Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
demonstration

WiSec 2011 demo: PRECIOSA PeRA -- practical enforcement of privacy policies in intelligent transportation systems

Published: 29 November 2011 Publication History

Abstract

Cooperative Intelligent Transportation Systems must incorporate privacy-enhancing mechanisms to gain public acceptance. The PRECIOSA Privacy-enforcing Runtime Architecture (PeRA) provides a data-centric protection chain, which ensures that ITS components process data according to attached user-defined privacy policies. PeRA instances constitute a distributed privacy middleware that evaluates privacy policies to mediate data access by applications. An integrity protection layer creates a distributed policy enforcement perimeter between ITS nodes to prevent circumvention of policies. The PeRA has been implemented as a proof-of-concept prototype.

References

[1]
PRECIOSA (PRivacy Enabled Capability In Co-Operative Systems and Safety Applications) FP7 project. www.preciosa-project.org.
[2]
J. Balasch, A. Rial, C. Troncoso, B. Preneel, I. Verbauwhede, and C. Geuens. PrETP: Privacypreserving electronic toll pricing. In USENIX Security Symposium, 2010.
[3]
European Parliament and Council. Directive 2010/40/EU. Official Journal L 207, July 2010.
[4]
P. Hustinx. EDPS opinion on Intelligent Transport Systems. Opinions of the EDPS, July 2009.
[5]
F. Kargl, F. Schaub, and S. Dietzel. Mandatory Enforcement of Privacy Policies using Trusted Computing Principles. In AAAI Intelligent Information Privacy Management Symposium, 2010.

Cited By

View all
  • (2020)Service Recommendation Middleware Based on Location Privacy Protection in VANETIEEE Access10.1109/ACCESS.2020.29644228(12768-12783)Online publication date: 2020
  • (2015)Personal Agent for Services in ITSProceedings of the 2015 10th International Conference on Availability, Reliability and Security10.1109/ARES.2015.16(493-500)Online publication date: 24-Aug-2015
  • (2012)Privacy analysis using ontologiesProceedings of the second ACM conference on Data and Application Security and Privacy10.1145/2133601.2133627(205-216)Online publication date: 7-Feb-2012
  • Show More Cited By

Index Terms

  1. WiSec 2011 demo: PRECIOSA PeRA -- practical enforcement of privacy policies in intelligent transportation systems

            Recommendations

            Comments

            Information & Contributors

            Information

            Published In

            cover image ACM SIGMOBILE Mobile Computing and Communications Review
            ACM SIGMOBILE Mobile Computing and Communications Review  Volume 15, Issue 3
            July 2011
            47 pages
            ISSN:1559-1662
            EISSN:1931-1222
            DOI:10.1145/2073290
            Issue’s Table of Contents

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            Published: 29 November 2011
            Published in SIGMOBILE Volume 15, Issue 3

            Check for updates

            Qualifiers

            • Demonstration

            Contributors

            Other Metrics

            Bibliometrics & Citations

            Bibliometrics

            Article Metrics

            • Downloads (Last 12 months)2
            • Downloads (Last 6 weeks)1
            Reflects downloads up to 09 Nov 2024

            Other Metrics

            Citations

            Cited By

            View all
            • (2020)Service Recommendation Middleware Based on Location Privacy Protection in VANETIEEE Access10.1109/ACCESS.2020.29644228(12768-12783)Online publication date: 2020
            • (2015)Personal Agent for Services in ITSProceedings of the 2015 10th International Conference on Availability, Reliability and Security10.1109/ARES.2015.16(493-500)Online publication date: 24-Aug-2015
            • (2012)Privacy analysis using ontologiesProceedings of the second ACM conference on Data and Application Security and Privacy10.1145/2133601.2133627(205-216)Online publication date: 7-Feb-2012
            • (2012)CANE: A Controlled Application Environment for privacy protection in ITS2012 12th International Conference on ITS Telecommunications10.1109/ITST.2012.6458663(71-76)Online publication date: Nov-2012

            View Options

            Get Access

            Login options

            View options

            PDF

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader

            Media

            Figures

            Other

            Tables

            Share

            Share

            Share this Publication link

            Share on social media