Protecting Respondents' Identities in Microdata Release
IEEE Transactions on Knowledge and Data Engineering
Indexing the Current Positions of Moving Objects Using the Lazy Update R-tree
MDM '02 Proceedings of the Third International Conference on Mobile Data Management
Achieving k-anonymity privacy protection using generalization and suppression
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
Protecting Location Privacy Through Path Confusion
SECURECOMM '05 Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
A study on the value of location privacy
Proceedings of the 5th ACM workshop on Privacy in electronic society
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Proceedings of the 1st international conference on Mobile systems, applications and services
Efficient and robust pseudonymous authentication in VANET
Proceedings of the fourth ACM international workshop on Vehicular ad hoc networks
Preserving privacy in gps traces via uncertainty-aware path cloaking
Proceedings of the 14th ACM conference on Computer and communications security
Supporting frequent updates in R-trees: a bottom-up approach
VLDB '03 Proceedings of the 29th international conference on Very large data bases - Volume 29
Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms
IEEE Transactions on Mobile Computing
Virtual trip lines for distributed privacy-preserving traffic monitoring
Proceedings of the 6th international conference on Mobile systems, applications, and services
Location Privacy in Moving-Object Environments
Transactions on Data Privacy
PAM: An Efficient and Privacy-Aware Monitoring Framework for Continuously Moving Objects
IEEE Transactions on Knowledge and Data Engineering
On the effectiveness of changing pseudonyms to provide location privacy in VANETS
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
Privacy issues in vehicular ad hoc networks
PET'05 Proceedings of the 5th international conference on Privacy Enhancing Technologies
SECURING VEHICULAR COMMUNICATIONS
IEEE Wireless Communications
Secure vehicular communication systems: design and architecture
IEEE Communications Magazine
Proceedings of the 4th ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS
Hi-index | 0.00 |
Collaborative Traffic Monitoring (CTM) systems exploit the location information continuously collected from cars. Users collaborate by providing their location information to have a global picture of the current traffic in real-time. However, location is very sensitive information. Therefore, privacy is a major obstacle for the widespread usage of CTM systems. In this paper, we present our position for a novel system addressing the security and especially privacy problems of CTM systems. Existing CTM solutions generally use two different methodologies. The first one is the dedicated infrastructure approach, also called VANETs (Vehicular Ad Hoc Networks), where a dedicated infrastructure for communication is deployed. The second methodology utilizes existing wireless networks, such as GSM, GPRS, EDGE, UMTS and Wi-Fi. Our P2-CTM (Privacy Preserving CTM) approach combines the best parts of these two existing approaches. In order to address the privacy challenge in CTM systems, we propose a privacy preserving location update mechanism that meets the requirements of both traffic monitoring and map generation. A privacy metric is adopted to evaluate the location update mechanism. We also discuss the performance issues regarding the location update mechanism. We aim to have a sound indication for our system from the points of view of privacy, security and performance.