Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2071880.2071882acmconferencesArticle/Chapter ViewAbstractPublication PagesgisConference Proceedingsconference-collections
research-article

PA-CTM: privacy aware collaborative traffic monitoring system using autonomous location update mechanism

Published:01 November 2011Publication History

ABSTRACT

Collaborative Traffic Monitoring (CTM) systems exploit the location information continuously collected from vehicles. Users collaborate by providing their location information to have a global picture of the current traffic in real-time. However, location information is very sensitive information that made privacy a major obstacle for the widespread usage of CTM systems. Some of these systems depend on periodic location updates, where a vehicle updates location periodically [1]; other systems trigger update at particular regions [2], or with random time periods [3]. For privacy issues, these systems rely on a trusted third party for enforcing a predetermined privacy level. They may also generate low quality data because of the low precision in both time and space [4]. In this paper, we present a privacy aware collaborative traffic monitoring system, PA-CTM, where moving objects send their location updates to a traffic server, the latter then processes current data and provides its users with current traffic status. Users authenticate themselves to traffic server using pseudonyms that are changed according to user's privacy preferences. PA-CTM deploys two mechanisms for enhancing privacy, the first mechanism is the use of pseudonyms (to authenticate to the traffic server) to hide real identities, and changing these pseudonyms to hide trajectory information from the traffic server. Users can control their privacy by frequently changing their pseudonyms and hence become anonymous to traffic server. The second privacy enhancement technique in PA-CTM is the use of a novel autonomous location update mechanism, ALUM. In ALUM, location update is performed according to moving objects' behavior (change in speed or direction) without the need to a trusted third party. Unlike state-of-the art techniques, ALUM does not require a trusted third-party for triggering vehicles to update their locations. We utilized the existence of location prediction errors to calculate the region where a particular vehicle is expected to be in and hence to calculate anonymity level at that region. We compared ALUM against periodic and random silent period update mechanisms and it showed better privacy results in terms of k-anonymity metric.

References

  1. L. Buttyan, T. Holczer, and I. Vajda, "On the effectiveness of changing pseudonyms to provide location privacy in VANETs," in Security and Privacy in Ad-hoc and Sensor Networks. LNCS 4572, Berlin: Springer-Verlag Berlin, 2007, pp. 129--141. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. B. Hoh, M. Gruteser, R. Herring, J. Ban, D. Work, J. C. Herrera, A. M. Bayen, M. Annavaram, and Q. Jacobson, "Virtual Trip Lines for Distributed Privacy-Preserving Traffic Monitoring," in proceedings of the 6th International Conference on Mobile Systems, Applications, and Services: (Mobisys'08), 2008, pp. 15--28. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. J. H. Song, V. W. S. Wong, and V. C. M. Leung, "Wireless Location Privacy Protection in Vehicular Ad-Hoc Networks," Mobile Networks & Applications, vol. 15, pp. 160--171, Feb 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. O. Abul, F. Bonchi, and M. Nanni, "Anonymization of moving objects databases by clustering and perturbation," Information Systems, vol. 35, pp. 884--910, Dec 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. J. Nadler, "Traffic Congestion and Air Quality," Association of Governments, Los Angeles 2007.Google ScholarGoogle Scholar
  6. B. Hoh and M. Gruteser, "Protecting location privacy through path confusion," in 1st International Conference on Security and Privacy for Emerging Areas in Communications Networks: (SecureComm 2011), 2005, pp. 194--205. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. G. Calandriello, P. Papadimitratos, J. P. Hubaux, and A. Lioy, "Efficient and Robust Pseudonymous Authentication in VANET," in Proceedings of the Fourth ACM International Workshop on Vehicular Ad Hoc Networks: (Vanet'07), New York, NY, USA ACM, 2007, pp. 19--27. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. M. Raya, P. Papadimitratos, and J. P. Hubaux, "Securing vehicular communications," IEEE Wireless Communications, vol. 13, pp. 8--15, Oct 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. J. Freudiger, M. Raya, and M. Felegyhazi, "Mix-Zones for Location Privacy in Vehicular Networks," in Proceedings of WiN-ITS Vacouver: ACM, 2007.Google ScholarGoogle Scholar
  10. M. Gerlach and F. Guttler, "Privacy in VANETs using changing pseudonyms - Ideal and real," in Vehicular Technology Conference: IEEE 65th, 2007, pp. 2521--2525.Google ScholarGoogle Scholar
  11. F. Dotzer, "Privacy issues in vehicular ad hoc networks," in Privacy Enhancing Technologies. LNCS. 3856, 2006, pp. 197--209. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. E. Adamopoulou, K. Demestichas, C. Dessiniotis, J. Markoulidakis, and M. Theologou, "Architecture and scalability issues for the provision of anonymous real-time mobile community services," in IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications, Vols 1--9 New York, 2007, pp. 3980--3984.Google ScholarGoogle Scholar
  13. C. Y. Zhang and Y. Huang, "Cloaking locations for anonymous location based services: a hybrid approach," Geoinformatica, vol. 13, pp. 159--182, Jun 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. C. Y. Chow, M. F. Mokbel, and X. Liu, "A peer-to-peer spatial cloaking algorithm for anonymous location-based service," in Proceedings of the 14th annual ACM international symposium on Advances in geographic information systems Arlington, Virginia, USA: ACM, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. P. Samarati, "Protecting respondents' identities in microdata release," IEEE Transactions on Knowledge and Data Engineering, vol. 13, pp. 1010--1027, Nov-Dec 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. B. Gedik and L. Liu, "Protecting location privacy with personalized k-anonymity: Architecture and algorithms," IEEE Transactions on Mobile Computing, vol. 7, pp. 1--18, Jan 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. H. B. Hu, J. L. Xu, and D. L. Lee, "PAM: An Efficient and Privacy-Aware Monitoring Framework for Continuously Moving Objects," IEEE Transactions on Knowledge and Data Engineering, vol. 22, pp. 404--419, Mar 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. B. Amro, Y. Saygin, and A. Levi, "P2-CTM: privacy preserving collaborative traffic monitoring," in Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS: (SPRINGL 2010), San Jose, California: ACM, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. K. Sampigethaya, M. Li, L. Huang, and R. Poovendran, "AMOEBA: Robust location privacy scheme for VANET," IEEE Journal on Selected Areas in Communications, vol. 25, pp. 1569--1589, Oct 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. P. Sistla, O. Wolfson, S. Chamberlain, and S. Dao, "Modeling and Querying Moving Objects," in Proceedings of the 13th International Conference on Data Engineering: IEEE Computer Society, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. E. Kaplan, T. B. Pedersen, E. Savas, and Y. Saygin, "Discovering private trajectories using background information," Data & Knowledge Engineering, vol. 69, pp. 723--736, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. T. Brinkhoff, "A Framework for Generating Network-Based Moving Objects," Geoinformatica, vol. 6, pp. 153--180, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. "San Francesco Transportation Fact Sheet," Municipal Transportation Agency, San Francesco November 2010 2010.Google ScholarGoogle Scholar
  24. J. S. Lewis, J. L. Rachlow, E. O. Garton, and L. A. Vierling, "Effects of habitat on GPS collar performance: using data screening to reduce location error," Journal of Applied Ecology, vol. 44, pp. 663--671, Jun 2007Google ScholarGoogle ScholarCross RefCross Ref
  25. B. Amro, A. Levi, and Y. Saygin, "CoRPPS: Collusion Resistant Pseudonym Providing System," in proceedings of the 3rd IEEE International Conference on Information Privacy, Security, Risk, and Trust: (PASSAT 2011), Boston, USA (in press).Google ScholarGoogle Scholar

Index Terms

  1. PA-CTM: privacy aware collaborative traffic monitoring system using autonomous location update mechanism

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            SPRINGL '11: Proceedings of the 4th ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS
            November 2011
            74 pages
            ISBN:9781450310321
            DOI:10.1145/2071880

            Copyright © 2011 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 1 November 2011

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader