ABSTRACT
Collaborative Traffic Monitoring (CTM) systems exploit the location information continuously collected from vehicles. Users collaborate by providing their location information to have a global picture of the current traffic in real-time. However, location information is very sensitive information that made privacy a major obstacle for the widespread usage of CTM systems. Some of these systems depend on periodic location updates, where a vehicle updates location periodically [1]; other systems trigger update at particular regions [2], or with random time periods [3]. For privacy issues, these systems rely on a trusted third party for enforcing a predetermined privacy level. They may also generate low quality data because of the low precision in both time and space [4]. In this paper, we present a privacy aware collaborative traffic monitoring system, PA-CTM, where moving objects send their location updates to a traffic server, the latter then processes current data and provides its users with current traffic status. Users authenticate themselves to traffic server using pseudonyms that are changed according to user's privacy preferences. PA-CTM deploys two mechanisms for enhancing privacy, the first mechanism is the use of pseudonyms (to authenticate to the traffic server) to hide real identities, and changing these pseudonyms to hide trajectory information from the traffic server. Users can control their privacy by frequently changing their pseudonyms and hence become anonymous to traffic server. The second privacy enhancement technique in PA-CTM is the use of a novel autonomous location update mechanism, ALUM. In ALUM, location update is performed according to moving objects' behavior (change in speed or direction) without the need to a trusted third party. Unlike state-of-the art techniques, ALUM does not require a trusted third-party for triggering vehicles to update their locations. We utilized the existence of location prediction errors to calculate the region where a particular vehicle is expected to be in and hence to calculate anonymity level at that region. We compared ALUM against periodic and random silent period update mechanisms and it showed better privacy results in terms of k-anonymity metric.
- L. Buttyan, T. Holczer, and I. Vajda, "On the effectiveness of changing pseudonyms to provide location privacy in VANETs," in Security and Privacy in Ad-hoc and Sensor Networks. LNCS 4572, Berlin: Springer-Verlag Berlin, 2007, pp. 129--141. Google ScholarDigital Library
- B. Hoh, M. Gruteser, R. Herring, J. Ban, D. Work, J. C. Herrera, A. M. Bayen, M. Annavaram, and Q. Jacobson, "Virtual Trip Lines for Distributed Privacy-Preserving Traffic Monitoring," in proceedings of the 6th International Conference on Mobile Systems, Applications, and Services: (Mobisys'08), 2008, pp. 15--28. Google ScholarDigital Library
- J. H. Song, V. W. S. Wong, and V. C. M. Leung, "Wireless Location Privacy Protection in Vehicular Ad-Hoc Networks," Mobile Networks & Applications, vol. 15, pp. 160--171, Feb 2010. Google ScholarDigital Library
- O. Abul, F. Bonchi, and M. Nanni, "Anonymization of moving objects databases by clustering and perturbation," Information Systems, vol. 35, pp. 884--910, Dec 2010. Google ScholarDigital Library
- J. Nadler, "Traffic Congestion and Air Quality," Association of Governments, Los Angeles 2007.Google Scholar
- B. Hoh and M. Gruteser, "Protecting location privacy through path confusion," in 1st International Conference on Security and Privacy for Emerging Areas in Communications Networks: (SecureComm 2011), 2005, pp. 194--205. Google ScholarDigital Library
- G. Calandriello, P. Papadimitratos, J. P. Hubaux, and A. Lioy, "Efficient and Robust Pseudonymous Authentication in VANET," in Proceedings of the Fourth ACM International Workshop on Vehicular Ad Hoc Networks: (Vanet'07), New York, NY, USA ACM, 2007, pp. 19--27. Google ScholarDigital Library
- M. Raya, P. Papadimitratos, and J. P. Hubaux, "Securing vehicular communications," IEEE Wireless Communications, vol. 13, pp. 8--15, Oct 2006. Google ScholarDigital Library
- J. Freudiger, M. Raya, and M. Felegyhazi, "Mix-Zones for Location Privacy in Vehicular Networks," in Proceedings of WiN-ITS Vacouver: ACM, 2007.Google Scholar
- M. Gerlach and F. Guttler, "Privacy in VANETs using changing pseudonyms - Ideal and real," in Vehicular Technology Conference: IEEE 65th, 2007, pp. 2521--2525.Google Scholar
- F. Dotzer, "Privacy issues in vehicular ad hoc networks," in Privacy Enhancing Technologies. LNCS. 3856, 2006, pp. 197--209. Google ScholarDigital Library
- E. Adamopoulou, K. Demestichas, C. Dessiniotis, J. Markoulidakis, and M. Theologou, "Architecture and scalability issues for the provision of anonymous real-time mobile community services," in IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications, Vols 1--9 New York, 2007, pp. 3980--3984.Google Scholar
- C. Y. Zhang and Y. Huang, "Cloaking locations for anonymous location based services: a hybrid approach," Geoinformatica, vol. 13, pp. 159--182, Jun 2009. Google ScholarDigital Library
- C. Y. Chow, M. F. Mokbel, and X. Liu, "A peer-to-peer spatial cloaking algorithm for anonymous location-based service," in Proceedings of the 14th annual ACM international symposium on Advances in geographic information systems Arlington, Virginia, USA: ACM, 2006. Google ScholarDigital Library
- P. Samarati, "Protecting respondents' identities in microdata release," IEEE Transactions on Knowledge and Data Engineering, vol. 13, pp. 1010--1027, Nov-Dec 2001. Google ScholarDigital Library
- B. Gedik and L. Liu, "Protecting location privacy with personalized k-anonymity: Architecture and algorithms," IEEE Transactions on Mobile Computing, vol. 7, pp. 1--18, Jan 2008. Google ScholarDigital Library
- H. B. Hu, J. L. Xu, and D. L. Lee, "PAM: An Efficient and Privacy-Aware Monitoring Framework for Continuously Moving Objects," IEEE Transactions on Knowledge and Data Engineering, vol. 22, pp. 404--419, Mar 2010. Google ScholarDigital Library
- B. Amro, Y. Saygin, and A. Levi, "P2-CTM: privacy preserving collaborative traffic monitoring," in Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS: (SPRINGL 2010), San Jose, California: ACM, 2010. Google ScholarDigital Library
- K. Sampigethaya, M. Li, L. Huang, and R. Poovendran, "AMOEBA: Robust location privacy scheme for VANET," IEEE Journal on Selected Areas in Communications, vol. 25, pp. 1569--1589, Oct 2007. Google ScholarDigital Library
- P. Sistla, O. Wolfson, S. Chamberlain, and S. Dao, "Modeling and Querying Moving Objects," in Proceedings of the 13th International Conference on Data Engineering: IEEE Computer Society, 1997. Google ScholarDigital Library
- E. Kaplan, T. B. Pedersen, E. Savas, and Y. Saygin, "Discovering private trajectories using background information," Data & Knowledge Engineering, vol. 69, pp. 723--736, 2010. Google ScholarDigital Library
- T. Brinkhoff, "A Framework for Generating Network-Based Moving Objects," Geoinformatica, vol. 6, pp. 153--180, 2002. Google ScholarDigital Library
- "San Francesco Transportation Fact Sheet," Municipal Transportation Agency, San Francesco November 2010 2010.Google Scholar
- J. S. Lewis, J. L. Rachlow, E. O. Garton, and L. A. Vierling, "Effects of habitat on GPS collar performance: using data screening to reduce location error," Journal of Applied Ecology, vol. 44, pp. 663--671, Jun 2007Google ScholarCross Ref
- B. Amro, A. Levi, and Y. Saygin, "CoRPPS: Collusion Resistant Pseudonym Providing System," in proceedings of the 3rd IEEE International Conference on Information Privacy, Security, Risk, and Trust: (PASSAT 2011), Boston, USA (in press).Google Scholar
Index Terms
- PA-CTM: privacy aware collaborative traffic monitoring system using autonomous location update mechanism
Recommendations
P2-CTM: privacy preserving collaborative traffic monitoring
SPRINGL '10: Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBSCollaborative Traffic Monitoring (CTM) systems exploit the location information continuously collected from cars. Users collaborate by providing their location information to have a global picture of the current traffic in real-time. However, location ...
Anonymity preserving framework for location-based information services
MEDES '10: Proceedings of the International Conference on Management of Emergent Digital EcoSystemsRecently, location based services (LBS) have become more important in today technology advancements. Privacy issue in LBS is one of the most important concerns. In this paper, we have proposed an anonymity preserving framework which can provide a user ...
Achieving Guaranteed Anonymity in GPS Traces via Uncertainty-Aware Path Cloaking
The integration of Global Positioning System (GPS) receivers and sensors into mobile devices has enabled collaborative sensing applications, which monitor the dynamics of environments through opportunistic collection of data from many users' devices. ...
Comments