V2V-ESP: Vehicle-to-Vehicle Energy Sharing Privacy Protection Scheme Based on SDP Algorithm

被引:0
作者
Ju, Zhichao [1 ]
Li, Yuancheng [1 ]
机构
[1] North China Elect Power Univ, Sch Control & Comp Engn, Beijing 102206, Peoples R China
来源
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING | 2024年 / 11卷 / 01期
关键词
Trajectory; Privacy; Vehicular ad hoc networks; Differential privacy; Power systems; Perturbation methods; Costs; Trajectory protection; shuffle differential privacy; privacy preserving; electric vehicle;
D O I
10.1109/TNSE.2023.3321083
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Insufficient availability of electric vehicle (EV) charging infrastructure is a pressing issue, and vehicle-to-vehicle (V2V) energy trading offers a potential solution. V2V power transactions provide advantages like location flexibility and cost-effectiveness, but also entail privacy risks. Addressing user privacy concerns is a critical challenge. In this work, we propose a V2V energy sharing privacy protection scheme based on shuffle differential privacy (V2V-ESP). Our scheme utilizes a skeletal framework of critical locations to depict trajectories, extracting key positions that optimize computational efficiency while preserving essential trajectory features. By shuffle differential privacy method, we achieve a balance between data privacy and utility, effectively severing associations between messages and their owners through shuffling mechanisms. Additionally, we introduce a position perturbation algorithm that enhances data privacy protection and utility optimization by analyzing the context of EV route preservation. To validate V2V-ESP's effectiveness, we evaluate the scheme using real traffic trajectories from Beijing taxis. Results demonstrate the solution's independence from trusted third parties and effectively thwarts attacks involving multi-round location attack, global attack, trajectory inference attack and uniform attack. V2V-ESP scheme provides robust technical support for the future development and widespread adoption of EVs.
引用
收藏
页码:1093 / 1105
页数:13
相关论文
共 20 条
  • [1] Balcer V., 2019, Separating local & shuffled differential privacy via histograms, Vabs/1911.06879
  • [2] The Privacy Blanket of the Shuffle Model
    Balle, Borja
    Bell, James
    Gascon, Adria
    Nissim, Kobbi
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT II, 2019, 11693 : 638 - 667
  • [3] A Trajectory Released Scheme for the Internet of Vehicles Based on Differential Privacy
    Cai, Sujin
    Lyu, Xin
    Li, Xin
    Ban, Duohan
    Zeng, Tao
    [J]. IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2022, 23 (09) : 16534 - 16547
  • [4] Quantifying Differential Privacy in Continuous Data Release Under Temporal Correlations
    Cao, Yang
    Yoshikawa, Masatoshi
    Xiao, Yonghui
    Xiong, Li
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2019, 31 (07) : 1281 - 1295
  • [5] Chen R, 2016, PROC INT CONF DATA, P289, DOI 10.1109/ICDE.2016.7498248
  • [6] Detecting Violations of Differential Privacy
    Ding, Zeyu
    Wang, Yuxin
    Wang, Guanhong
    Zhang, Danfeng
    Kifer, Daniel
    [J]. PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 475 - 489
  • [7] Douglas D. H., 1973, Cartographica, Int. J. Geographic Inf. Geovis., V10, P112, DOI DOI 10.3138/FM57-6770-U75U-7727
  • [8] Calibrating noise to sensitivity in private data analysis
    Dwork, Cynthia
    McSherry, Frank
    Nissim, Kobbi
    Smith, Adam
    [J]. THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2006, 3876 : 265 - 284
  • [9] TGM: A Generative Mechanism for Publishing Trajectories With Differential Privacy
    Ghane, Soheila
    Kulik, Lars
    Ramamohanarao, Kotagiri
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (04): : 2611 - 2621
  • [10] Ju Z., 2024, IEEE Trans. Netw. Sci. Eng., V11, P672