Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1314333.1314353acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

Pripayd: privacy friendly pay-as-you-drive insurance

Published: 29 October 2007 Publication History

Abstract

Pay-As-You-Drive insurance systems are establishing themselves as the future of car insurance. However, their current implementations entail a serious privacy invasion. We present PriPAYD where the premium calculations are performed locally in the vehicle, and only aggregate data arrivesto the insurance company, without leaking location information. Our system is built on top of well understood security techniques that ensure its correct functioning. We discuss the viability of PriPAYD in terms of cost, security and easeof certification.

References

[1]
Aioi. http://www.ioi-sonpo.co.jp/.
[2]
Aioi. Telematics insurance system.
[3]
R. Anderson. Security engineering. Wiley New York, 2001.
[4]
R. Anderson, M. Bond, J. Clulow, and S. Skorobogatov. Cryptographic Processors-a survey. Proceedings of the IEEE, 94(2):357¿-369, 2006.
[5]
Ross J. Anderson, Serge Vaudenay, Bart Preneel, and Kaisa Nyberg. The Newton channel. In Ross J. Anderson, editor, Information Hiding, volume 1174 of Lecture Notes in Computer Science, pages 151-¿156. Springer, 1996.
[6]
Aryeh. http://www.aryeh.co.il/.
[7]
Sara Assicurazioni. http://www.saraassicurazioni.it/.
[8]
American Automobile Association. http://www.aaa.com/.
[9]
National Motorist Association. NMA's position on auto insurance. http://www.motorists.org, 1998.
[10]
Autograph. https: //secure.avivacanada.com/autograph/product.php.
[11]
D. E. Bell and L. J. La Padula. Secure Computer Systems: Mathematical Foundations and Model. Mitre, 1974.
[12]
Toyota Motor Corporation. http://www.toyota.co.jp/.
[13]
Corona Direct. http://www.kilometerverzekering.be/.
[14]
Polis Direct. http://www.kilometerpolis.nl/.
[15]
Alberto Escudero-Pascual and Ian Hosein. Questioning lawful access to traffic data. Commun. ACM, 47(3):77¿-82, 2004.
[16]
Virgil D. Gligor. A Guide to Understanding Covert Channel Analysis of Trusted Systems. National Computer Security Center, ncsc-tg-030 version-1 edition, 1993.
[17]
Vanessa Gratzer and David Naccache. Alien vs. Quine, the vanishing circuit and other tales from the industry's crypt. In Serge Vaudenay, editor, EUROCRYPT 2006, volume 4004 of Lecture Notes in Computer Science, pages 48-¿58. Springer, 2006.
[18]
Michael LeMay, George Gross and Carl A. Gunter and Sanjam Garg. Unified Architecture for Large-Scale Attested Metering. In HICSS ¿07: Proceedings of the 40th Annual Hawaii International Conference on System Sciences, 2007.
[19]
Hollard Insurance. http://www.payasyoudrive.co.za/.
[20]
iPAID. http://www.ipaid-insurance.com/.
[21]
McMillan Robert John, Craig Alexander Dean, and Heinen John Patrick. Motor vehicle monitoring system for determining a cost of insurance, August 1998.
[22]
Todd Litman. Distance-based vehicle insurance feasibility, costs and benefits. Technical report, Victoria Transport Policy Institute, 2007.
[23]
MAPFRE. http://www.jovenesdesiguales.com/.
[24]
A. J. Menezes. Handbook of Applied Cryptography. CRC Press, 1997.
[25]
Movitrack. http://www.movitrack.it/.
[26]
D. Naccache and D. M¿Raihi. Cryptographic smart cards. IEEE Micro, 16(3):14¿-24, 1996.
[27]
Shigeru Nakagawa, Kenji Mori, Akira Shinada, Katsuhiko Nunokawa, Hiroaki Okajima, and Makoto Sasaki. Vehicle insurance premium calculation system, on-board apparatus, and server apparatus, March 2001.
[28]
NedBank. http://www.nedbank.co.za/.106
[29]
Pay&Go. http://paygo-system.com/ShamirWeb/PublicSite/default.html.
[30]
Salvador Minguijon Perez. Individual evaluation system for motorcar risk, December 1997.
[31]
Progressive. http://www.progressive.com/.
[32]
TripSensor Progressive Casualty Insurance. https://tripsense.progressive.com/.
[33]
Swiss Re. http://www.swissre.com/.
[34]
Adi Shamir. How to share a secret. Commun. ACM, 22(11):612¿-613, 1979.
[35]
G.J. Simmons. Subliminal communication is easy using the DSA. In T. Helleseth, editor, EUROCRYPT 1993, volume 765 of Lecture Notes in Computer Science, pages 218¿-232. Springer, 1993.
[36]
Skytrax. https://www.skytrax.co.za/index.asp.
[37]
STOK. http://www.stok-nederland.nl/.
[38]
Norwich Union. http://www.norwichunion.com/pay-as-you-drive/.
[39]
Uniqa. http://www.uniqa.at/uniqa_at/.
[40]
WGV. http://www.wgv-online.de/index.htm.
[41]
DBV Winterthur. http://entry.dbv-winterthur.de/.
[42]
Fayyaz Zahid and Craig Barton. Pay per mile insurance. Technical report, Davenport University, 2004.

Cited By

View all
  • (2023)A Survey on Privacy-Preserving Electronic Toll Collection Schemes for Intelligent Transportation SystemsIEEE Transactions on Intelligent Transportation Systems10.1109/TITS.2023.326682824:9(8945-8962)Online publication date: Sep-2023
  • (2020)Identification of aggressive driving from naturalistic data in car-following situationsJournal of Safety Research10.1016/j.jsr.2020.03.003Online publication date: Apr-2020
  • (2020)Are Sensor-Based Business Models a Threat to Privacy? The Case of Pay-How-You-Drive Insurance ModelsTrust, Privacy and Security in Digital Business10.1007/978-3-030-58986-8_6(75-85)Online publication date: 14-Sep-2020
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
WPES '07: Proceedings of the 2007 ACM workshop on Privacy in electronic society
October 2007
116 pages
ISBN:9781595938831
DOI:10.1145/1314333
  • General Chair:
  • Peng Ning,
  • Program Chair:
  • Ting Yu
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 29 October 2007

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. car insurance
  2. pay-as-you-drive
  3. privacy

Qualifiers

  • Article

Conference

CCS07
Sponsor:

Acceptance Rates

Overall Acceptance Rate 106 of 355 submissions, 30%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)28
  • Downloads (Last 6 weeks)1
Reflects downloads up to 16 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2023)A Survey on Privacy-Preserving Electronic Toll Collection Schemes for Intelligent Transportation SystemsIEEE Transactions on Intelligent Transportation Systems10.1109/TITS.2023.326682824:9(8945-8962)Online publication date: Sep-2023
  • (2020)Identification of aggressive driving from naturalistic data in car-following situationsJournal of Safety Research10.1016/j.jsr.2020.03.003Online publication date: Apr-2020
  • (2020)Are Sensor-Based Business Models a Threat to Privacy? The Case of Pay-How-You-Drive Insurance ModelsTrust, Privacy and Security in Digital Business10.1007/978-3-030-58986-8_6(75-85)Online publication date: 14-Sep-2020
  • (2020)BibliographySecurity Engineering10.1002/9781119644682.biblio(1061-1141)Online publication date: 2-Dec-2020
  • (2018)Privacy-preserving smart metering revisitedInternational Journal of Information Security10.1007/s10207-016-0355-817:1(1-31)Online publication date: 1-Feb-2018
  • (2018)Privacy of Connected VehiclesHandbook of Mobile Data Privacy10.1007/978-3-319-98161-1_9(229-251)Online publication date: 27-Oct-2018
  • (2017)A Privacy-Preserving Mobile Payment System for Mass TransitIEEE Transactions on Intelligent Transportation Systems10.1109/TITS.2016.263691918:8(2192-2205)Online publication date: Aug-2017
  • (2017)The value of vehicle telematics data in insurance risk selection processesDecision Support Systems10.1016/j.dss.2017.04.00998:C(69-79)Online publication date: 1-Jun-2017
  • (2016)Whom to Trust? Using Technology to Enforce PrivacyEnforcing Privacy10.1007/978-3-319-25047-2_17(395-437)Online publication date: 20-Apr-2016
  • (2015)Das Netz im Auto & das Auto im NetzDatenschutz und Datensicherheit - DuD10.1007/s11623-015-0431-739:6(367-371)Online publication date: 31-May-2015
  • Show More Cited By

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media