Framework of data privacy preservation and location obfuscation in vehicular cloud networks

被引:8
作者
Al-Balasmeh, Hani [1 ]
Singh, Maninder [1 ]
Singh, Raman [1 ]
机构
[1] Thapar Inst Engn & Technol, Comp Sci & Engn Dept, Patiala, Punjab, India
关键词
applied cryptography; authentication; data and location privacy; privacy preservation; vehicular cloud network; SECURITY; AUTHENTICATION; ENCRYPTION; PROTECTION;
D O I
10.1002/cpe.6682
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The leakage of sensitive data of users and global positioning system location trajectories from different cloud computation sources have increased in daily lives. This critical problem can influence users' lives because attackers try to misuse the leaked information. In this study, we addressed the critical problem pertaining to the privacy of personal identification information (PII) and location information over vehicular cloud networks (VCNs). The problem was addressed by proposing a data and location privacy (DLP) framework that preserves data privacy in terms of the anonymity of PII and provides location privacy for users' trajectories through the obfuscation technique. The proposed DLP framework contains five stages: registration with VCN server, processing of PII/data privacy block, segregation of obfuscation data, authentication, and provision of cryptographic security. The result analysis shows that the proposed mechanism is able to generate obfuscated trajectories and successfully recomputes the original trajectories at the server side.
引用
收藏
页数:21
相关论文
共 35 条
[1]   From location to location pattern privacy in location-based services [J].
Abul, Osman ;
Bayrak, Cansin .
KNOWLEDGE AND INFORMATION SYSTEMS, 2018, 56 (03) :533-557
[2]   Machine-to-Machine Communication: An Overview of Opportunities [J].
Amodu, Oluwatosin Ahmed ;
Othman, Mohamed .
COMPUTER NETWORKS, 2018, 145 :255-276
[3]   Adaptive k-Anonymity Approach for Privacy Preserving in Cloud [J].
Arava, Karuna ;
Lingamgunta, Sumalatha .
ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2020, 45 (04) :2425-2432
[4]   An Obfuscation-Based Approach for Protecting Location Privacy [J].
Ardagna, Claudio A. ;
Cremonini, Marco ;
di Vimercati, Sabrina De Capitani ;
Samarati, Pierangela .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2011, 8 (01) :13-27
[5]  
Bettini C., 2018, Handbook of Mobile Data Privacy, P73
[6]   Blockchain-Based Key Management Scheme in Fog-Enabled IoT Systems [J].
Chen, Tong ;
Zhang, Lei ;
Choo, Kim-Kwang Raymond ;
Zhang, Rui ;
Meng, Xinyu .
IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (13) :10766-10778
[7]   An Updateable Token-Based Schema for Authentication and Access Management in Clouds [J].
Emadinia, Tayyebe ;
Moghaddam, Faraz Fatemi ;
Wieder, Philipp ;
Dabbaghi, Shirin ;
Yahyapour, Ramin .
2019 7TH INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD (FICLOUD 2019), 2019, :50-56
[8]   A JSON']JSON Token-Based Authentication and Access Management Schema for Cloud SaaS Applications [J].
Ethelbert, Obinna ;
Moghaddam, Faraz Fatemi ;
Wieder, Philipp ;
Yahyapour, Ramin .
2017 IEEE 5TH INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD (FICLOUD 2017), 2017, :47-53
[9]   A K-Anonymity Based Schema for Location Privacy Preservation [J].
Fei, Fan ;
Li, Shu ;
Dai, Haipeng ;
Hu, Chunhua ;
Dou, Wanchun ;
Ni, Qiang .
IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING, 2019, 4 (02) :156-167
[10]   Encrypted token based authentication with adapted SAML technology for cloud web services [J].
Indu, I. ;
Anand, P. M. Rubesh ;
Bhaskar, Vidhyacharan .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 99 :131-145