Privacy-Aware Traffic Flow Prediction Based on Multi-Party Sensor Data with Zero Trust in Smart City

被引:85
作者
Wang, Fan [1 ]
Li, Guangshun [1 ]
Wang, Yilei [1 ]
Rafique, Wajid [2 ]
Khosravi, Mohammad R. [3 ,4 ]
Liu, Guanfeng [5 ]
Liu, Yuwen [1 ]
Qi, Lianyong [1 ]
机构
[1] Qufu Normal Univ, Sch Comp Sci, Rizhao, Peoples R China
[2] Univ Montreal, Dept Comp Sci & Operat Res, Montreal, PQ, Canada
[3] Persian Gulf Univ, Dept Comp Engn, Bushehr, Iran
[4] Shiraz Univ Technol, Dept Elect & Elect Engn, Shiraz, Iran
[5] QMacquarie Univ, Dept Comp, Sydney, Australia
基金
中国国家自然科学基金;
关键词
Traffic flow prediction; multi-party sensors; zero trust; privacy; smart city; locality-sensitive hashing; NEURAL-NETWORK; BIG DATA; OPTIMIZATION; INTERNET; MODEL;
D O I
10.1145/3511904
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the continuous increment of city volume and size, a number of traffic-related urban units (e.g., vehicles, roads, buildings, etc.) are emerging rapidly, which plays a heavy burden on the scientific traffic control of smart cities. In this situation, it is becoming a necessity to utilize the sensor data from massive cameras deployed at city crossings for accurate traffic flow prediction. However, the traffic sensor data are often distributed and stored by different organizations or partieswith zero trust, which impedes themulti-party sensor data sharing significantly due to privacy concerns. Therefore, it requires challenging efforts to balance the trade-off between data sharing and data privacy to enable cross-organization traffic data fusion and prediction. In light of this challenge, we put forward an accurate LSH (locality-sensitive hashing)-based traffic flow prediction approach with the ability to protect privacy. Finally, through a series of experiments deployed on a real-world traffic dataset, we demonstrate the feasibility of our proposal in terms of prediction accuracy and efficiency while guaranteeing sensor data privacy.
引用
收藏
页数:19
相关论文
共 45 条
[1]  
Alghamdi T, 2019, INT WIREL COMMUN, P1227, DOI 10.1109/IWCMC.2019.8766698
[2]   Generating semantically enriched user profiles for web personalization [J].
Anand, Sarabjot Singh ;
Kearney, Patricia ;
Shapcott, Mary .
ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2007, 7 (04)
[3]   A spatiotemporal correlative k-nearest neighbor model for short-term traffic multistep forecasting [J].
Cai, Pinlong ;
Wang, Yunpeng ;
Lu, Guangquan ;
Chen, Peng ;
Ding, Chuan ;
Sun, Jianping .
TRANSPORTATION RESEARCH PART C-EMERGING TECHNOLOGIES, 2016, 62 :21-34
[4]   Network Coding Based Privacy Preservation against Traffic Analysis in Multi-Hop Wireless Networks [J].
Fan, Yanfei ;
Jiang, Yixin ;
Zhu, Haojin ;
Chen, Jiming ;
Shen, Xuemin .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2011, 10 (03) :834-843
[5]   An Improved Bayesian Combination Model for Short-Term Traffic Prediction With Deep Learning [J].
Gu, Yuanli ;
Lu, Wenqi ;
Xu, Xinyue ;
Qin, Lingqiao ;
Shao, Zhuangzhuang ;
Zhang, Hanyu .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2020, 21 (03) :1332-1342
[6]   Prediction of COVID-19 Confirmed, Death, and Cured Cases in India Using Random Forest Model [J].
Gupta, Vishan Kumar ;
Gupta, Avdhesh ;
Kumar, Dinesh ;
Sardana, Anjali .
BIG DATA MINING AND ANALYTICS, 2021, 4 (02) :116-123
[7]   Short-term traffic flow rate forecasting based on identifying similar traffic patterns [J].
Habtemichael, Filmon G. ;
Cetin, Mecit .
TRANSPORTATION RESEARCH PART C-EMERGING TECHNOLOGIES, 2016, 66 :61-78
[8]   An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks [J].
He, Debiao ;
Zeadally, Sherali ;
Xu, Baowen ;
Huang, Xinyi .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (12) :2681-2691
[9]   Combating Dependence Explosion in Forensic Analysis Using Alternative Tag Propagation Semantics [J].
Hossain, Md Nahid ;
Sheikhi, Sanaz ;
Sekar, R. .
2020 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2020), 2020, :1139-1155
[10]   Mitigating Data Sparsity Using Similarity Reinforcement-Enhanced Collaborative Filtering [J].
Hu, Yan ;
Shi, Weisong ;
Li, Hong ;
Hu, Xiaohui .
ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2017, 17 (03)