Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1868470.1868483acmconferencesArticle/Chapter ViewAbstractPublication PagesgisConference Proceedingsconference-collections
research-article

P2-CTM: privacy preserving collaborative traffic monitoring

Published: 02 November 2010 Publication History

Abstract

Collaborative Traffic Monitoring (CTM) systems exploit the location information continuously collected from cars. Users collaborate by providing their location information to have a global picture of the current traffic in real-time. However, location is very sensitive information. Therefore, privacy is a major obstacle for the widespread usage of CTM systems. In this paper, we present our position for a novel system addressing the security and especially privacy problems of CTM systems. Existing CTM solutions generally use two different methodologies. The first one is the dedicated infrastructure approach, also called VANETs (Vehicular Ad Hoc Networks), where a dedicated infrastructure for communication is deployed. The second methodology utilizes existing wireless networks, such as GSM, GPRS, EDGE, UMTS and Wi-Fi. Our P2-CTM (Privacy Preserving CTM) approach combines the best parts of these two existing approaches. In order to address the privacy challenge in CTM systems, we propose a privacy preserving location update mechanism that meets the requirements of both traffic monitoring and map generation. A privacy metric is adopted to evaluate the location update mechanism. We also discuss the performance issues regarding the location update mechanism. We aim to have a sound indication for our system from the points of view of privacy, security and performance.

References

[1]
M. Gruteser and D. Grunwald, "Anonymous usage of location-based services through spatial and temporal cloaking," in Proceedings of Mobisys 2003 Berkeley: Usenix Assoc, 2003, pp. 31--42.
[2]
B. Hoh, M. Gruteser, R. Herring, J. Ban, D. Work, J. C. Herrera, A. M. Bayen, M. Annavaram, and Q. Jacobson, "Virtual Trip Lines for Distributed Privacy-Preserving Traffic Monitoring," in Mobisys'08: Proceedings of the Sixth International Conference on Mobile Systems, Applications, and Services, 2008, pp. 15--28.
[3]
B. Gedik and L. Liu, "Protecting location privacy with personalized k-anonymity: Architecture and algorithms," Ieee Transactions on Mobile Computing, vol. 7, pp. 1--18, Jan 2008.
[4]
B. Hoh and M. Gruteser, "Protecting location privacy through path confusion," in First International Conference on Security and Privacy for Emerging Areas in Communications Networks, Proceedings, 2005, pp. 194--205.
[5]
RACQ, "The effect of Fuel Consumption & Vehicle Emmisions," 1/5/2008 2008.
[6]
J. Nadler, "Traffic Congestion and Air Quality," Association of Governments, Los Angeles fall 2007 2007.
[7]
CARE, "Road Accidents Statistics in Europe, European Road Safety Day," April 27, 2007 2007.
[8]
A. J. Blumbers and P. Eckersley, "On Location Privacy and How to Avoid Losing it For Ever," Electronic Frontier Foundation EFF, 2009.
[9]
S. Mollman: CNN, 2008.
[10]
C. Cvrcek, M. Kumpost, V. Matyas, and G. Danezis, "A study on the value of location privacy," in Proceedings of the 5th ACM workshop on Privacy in electronic society Alexandria, Virginia, USA: ACM, 2006.
[11]
G. Calandriello, P. Papadimitratos, J. P. Hubaux, and A. Lioy, "Efficient and Robust Pseudonymous Authentication in VANET," in Vanet'07: Proceedings of the Fourth Acm International Workshop on Vehicular Ad Hoc Networks, 2007, pp. 19--27.
[12]
M. Raya, P. Papadimitratos, and J. P. Hubaux, "Securing vehicular communications," Ieee Wireless Communications, vol. 13, pp. 8--15, Oct 2006.
[13]
L. Buttyan, T. Holczer, and I. Vajda, "On the effectiveness of changing pseudonyms to provide location privacy in VANETs," in Security and Privacy in Ad-hoc and Sensor Networks. vol. 4572, F. Stajano, C. Meadows, S. Capkun, and T. Moore, Eds. Berlin: Springer-Verlag Berlin, 2007, pp. 129--141.
[14]
J. Freudiger, M. Raya, and M. Felegyhazi, "Mix-Zones for Location Privacy in Vehicular Networks," in WiN-ITS Vacouver: ACM, 2007.
[15]
M. Gerlach and F. Guttler, "Privacy in VANETs using changing pseudonyms - Ideal and real," in 2007 Ieee 65th Vehicular Technology Conference, Vols 1--6, 2007, pp. 2521--2525.
[16]
F. Dotzer, "Privacy issues in vehicular ad hoc networks," in Privacy Enhancing Technologies. vol. 3856, G. Danezis and D. Martin, Eds., 2006, pp. 197--209.
[17]
E. Adamopoulou, K. Demestichas, C. Dessiniotis, J. Markoulidakis, and M. Theologou, "Architecture and scalability issues for the provision of anonymous realtime mobile community services," in 2007 Ieee 18th International Symposium on Personal, Indoor and Mobile Radio Communications, Vols 1--9 New York: Ieee, 2007, pp. 3980--3984.
[18]
H. B. Hu, J. L. Xu, and D. L. Lee, "PAM: An Efficient and Privacy-Aware Monitoring Framework for Continuously Moving Objects," Ieee Transactions on Knowledge and Data Engineering, vol. 22, pp. 404--419, Mar 2010.
[19]
D. Lin, E. Bertino, R. Cheng, and S. Prabhakar, "Location Privacy in Moving-Object Environments," Trans. Data Privacy, vol. 2, pp. 21--46, 2009.
[20]
P. Papadimitratos, L. Buttyan, T. Holczer, E. Schoch, J. Freudiger, M. Raya, Z. D. Ma, F. Kargl, A. Kung, and J. P. Hubaux, "Secure Vehicular Communication Systems: Design and Architecture," Ieee Communications Magazine, vol. 46, pp. 100--109, Nov 2008.
[21]
D. Kwon, S. Lee, and S. Lee, "Indexing the Current Positions of Moving Objects Using the Lazy Update R-tree," in Proceedings of the Third International Conference on Mobile Data Management: IEEE Computer Society, 2002.
[22]
M. L. Lee, W. Hsu, C. S. Jensen, B. Cui, and K. L. Teo, "Supporting frequent updates in R-trees: a bottom-up approach," in Proceedings of the 29th international conference on Very large data bases -Volume 29 Berlin, Germany: VLDB Endowment, 2003.
[23]
B. Hoh, M. Gruteser, H. Xiong, and A. Alrabady, "Preserving Privacy in GPS Traces via Uncertainty-Aware Path Cloaking," in Ccs'07: Proceedings of the 14th Acm Conference on Computer and Communications Security, S. D. C. DiVimercati, P. Syverson, and D. Evans, Eds. New York: Assoc Computing Machinery, 2007, pp. 161--171.
[24]
P. Samarati, "Protecting respondents' identities in microdata release," Ieee Transactions on Knowledge and Data Engineering, vol. 13, pp. 1010--1027, Nov-Dec 2001.
[25]
L. Sweeney, "Achieving k-anonymity privacy protection using generalization and suppression," International Journal of Uncertainty Fuzziness and Knowledge-Based Systems, vol. 10, pp. 571--588, Oct 2002.

Cited By

View all
  • (2020)Privacy-Preserving Compressive Sensing for Real-Time Traffic Monitoring in Urban CityIEEE Transactions on Vehicular Technology10.1109/TVT.2020.304279469:12(14510-14522)Online publication date: Dec-2020
  • (2013)Enhancing privacy in collaborative traffic‐monitoring systems using autonomous location updateIET Intelligent Transport Systems10.1049/iet-its.2011.02127:4(388-395)Online publication date: Dec-2013
  • (2011)PA-CTMProceedings of the 4th ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS10.1145/2071880.2071882(1-8)Online publication date: 1-Nov-2011

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SPRINGL '10: Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS
November 2010
76 pages
ISBN:9781450304351
DOI:10.1145/1868470
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 02 November 2010

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. collaborative traffic monitoring systems
  2. location based services
  3. networks
  4. privacy
  5. public key cryptography
  6. security
  7. traffic monitoring

Qualifiers

  • Research-article

Conference

GIS '10
Sponsor:

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 09 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2020)Privacy-Preserving Compressive Sensing for Real-Time Traffic Monitoring in Urban CityIEEE Transactions on Vehicular Technology10.1109/TVT.2020.304279469:12(14510-14522)Online publication date: Dec-2020
  • (2013)Enhancing privacy in collaborative traffic‐monitoring systems using autonomous location updateIET Intelligent Transport Systems10.1049/iet-its.2011.02127:4(388-395)Online publication date: Dec-2013
  • (2011)PA-CTMProceedings of the 4th ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS10.1145/2071880.2071882(1-8)Online publication date: 1-Nov-2011

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media