zitat Yuan G, Zhang Z, Winslett M, Xiao X, Yang Y, Hao Z (2012) Low-rank mechanism: optimizing batch queries under differential privacy. In: Proceeding of VLDB Endowment, pp 1352–1363 Yuan G, Zhang Z, Winslett M, Xiao X, Yang Y, Hao Z (2012) Low-rank mechanism: optimizing batch queries under differential privacy. In: Proceeding of VLDB Endowment, pp 1352–1363
26.
29.
Zurück zum Zitat McSherry Frank, Mironov I (2009) Differentially private recommender systems: Building privacy into the netflix prize contenders. In: Proceeding of ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp 1–9 McSherry Frank, Mironov I (2009) Differentially private recommender systems: Building privacy into the netflix prize contenders. In: Proceeding of ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp 1–9
30.
Zurück zum Zitat Machanavajjhala Ashwin A, Korolova, Sarma AD (2011) Personalized social recommendations: accurate or private. In: Proceeding of the VLDB Endowment, pp 440–450 Machanavajjhala Ashwin A, Korolova, Sarma AD (2011) Personalized social recommendations: accurate or private. In: Proceeding of the VLDB Endowment, pp 440–450
31.
Zurück zum Zitat Frank M, Mahajan R (2011) Differentially-private network trace analysis. ACM SIGCOMM Comput Commun Rev 41(4):123–134 Frank M, Mahajan R (2011) Differentially-private network trace analysis. ACM SIGCOMM Comput Commun Rev 41(4):123–134
32.
Zurück zum Zitat Wan S, Zhao Y, Wang T, Gu Z, Abbasi QH, Choo K-KR (2019) Multi-dimensional data indexing and range query processing via voronoi diagram for internet of things. Future Gener Comput Syst 91:382–391 Wan S, Zhao Y, Wang T, Gu Z, Abbasi QH, Choo K-KR (2019) Multi-dimensional data indexing and range query processing via voronoi diagram for internet of things. Future Gener Comput Syst 91:382–391
33.
Zurück zum Zitat Xu X, Xue Y, Qi L, Yuan Y, Zhang X, Umer T, Wan S (2019) An edge computing-enabled computation offloading method with privacy preservation for internet of connected vehicles. Future Gener Comput Syst 96:89–100 Xu X, Xue Y, Qi L, Yuan Y, Zhang X, Umer T, Wan S (2019) An edge computing-enabled computation offloading method with privacy preservation for internet of connected vehicles. Future Gener Comput Syst 96:89–100
34.
Zurück zum Zitat Purohit S, Smith W, Chappell A, West P, Lee B, Stephan E, Fox P (2016) Effective tooling for linked data publishing in scientific research. In: Proceeding of IEEE Tenth International Conference on Semantic Computing, pp 24–31 Purohit S, Smith W, Chappell A, West P, Lee B, Stephan E, Fox P (2016) Effective tooling for linked data publishing in scientific research. In: Proceeding of IEEE Tenth International Conference on Semantic Computing, pp 24–31
35.
Zurück zum Zitat Ye Q, Meng X, Zhu M, Huo Z (2018) Survey on differential privacy. Ruan Jian Xue Bao/Journal of Software, no. 7 Ye Q, Meng X, Zhu M, Huo Z (2018) Survey on differential privacy. Ruan Jian Xue Bao/Journal of Software, no. 7
38.
Zurück zum Zitat Niari AK, Berangi R, Fathy M (2018) ECCN: an extended CCN architecture to improve data access in vehicular content-centric network. J Supercomput 74(1):205–221 Niari AK, Berangi R, Fathy M (2018) ECCN: an extended CCN architecture to improve data access in vehicular content-centric network. J Supercomput 74(1):205–221
39.
Zurück zum Zitat NT, Xiao T, Yang X, Hui Y, Shin SC, SJ (2016) Collecting and analyzing data from smart device users with local differential privacy. arXiv preprint arXiv:1606.05053 NT, Xiao T, Yang X, Hui Y, Shin SC, SJ (2016) Collecting and analyzing data from smart device users with local differential privacy. arXiv preprint arXiv:​1606.​05053
40.
Zurück zum Zitat Ren X, Yu CM, Yu W, Yang S, Yang X, Mccann JA, Yu PS (2018) LoPub: High-dimensional crowdsourced data publication with local differential privacy. IEEE Trans Inf Forensics Secur 13(9):2151–2166 Ren X, Yu CM, Yu W, Yang S, Yang X, Mccann JA, Yu PS (2018) LoPub: High-dimensional crowdsourced data publication with local differential privacy. IEEE Trans Inf Forensics Secur 13(9):2151–2166
41.
Zurück zum Zitat Ren X, Yu C, Yu W, Yang S, Yang X, McCann J (2016) High-dimensional crowdsourced data distribution estimation with local privacy. In: Proceeding of IEEE International Conference on Computer and Information Technology (CIT), pp 226–233 Ren X, Yu C, Yu W, Yang S, Yang X, McCann J (2016) High-dimensional crowdsourced data distribution estimation with local privacy. In: Proceeding of IEEE International Conference on Computer and Information Technology (CIT), pp 226–233
42.
Zurück zum Zitat Chen C, Liu L, Qiu T, Yang K, Gong F, Song H (2018) ASGR: an artificial spider-web-based geographic routing in heterogeneous vehicular networks. IEEE Trans Intell Trans Syst 20(5):1604–1620 Chen C, Liu L, Qiu T, Yang K, Gong F, Song H (2018) ASGR: an artificial spider-web-based geographic routing in heterogeneous vehicular networks. IEEE Trans Intell Trans Syst 20(5):1604–1620
43.
Zurück zum Zitat Chen C, Liu L, Qiu T, Ren Z, Hu J, Ti F (2018) Driver’s intention identification and risk evaluation at intersections in the internet of vehicles. IEEE Internet Things J 5(3):1575–1587 Chen C, Liu L, Qiu T, Ren Z, Hu J, Ti F (2018) Driver’s intention identification and risk evaluation at intersections in the internet of vehicles. IEEE Internet Things J 5(3):1575–1587
44.
Zurück zum Zitat Wan S, Gu Z, Ni Q (2019) Cognitive computing and wireless communications on the edge for healthcare service robots. Comput Commun 149:99–106 Wan S, Gu Z, Ni Q (2019) Cognitive computing and wireless communications on the edge for healthcare service robots. Comput Commun 149:99–106
45.
Zurück zum Zitat Zhang R, Xie P, Wang C, Liu G, Wan S (2019) Classifying transportation mode and speed from trajectory data via deep multi-scale learning. Comput Netw 162:106861 Zhang R, Xie P, Wang C, Liu G, Wan S (2019) Classifying transportation mode and speed from trajectory data via deep multi-scale learning. Comput Netw 162:106861
46.
Zurück zum Zitat Park JJ (2018) Fusion algorithms and high-performance applications for vehicular cloud computing. J Supercomput 74(3):995–1000 Park JJ (2018) Fusion algorithms and high-performance applications for vehicular cloud computing. J Supercomput 74(3):995–1000
47.
Zurück zum Zitat Ye M, Barg A (2018) Optimal schemes for discrete distribution estimation under locally differential privacy. IEEE Trans Inf Theory 64(8):5662–5676MathSciNetMATH Ye M, Barg A (2018) Optimal schemes for discrete distribution estimation under locally differential privacy. IEEE Trans Inf Theory 64(8):5662–5676MathSciNetMATH
48.
Zurück zum Zitat Fanti G, Pihur V, Erlingsson l (2016) Building a rappor with the unknown: privacy-preserving learning of associations and data dictionaries. Proc Priv Enhanc Technol 3:41–61 Fanti G, Pihur V, Erlingsson l (2016) Building a rappor with the unknown: privacy-preserving learning of associations and data dictionaries. Proc Priv Enhanc Technol 3:41–61
49.
Zurück zum Zitat Liu J, Wang W, Li D, Wan S, Liu H (2019) Role of gifts in decision making: an endowment effect incentive mechanism for offloading in the IoV. IEEE Internet Things J 6(4):6933–6951 Liu J, Wang W, Li D, Wan S, Liu H (2019) Role of gifts in decision making: an endowment effect incentive mechanism for offloading in the IoV. IEEE Internet Things J 6(4):6933–6951
50.
Zurück zum Zitat MIJ, Duchi, John C, Wainwright MJ (2013) Local privacy, data processing inequalities, and statistical minimax rates. arXiv preprint arXiv:1302.3203 MIJ, Duchi, John C, Wainwright MJ (2013) Local privacy, data processing inequalities, and statistical minimax rates. arXiv preprint arXiv:​1302.​3203
51.
52.
Zurück zum Zitat Ye M, Barg A (2018) Optimal schemes for discrete distribution estimation under locally differential privacy. IEEE Trans Inf Theory 64:5662–5676MathSciNetMATH Ye M, Barg A (2018) Optimal schemes for discrete distribution estimation under locally differential privacy. IEEE Trans Inf Theory 64:5662–5676MathSciNetMATH
53.
Zurück zum Zitat Kairouz P, Oh S, Viswanath P (2014) Extremal mechanisms for local differential privacy. Adv Neural Inf Process Syst 4:2879–2887MATH Kairouz P, Oh S, Viswanath P (2014) Extremal mechanisms for local differential privacy. Adv Neural Inf Process Syst 4:2879–2887MATH
54.
Zurück zum Zitat Balouchzahi N-M, Fathy M, Akbari A (2016) An efficient infrastructure based service discovery in vehicular networks using P2P structures. J Supercomput 72(3):1013–1034 Balouchzahi N-M, Fathy M, Akbari A (2016) An efficient infrastructure based service discovery in vehicular networks using P2P structures. J Supercomput 72(3):1013–1034
55.
Zurück zum Zitat Wang Q, Zhang Y, Lu X, Wang Z, Qin Z, Ren K (2018) Real-time and spatio-temporal crowd-sourced social network data publishing with differential privacy. IEEE Trans Dependable Secure Comput 15(4):591–606 Wang Q, Zhang Y, Lu X, Wang Z, Qin Z, Ren K (2018) Real-time and spatio-temporal crowd-sourced social network data publishing with differential privacy. IEEE Trans Dependable Secure Comput 15(4):591–606
56.
Zurück zum Zitat Jagielski M, Oprea A, Biggio B et al (2018) Manipulating machine learning: Poisoning attacks and countermeasures for regression learning. IEEE Symp Secur Priv (SP): 19–35 Jagielski M, Oprea A, Biggio B et al (2018) Manipulating machine learning: Poisoning attacks and countermeasures for regression learning. IEEE Symp Secur Priv (SP): 19–35
57.
Zurück zum Zitat Zhang X, Meng X (2014) Differential privacy protection for data publishing and analysis. J Comput 4:927–949 Zhang X, Meng X (2014) Differential privacy protection for data publishing and analysis. J Comput 4:927–949
58.
Zurück zum Zitat Chen C, Pei Q, Li X (2016) A GTS allocation scheme to improve multiple-access performance in vehicular sensor networks. IEEE Trans Veh Technol 65(3):1549–1563 Chen C, Pei Q, Li X (2016) A GTS allocation scheme to improve multiple-access performance in vehicular sensor networks. IEEE Trans Veh Technol 65(3):1549–1563
59.
Zurück zum Zitat Jinna H, Qiu T, Atiquzzaman M et al (2018) CVCG: Cooperative V2V-aided transmission scheme based on coalitional game for popular content distribution in vehicular ad-hoc networks. IEEE Trans Mob Comput 18(12):2811–2828 Jinna H, Qiu T, Atiquzzaman M et al (2018) CVCG: Cooperative V2V-aided transmission scheme based on coalitional game for popular content distribution in vehicular ad-hoc networks. IEEE Trans Mob Comput 18(12):2811–2828
61.
Zurück zum Zitat Chaudhuri K, Monteleoni C, Sarwate AD (2011) Differentially private empirical risk minimization. J Mach Learn Res 12:1069–1109MathSciNetMATH Chaudhuri K, Monteleoni C, Sarwate AD (2011) Differentially private empirical risk minimization. J Mach Learn Res 12:1069–1109MathSciNetMATH
62.
Zurück zum Zitat Khosravi MR, Basri H, Rostami H, Samadi S (2018) Distributed random cooperation for VBF-based routing in high-speed dense underwater acoustic sensor networks. J Supercomput 74(11):6184–6200 Khosravi MR, Basri H, Rostami H, Samadi S (2018) Distributed random cooperation for VBF-based routing in high-speed dense underwater acoustic sensor networks. J Supercomput 74(11):6184–6200
63.
Zurück zum Zitat Chen C, Hu J, Qiu T, Atiquzzaman M, Ren Z (2019) CVCG: cooperative V2V-aided transmission scheme based on coalitional game for popular content distribution in vehicular ad-hoc networks. IEEE Trans Mob Comput 18(12):2811–2828 Chen C, Hu J, Qiu T, Atiquzzaman M, Ren Z (2019) CVCG: cooperative V2V-aided transmission scheme based on coalitional game for popular content distribution in vehicular ad-hoc networks. IEEE Trans Mob Comput 18(12):2811–2828
64.
Zurück zum Zitat Zhang J, Zhang Z, Xiao X, Yang Y, Winslett M (2012) Functional mechanism: regression analysis under differential privacy. In: Proceeding of VLDB Endowment, pp 1364–1375 Zhang J, Zhang Z, Xiao X, Yang Y, Winslett M (2012) Functional mechanism: regression analysis under differential privacy. In: Proceeding of VLDB Endowment, pp 1364–1375
65.
Zurück zum Zitat Lei J (2011) Differentially private m-estimators. Adv Neural Inf Proc Syst 2011:361–369 Lei J (2011) Differentially private m-estimators. Adv Neural Inf Proc Syst 2011:361–369
66.
Zurück zum Zitat Khosravi MR, Basri H, Rostami H (2018) Efficient routing for dense UWSNs with high-speed mobile nodes using spherical divisions. J Supercomput 74(2):696–716 Khosravi MR, Basri H, Rostami H (2018) Efficient routing for dense UWSNs with high-speed mobile nodes using spherical divisions. J Supercomput 74(2):696–716
67.
Zurück zum Zitat Wu W-C (2017) A secret push messaging service in VANET clouds. J Supercomput 73(7):3085–3097 Wu W-C (2017) A secret push messaging service in VANET clouds. J Supercomput 73(7):3085–3097
68.
Zurück zum Zitat Chaudhuri K, Monteleoni C, Sarwate AD (2011) Differentially private empirical risk minimization. J Mach Learn Res JMLR 12(2):1069MathSciNetMATH Chaudhuri K, Monteleoni C, Sarwate AD (2011) Differentially private empirical risk minimization. J Mach Learn Res JMLR 12(2):1069MathSciNetMATH
69.
Zurück zum Zitat Zhang J, Xiao X, Yang Y, Zhang Z, Winslett M (2013) Privgene:differentially private model fitting using genetic algorithms. In: Proceeding of ACM SIGMOD International Conference on Management of Data, pp 665–676 Zhang J, Xiao X, Yang Y, Zhang Z, Winslett M (2013) Privgene:differentially private model fitting using genetic algorithms. In: Proceeding of ACM SIGMOD International Conference on Management of Data, pp 665–676
70.
Zurück zum Zitat Lecuyer M, Atlidakis V, Geambasu R et al (2019) Certified robustness to adversarial examples with differential privacy. IEEE Symp Secur Priv (SP) 2019:656–672 Lecuyer M, Atlidakis V, Geambasu R et al (2019) Certified robustness to adversarial examples with differential privacy. IEEE Symp Secur Priv (SP) 2019:656–672
71.
Zurück zum Zitat Li P, Li T, Ye H, Li J, Chen X, Xiang Y (2018) Privacy-preserving machine learning with multiple data providers. Future Gener Comput Syst 87:341–350 Li P, Li T, Ye H, Li J, Chen X, Xiang Y (2018) Privacy-preserving machine learning with multiple data providers. Future Gener Comput Syst 87:341–350
72.
Zurück zum Zitat Li T, Li J, Liu Z, Li P, Jia C (2019) Differentially private Naive Bayes learning over multiple data sources. Inf Sci 444:89–104MathSciNetMATH Li T, Li J, Liu Z, Li P, Jia C (2019) Differentially private Naive Bayes learning over multiple data sources. Inf Sci 444:89–104MathSciNetMATH
73.
74.
Zurück zum Zitat Wang J, Cai Z, Ai C, Yang D, Gao H, Cheng X (2016) Differentially private k-anonymity: achieving query privacy in location-based services. In: Proceeding of International Conference on Identification, Information and Knowledge in the Internet of Things, pp 475–480 Wang J, Cai Z, Ai C, Yang D, Gao H, Cheng X (2016) Differentially private k-anonymity: achieving query privacy in location-based services. In: Proceeding of International Conference on Identification, Information and Knowledge in the Internet of Things, pp 475–480
75.
Zurück zum Zitat Zhuang Y, Fong S, Yuan M, Sung Y, Cho K, Wong RK (2017) Predicting the next turn at road junction from big traffic data. J Supercomput 73(7):3128–3148 Zhuang Y, Fong S, Yuan M, Sung Y, Cho K, Wong RK (2017) Predicting the next turn at road junction from big traffic data. J Supercomput 73(7):3128–3148
76.
Zurück zum Zitat Karimi V, Mohseni R, Samadi S (2019) Ofdm waveform design based on mutual information for cognitive radar applications. J Supercomput 75(5):2518–2534 Karimi V, Mohseni R, Samadi S (2019) Ofdm waveform design based on mutual information for cognitive radar applications. J Supercomput 75(5):2518–2534
77.
Zurück zum Zitat Cormode G, Procopiuc C, Srivastava D, Shen E, Yu T (2012) Differentially private spatial decompositions. IEEE 28th Int Conf Data Eng 41(4):20–31 Cormode G, Procopiuc C, Srivastava D, Shen E, Yu T (2012) Differentially private spatial decompositions. IEEE 28th Int Conf Data Eng 41(4):20–31
78.
Zurück zum Zitat Chen R, Mohammed N, Fung BCM, Desai BC, Xiong L (2012) Publishing setvalued data via differential privacy. VLDB 4(4):1087–1098 Chen R, Mohammed N, Fung BCM, Desai BC, Xiong L (2012) Publishing setvalued data via differential privacy. VLDB 4(4):1087–1098
79.
Zurück zum Zitat Li N, Yang W, Qardaji W (2013) Differentially private grids for geospatial data. In: Proceeding of IEEE International Conference on Data Engineering, pp 757–768 Li N, Yang W, Qardaji W (2013) Differentially private grids for geospatial data. In: Proceeding of IEEE International Conference on Data Engineering, pp 757–768
80.
Zurück zum Zitat Peng S, Yang Y, Zhang Z et al (2012) DP-tree: indexing multi-dimensional data under differential privacy. In: Proceedings of the 2012 ACM SIGMOD International Conference on Management of Data. ACM, pp 864–864 Peng S, Yang Y, Zhang Z et al (2012) DP-tree: indexing multi-dimensional data under differential privacy. In: Proceedings of the 2012 ACM SIGMOD International Conference on Management of Data. ACM, pp 864–864
81.
Zurück zum Zitat Xiao X, Wang G, Gehrke J (2011) Differential privacy via wavelet transforms. IEEE Trans Knowl Data Eng 23(8):1200–1214 Xiao X, Wang G, Gehrke J (2011) Differential privacy via wavelet transforms. IEEE Trans Knowl Data Eng 23(8):1200–1214
82.
Zurück zum Zitat Hay M, Rastogi V, Miklau G, Dan S (2010) Boosting the accuracy of differentially private histograms through consistency. Proc VLDB Endow 3(1–2):1021–1032 Hay M, Rastogi V, Miklau G, Dan S (2010) Boosting the accuracy of differentially private histograms through consistency. Proc VLDB Endow 3(1–2):1021–1032
83.
Zurück zum Zitat Xu J, Zhang Z, Xiao X, Yang Y, Yu G (2012) Differentially private histogram publication. In: IEEE International Conference on Data Engineering, pp 32–43 Xu J, Zhang Z, Xiao X, Yang Y, Yu G (2012) Differentially private histogram publication. In: IEEE International Conference on Data Engineering, pp 32–43
84.
Zurück zum Zitat Acs G, Castelluccia C, Chen R (2013) Differentially private histogram publishing through lossy compression. In: Proceeding of IEEE International Conference on Data Mining, pp 1–10 Acs G, Castelluccia C, Chen R (2013) Differentially private histogram publishing through lossy compression. In: Proceeding of IEEE International Conference on Data Mining, pp 1–10
85.
Zurück zum Zitat Karimi V, Mohseni R (2019) Intelligent target spectrum estimation based on ofdm signals for cognitive radar applications. J Intell Fuzzy Syst 36(3):2557–2569 Karimi V, Mohseni R (2019) Intelligent target spectrum estimation based on ofdm signals for cognitive radar applications. J Intell Fuzzy Syst 36(3):2557–2569
86.
Zurück zum Zitat Nkenyereye L, Park Y, Rhee K-H (2018) Secure vehicle traffic data dissemination and analysis protocol in vehicular cloud computing. J Supercomput 74(3):1024–1044 Nkenyereye L, Park Y, Rhee K-H (2018) Secure vehicle traffic data dissemination and analysis protocol in vehicular cloud computing. J Supercomput 74(3):1024–1044
87.
Zurück zum Zitat Ping X, Tianqing Z, Xiaofeng W (2014) A survey on differential privacy and applications. Chin J Comput 37(1):101–122 Ping X, Tianqing Z, Xiaofeng W (2014) A survey on differential privacy and applications. Chin J Comput 37(1):101–122
88.
Zurück zum Zitat Patel AA, Dharwa JN (2017) An integrated hybrid recommendation model using graph database. In: Proceeding of International Conference on ICT in Business Industry and Government, pp 1–5 Patel AA, Dharwa JN (2017) An integrated hybrid recommendation model using graph database. In: Proceeding of International Conference on ICT in Business Industry and Government, pp 1–5
89.
Zurück zum Zitat Xiong P, Zhu T, Wang X (2014) Differential privacy protection and its application. J Comput 37(1):101–122 Xiong P, Zhu T, Wang X (2014) Differential privacy protection and its application. J Comput 37(1):101–122
90.
Zurück zum Zitat Zhu T, Li G, Ren Y, Zhou W, Xiong P (2013) Differential privacy for neighborhood-based collaborative filtering. In: Proceeding of IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, pp 752–759 Zhu T, Li G, Ren Y, Zhou W, Xiong P (2013) Differential privacy for neighborhood-based collaborative filtering. In: Proceeding of IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, pp 752–759
91.
Zurück zum Zitat Chen R, Fung B, Desai BC, Sossou NM (2012) Differentially private transit data publication: a case study on the montreal transportation system. In: Proceeding of ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp 213–221 Chen R, Fung B, Desai BC, Sossou NM (2012) Differentially private transit data publication: a case study on the montreal transportation system. In: Proceeding of ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp 213–221
92.
Zurück zum Zitat Gotz M, Machanavajjhala A, Wang G, Xiao X, Gehrke J (2012) Publishing search logsa comparative study of privacy guarantees. IEEE Trans Knowl Data Eng 24(3):520–532 Gotz M, Machanavajjhala A, Wang G, Xiao X, Gehrke J (2012) Publishing search logsa comparative study of privacy guarantees. IEEE Trans Knowl Data Eng 24(3):520–532
93.
Zurück zum Zitat Lindell Y, Pinkas B, Smart NP, Yanai A (2015) Efficient constant round multi-party computation combining BMR and SPDZ. In: Proceeding of Annual Cryptology Conference Lindell Y, Pinkas B, Smart NP, Yanai A (2015) Efficient constant round multi-party computation combining BMR and SPDZ. In: Proceeding of Annual Cryptology Conference
94.
Zurück zum Zitat Corrigan-Gibbs H, Wolinsky DI, Ford B (2013) Proactively accountable anonymous messaging in verdict. In: Proceeding of USENIX Security Symposium Corrigan-Gibbs H, Wolinsky DI, Ford B (2013) Proactively accountable anonymous messaging in verdict. In: Proceeding of USENIX Security Symposium
95.
Zurück zum Zitat Elahi T, Danezis G, Goldberg I (2014) Privex: private collection of traffic statistics for anonymous communication networks. In: Proceeding of ACM SIGSAC Conference on Computer and Communications Security Elahi T, Danezis G, Goldberg I (2014) Privex: private collection of traffic statistics for anonymous communication networks. In: Proceeding of ACM SIGSAC Conference on Computer and Communications Security
96.
Zurück zum Zitat Goryczka S, Xiong L (2017) A comprehensive comparison of multiparty secure additions with differential privacy. IEEE Trans Dependable Secure Comput 14(5):463–477 Goryczka S, Xiong L (2017) A comprehensive comparison of multiparty secure additions with differential privacy. IEEE Trans Dependable Secure Comput 14(5):463–477
97.
Zurück zum Zitat Rastogi V, Nath S (2010) Differentially private aggregation of distributed time-series with transformation and encryption. In: Proceeding of ACM SIGMOD International Conference on Management of Data Rastogi V, Nath S (2010) Differentially private aggregation of distributed time-series with transformation and encryption. In: Proceeding of ACM SIGMOD International Conference on Management of Data
99.
Zurück zum Zitat Wang X, Liu Y, Shi Z, Lu X (2015) A privacy-preserving fuzzy localization scheme with csi fingerprint. In: IEEE Global Communications Conference Wang X, Liu Y, Shi Z, Lu X (2015) A privacy-preserving fuzzy localization scheme with csi fingerprint. In: IEEE Global Communications Conference
100.
Zurück zum Zitat Higuchi T, Martin P, Chakraborty S, Srivastava M (2015) Anonycast: privacy-preserving location distribution for anonymous crowd tracking systems. In: ACM International Joint Conference on Pervasive and Ubiquitous Computing Higuchi T, Martin P, Chakraborty S, Srivastava M (2015) Anonycast: privacy-preserving location distribution for anonymous crowd tracking systems. In: ACM International Joint Conference on Pervasive and Ubiquitous Computing
101.
Zurück zum Zitat Primault V, Mokhtar S. Ben, Brunie L (2015) Privacy-preserving publication of mobility data with high utility. In: IEEE International Conference on Distributed Computing Systems Primault V, Mokhtar S. Ben, Brunie L (2015) Privacy-preserving publication of mobility data with high utility. In: IEEE International Conference on Distributed Computing Systems
105.
Zurück zum Zitat Manickam P, Shankar K, Perumal E, Ilayaraja M, Sathesh Kumar K (2019) Secure data transmission through reliable vehicles in VANET using optimal lightweight cryptography. Cybersecurity and secure information systems. Springer, Cham, pp 193–204 Manickam P, Shankar K, Perumal E, Ilayaraja M, Sathesh Kumar K (2019) Secure data transmission through reliable vehicles in VANET using optimal lightweight cryptography. Cybersecurity and secure information systems. Springer, Cham, pp 193–204
106.
Zurück zum Zitat Lu Z, Wang Q, Chen X, Qu G, Lyu Y, Liu Z (2019) Leap: a lightweight encryption and authentication protocol for in-vehicle communications. IEEE Intell Transp Syst Conf 2019:1158–1164 Lu Z, Wang Q, Chen X, Qu G, Lyu Y, Liu Z (2019) Leap: a lightweight encryption and authentication protocol for in-vehicle communications. IEEE Intell Transp Syst Conf 2019:1158–1164
107.
Zurück zum Zitat Brousmiche K. Leo, Durand A, Heno T, Poulain C, Dalmieres A, Hamida EB (2018) Hybrid cryptographic protocol for secure vehicle data sharing over a consortium blockchain. In: 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), pp 1281–1286 Brousmiche K. Leo, Durand A, Heno T, Poulain C, Dalmieres A, Hamida EB (2018) Hybrid cryptographic protocol for secure vehicle data sharing over a consortium blockchain. In: 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), pp 1281–1286
108.
Zurück zum Zitat Kang J, Lin D, Jiang W, Bertino E (2018) Highly efficient randomized authentication in vanets. Pervasive Mob Comput 44:31–44 Kang J, Lin D, Jiang W, Bertino E (2018) Highly efficient randomized authentication in vanets. Pervasive Mob Comput 44:31–44
109.
Zurück zum Zitat Liu L, Chen C, Qiu T, Zhang M, Li S, Zhou B (2018) A data dissemination scheme based on clustering and probabilistic broadcasting in vanets. Veh Commun 13:78–88 Liu L, Chen C, Qiu T, Zhang M, Li S, Zhou B (2018) A data dissemination scheme based on clustering and probabilistic broadcasting in vanets. Veh Commun 13:78–88
111.
Zurück zum Zitat Lv N, Chen C, Qiu T, Sangaiah AK (2018) Deep learning and superpixel feature extraction based on contractive autoencoder for change detection in sar images. IEEE Trans Ind Inf 14(12):5530–5538 Lv N, Chen C, Qiu T, Sangaiah AK (2018) Deep learning and superpixel feature extraction based on contractive autoencoder for change detection in sar images. IEEE Trans Ind Inf 14(12):5530–5538
112.
Zurück zum Zitat Karimi V, Mohseni R, Samadi S (2019) Adaptive OFDM waveform design for cognitive radar in signal-dependent clutter. IEEE Syst J 99:1–12 Karimi V, Mohseni R, Samadi S (2019) Adaptive OFDM waveform design for cognitive radar in signal-dependent clutter. IEEE Syst J 99:1–12
113.
Zurück zum Zitat Chen Y, Li B, Zhang Q (2016) Incentivizing crowdsourcing systems with network effects. In: IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer Communications. IEEE, pp 1–9 Chen Y, Li B, Zhang Q (2016) Incentivizing crowdsourcing systems with network effects. In: IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer Communications. IEEE, pp 1–9
114.
Zurück zum Zitat Zhuo G, Jia Q, Guo L, Li M, Li P (2016) Privacy-preserving verifiable data aggregation and analysis for cloud-assisted mobile crowdsourcing. In: IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer Communications. IEEE, pp 1–9 Zhuo G, Jia Q, Guo L, Li M, Li P (2016) Privacy-preserving verifiable data aggregation and analysis for cloud-assisted mobile crowdsourcing. In: IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer Communications. IEEE, pp 1–9
115.
Zurück zum Zitat Wu S, Wang X, Wang S, Zhang Z, Tung AK (2014) K-anonymity for crowdsourcing database. IEEE Trans Knowl Data Eng 26(9):2207–2221 Wu S, Wang X, Wang S, Zhang Z, Tung AK (2014) K-anonymity for crowdsourcing database. IEEE Trans Knowl Data Eng 26(9):2207–2221
116.
Zurück zum Zitat Varshney LR, Vempaty A, Varshney PK (2014) Assuring privacy and reliability in crowdsourcing with coding. In: Information Theory and Applications Workshop (ITA), 2014. IEEE, pp 1–6 Varshney LR, Vempaty A, Varshney PK (2014) Assuring privacy and reliability in crowdsourcing with coding. In: Information Theory and Applications Workshop (ITA), 2014. IEEE, pp 1–6
Metadaten
Titel
A survey of local differential privacy for securing internet of vehicles
verfasst von
Ping Zhao
Guanglin Zhang
Shaohua Wan
Gaoyang Liu
Tariq Umer
Publikationsdatum
09.12.2019
Verlag
Springer US
Erschienen in
The Journal of Supercomputing / Ausgabe 11/2020
Print ISSN: 0920-8542
Elektronische ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-019-03104-0

Weitere Artikel der Ausgabe 11/2020

The Journal of Supercomputing 11/2020 Zur Ausgabe