PPVC: Towards a Personalized Local Differential Privacy-Preserving Scheme for V2G Charging Networks

被引:0
作者
Qin, Peng [1 ]
Wang, Lina [1 ]
机构
[1] Wuhan Univ, Sch Cyber Sci & Engn, Key Lab Aerosp Informat Secur & Trusted Comp, Minist Educ, Wuhan 430072, Peoples R China
基金
中国国家自然科学基金;
关键词
differential privacy; privacy preservation; vehicle to grid; quality of service; LOCATION PRIVACY; MECHANISM;
D O I
10.3390/math11204257
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
The rapid development of electric vehicles provides users with convenience of life. When users enjoy the V2G charging service, privacy leakage of their charging location is a crucial security issue. Existing privacy-preserving algorithms for EV access to charging locations suffer from the problem of nondefendable background knowledge attacks and privacy attacks by untrustworthy third parties. We propose a personalized location privacy protection scheme (PPVC) based on differential privacy to meet users' personalized EV charging requirements while protecting their privacy. First, by constructing a decision matrix, PPVC describes recommended routes' utility and privacy effects. Then, a utility model is constructed based on the multiattribute theory. The user's privacy preferences are integrated into the model to provide the route with the best utility. Finally, considering the privacy preference needs of users, the Euclidean distance share is used to assign appropriate privacy budgets to users and determine the generation range of false locations to generate the service request location with the highest utility. The experimental results show that the proposed personalized location privacy protection scheme can meet the service demands of users while reasonably protecting their privacy to provide higher service quality. Compared with existing solutions, PPVC improves the charging efficiency by up to 25%, and 8% at the same privacy protection level.
引用
收藏
页数:19
相关论文
共 38 条
  • [1] An adaptive geo-indistinguishability mechanism for continuous LBS queries
    Al-Dhubhani, Raed
    Cazalas, Jonathan M.
    [J]. WIRELESS NETWORKS, 2018, 24 (08) : 3221 - 3239
  • [2] Andras EM, 2013, P ACM C COMP COMM SE
  • [3] Andreoletti D, 2019, IEEE ICC
  • [4] [Anonymous], 2013, Network data
  • [5] Smart Meter Data Privacy: A Survey
    Asghar, Muhammad Rizwan
    Dan, Gyorgy
    Miorandi, Daniele
    Chlamtac, Imrich
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2017, 19 (04): : 2820 - 2835
  • [6] Fast unfolding of communities in large networks
    Blondel, Vincent D.
    Guillaume, Jean-Loup
    Lambiotte, Renaud
    Lefebvre, Etienne
    [J]. JOURNAL OF STATISTICAL MECHANICS-THEORY AND EXPERIMENT, 2008,
  • [7] SDN-Based Privacy Preserving Cross Domain Routing
    Chen, Qingjun
    Shi, Shouqian
    Li, Xin
    Qian, Chen
    Zhong, Sheng
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2019, 16 (06) : 930 - 943
  • [8] Improving Data Utility Through Game Theory in Personalized Differential Privacy
    Cui, Lei
    Qu, Youyang
    Nosouhi, Mohammad Reza
    Yu, Shui
    Niu, Jian-Wei
    Xie, Gang
    [J]. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2019, 34 (02) : 272 - 286
  • [9] Duchi JC, 2013, ANN ALLERTON CONF, P1592, DOI 10.1109/Allerton.2013.6736718
  • [10] Dwork C., 2006, Encyclopedia of Cryptography and Security