PAU: Privacy Assessment method with Uncertainty consideration for cloud-based vehicular networks

被引:9
作者
Feng, Xia [1 ]
Wang, Liangmin [2 ]
机构
[1] Jiangsu Univ, Sch Automot & Traff Engn, Zhenjiang 212013, Jiangsu, Peoples R China
[2] Jiangsu Univ, Jiangsu Key Lab Secur Tech Ind Cyberspace, Zhenjiang, Jiangsu, Peoples R China
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2019年 / 96卷
基金
美国国家科学基金会; 中国国家自然科学基金;
关键词
Cloud-based vehicular network; Privacy; Uncertainty; V2X;
D O I
10.1016/j.future.2019.02.038
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the rapid progress of wireless communication and big data, the traditional Vehicular Ad-hoc Networks (VANETs) gradually evolve into the new Heterogeneous Vehicular Networks (HetVNets). Meanwhile, with the combination of multiple forms of communication modes, it initiates the Vehicle to Everything(V2X) communication model providing more efficient services. V2X communication generates much more private data than traditional VANETs, but the concerns over privacy breaches are increasing. these big data burdens the concerns about. To protect the privacy in these cloud-based vehicular networks is remained unsolved. In this paper, we propose Privacy Assessment method with Uncertainty consideration (PAU) to estimate the nodes' capability in protecting privacy, and then choose the vehicular nodes with high priority calculated by PAU to improve the whole network's privacy protection level. PAU expands subjective logic based on two-tuple to triad and keeps uncertainty as a constituent element. It evaluates the nodes by using the historical data from the vehicular cloud and the real-time data from V2V communications. The experiments and analysis show that the improvement of privacy-preserving capability achieved when applied PAU in Mix-zone scenarios. (C) 2019 Elsevier B.V. All rights reserved.
引用
收藏
页码:368 / 375
页数:8
相关论文
共 32 条
[1]  
3GPP, TS23285 3GPP
[2]  
3rd Generation Partnership Project (3GPP), 3GPP TS 33.501
[3]  
[Anonymous], 2018, 5G AM WHIT PAP CELL, P1
[4]  
Chaum D., 1988, Journal of Cryptology, V1, P65, DOI 10.1007/BF00206326
[5]  
Clauss S, 2006, P 2 ACM WORKSH DIG I, P55, DOI DOI 10.1145/1179529.1179539
[6]   A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements [J].
Deng, Mina ;
Wuyts, Kim ;
Scandariato, Riccardo ;
Preneel, Bart ;
Joosen, Wouter .
REQUIREMENTS ENGINEERING, 2011, 16 (01) :3-32
[7]  
Dhamgaye A., 2013, Int.J.Comput.Sci, V2, P88
[8]  
Dietzel S, 2015, IEEE VEHIC NETW CONF, P287, DOI 10.1109/VNC.2015.7385590
[9]   Safety-Aware Location Privacy in VANET: Evaluation and Comparison [J].
Emara, Karim .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2017, 66 (12) :10718-10731
[10]   S2PD: A Selective Sharing Scheme for Privacy Data in Vehicular Social Networks [J].
Feng, Xia ;
Wang, Liangmin .
IEEE ACCESS, 2018, 6 :55139-55148