A survey of local differential privacy for securing internet of vehicles

@article{Zhao2019ASO,
  title={A survey of local differential privacy for securing internet of vehicles},
  author={Ping Zhao and Guanglin Zhang and Shaohua Wan and Gaoyang Liu and Tariq Umer},
  journal={The Journal of Supercomputing},
  year={2019},
  pages={1 - 22}
}
Internet of connected vehicles (IoV) are expected to enable intelligent traffic management, intelligent dynamic information services, intelligent vehicle control, etc. However, vehicles’ data privacy is argued to be a major barrier toward the application and development of IoV, thus causing a wide range of attentions. Local differential privacy (LDP) is the relaxed version of the privacy standard, differential privacy, and it can protect users’ data privacy against the untrusted third party in… Expand

Figures and Topics from this paper

A Comprehensive Survey on Local Differential Privacy
TLDR
This survey can serve as a good reference source for the research of LDP to deal with various privacy-related scenarios to be encountered in practice and identify future research directions and open challenges for LDP. Expand
Local Differential Privacy and Its Applications: A Comprehensive Survey
TLDR
This survey provides a comprehensive and structured overview of the local differential privacy technology and summarise and analyze state-of-the-art research in LDP and compare a range of methods in the context of answering a variety of queries and training different machine learning models. Expand
the Connection between Cryptography and Differential Privacy: a Survey
TLDR
This survey focuses on the connection between differential privacy mechanisms and cryptography methods in terms of utility improvement, and analyzes the utility amplification effect of anonymous communication and investigates how to improve utility by combining differential Privacy mechanisms with homomorphic encryption schemes. Expand
Joint Protection of Energy Security and Information Privacy for Energy Harvesting: An Incentive Federated Learning Approach
TLDR
A federated learning-based malicious energy user detection method according to energy status and behaviors is designed and a differential privacy-empowered information preservation scheme is devised, where sensitive information is perturbed and protected by the customized demand-based noise. Expand
Privacy Preserving Data Sharing in Online Social Networks
  • Randa Aljably
  • Computer Science
  • Communications in Computer and Information Science
  • 2021
TLDR
This paper develops a novel approach for anonymizing users’ statistical data by collecting specific points from the user’s behavior patterns rather than the entire data stream to be fed into local differential privacy (LDP). Expand
Blockchain-based solutions for security, privacy, and trust management in vehicular networks: a survey
TLDR
This is the first paper that provides a survey on blockchain-based solutions for security services’ improvements in vehicular networks and presented summary comparisons of the available models with their main features and objectives regarding security, privacy preservation, and trust management. Expand
A differentially private distributed data mining scheme with high efficiency for edge computing
TLDR
This work focuses on tree-based distributed data mining scheme with differential privacy, which is computationally friendly and provides an efficient data mining manner that can achieve a good prediction accuracy while providing rigorous privacy guarantee over the distributed data. Expand
Demand-Driven Data Acquisition for Large Scale Fleets
TLDR
This work presents a system that performs vehicle-specific minimization of data acquisition by mapping individual data demands to individual vehicles and can be used by other automakers or operators of large sensor networks. Expand
A dynamic priority strategy for IoV data scheduling towards key data
TLDR
A new dynamic priority strategy towards key data and a new formula for updating the priorities of data has been put forward along with a procedure for taking feedback into account to improve the efficiency and accuracy of information reception and processing. Expand
Data congestion in VANETs: research directions and new trends through a bibliometric analysis
TLDR
The status of research trends between 2010 and 2019 for the domain “Data congestion in VANETs” is examined and a software tool named the VOSviewer is used to create and envision the selected field’s bibliometric networks. Expand
...
1
2
...

References

SHOWING 1-10 OF 131 REFERENCES
Highly efficient randomized authentication in VANETs
TLDR
A highly efficient randomized authentication protocol that leverages homomorphic encryption to allow each individual vehicle to self-generate any number of authenticated identities to achieve full anonymity in VANETs is proposed. Expand
An edge computing-enabled computation offloading method with privacy preservation for internet of connected vehicles
TLDR
A privacy preservation method, named ECO, with privacy preservation for IoV is proposed in this paper and NSGA-II (non-dominated sorting genetic algorithm II) is adopted to realize multi-objective optimization to reduce the execution time and energy consumption of ECDs and prevent privacy conflicts of the computing tasks. Expand
PrivEx: Private Collection of Traffic Statistics for Anonymous Communication Networks
TLDR
This work proposes a statistical data collection system, PrivEx, for collecting egress traffic statistics from anonymous communication networks in a secure and privacy-preserving manner, based on distributed differential privacy and secure multiparty computation. Expand
A secret push messaging service in VANET clouds
  • Wei-Chen Wu
  • Computer Science
  • The Journal of Supercomputing
  • 2016
TLDR
Cryptography in this paper will be discussed to meet the vehicle privacy and information security needs, as well as bilinear pairing function to solve security problems. Expand
Proactively Accountable Anonymous Messaging in Verdict
TLDR
Verdict is presented, the first practical anonymous group communication system built using proactively verifiable DC-nets: participants use public-key cryptography to construct DC-net ciphertexts, and use zero-knowledge proofs of knowledge to detect and exclude misbehavior before disruption. Expand
AnonyCast: privacy-preserving location distribution for anonymous crowd tracking systems
TLDR
AnonyCast, a novel privacy-aware mechanism for delivering precise location information measured by crowd-tracking systems to individual pedestrians' smartphones, uses sparsely placed Bluetooth Low Energy transmitters to advertise location-dependent, time-varying keys. Expand
Differentially Private k-Anonymity: Achieving Query Privacy in Location-Based Services
TLDR
The concepts of differential privacy and k-anonymity are combined to establish a novel notion of differentially private k-Anonymity (DPkA) for query privacy in LBS and an algorithm to achieve ε-DPKA with bounded ε is presented. Expand
A Comprehensive Comparison of Multiparty Secure Additions with Differential Privacy
TLDR
This paper considers the problem of secure data aggregation in a distributed setting, while ensuring differential privacy of the result, and introduces a new distributed privacy mechanism with noise drawn from the Laplace distribution, which achieves smaller redundant noise with efficiency. Expand
Secure Data Transmission Through Reliable Vehicles in VANET Using Optimal Lightweight Cryptography
TLDR
This work proposes a solution to control the assaults over the VANET security by improving the security dimension of data transmission through network framework the inspired Random Firefly enhancement used to discover the reliable vehicles in created VNET topology. Expand
RobLoP: Towards Robust Privacy Preserving Against Location Dependent Attacks in Continuous LBS Queries
TLDR
RobLoP is the first work that can preserve location privacy against LDA thoroughly and closely with a theoretical guarantee and the effectiveness and superiority of RobLoP to state-of-the-art studies are validated via extensive simulations. Expand
...
1
2
3
4
5
...