Skip to main content

Cooperative Privacy Preservation for Internet of Vehicles with Mobile Edge Computing

  • Conference paper
  • First Online:
Book cover Cyberspace Safety and Security (CSS 2019)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 11982))

Included in the following conference series:

Abstract

The mobile edge computing is an attractive system paradigm to perform the local data processing and interactions at the edge of networks. The mobile edge computing enabled the internet of vehicles (MEC-IoV) is emerging as a convergence of the internet of things and mobile vehicular networks. The virtual vehicle shadow based privacy preservation scheme is proposed to address the cooperative scenarios, in which predictive location and segmented secret are jointly considered for protocol design. Meanwhile, the MinHash based similarity computing and the selective disclosure mechanism are respectively introduced for location and identity privacy preservation. The proposed scheme launches a new perspective of cooperative privacy preservation in the MEC-IoV with enhanced security requirements; it is suitable for the cooperative edge computing applications.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ding, J., Ni, C.C., Zhou, M., Gao, J.: Minhash hierarchy for privacy preserving trajectory sensing and query. In: 2017 16th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN), pp. 17–28. IEEE (2017)

    Google Scholar 

  2. Guo, L., et al.: A secure mechanism for big data collection in large scale Internet of vehicle. IEEE Internet Things J. 4(2), 601–610 (2017). https://doi.org/10.1109/JIOT.2017.2686451

    Article  Google Scholar 

  3. Guo, N., Ma, L., Gao, T.: Independent mix zone for location privacy in vehicular networks. IEEE Access 6, 16842–16850 (2018). https://doi.org/10.1109/ACCESS.2018.2800907

    Article  Google Scholar 

  4. He, Y., Zhao, N., Yin, H.: Integrated networking, caching, and computing for connected vehicles: a deep reinforcement learning approach. IEEE Trans. Veh. Technol. 67(1), 44–55 (2018). https://doi.org/10.1109/TVT.2017.2760281

    Article  Google Scholar 

  5. Hussain, R., et al.: Secure and privacy-aware incentives-based witness service in social Internet of vehicles clouds. IEEE Internet Things J. 5(4), 2441–2448 (2018). https://doi.org/10.1109/JIOT.2018.2847249

    Article  Google Scholar 

  6. Joy, J., Gerla, M.: Internet of vehicles and autonomous connected car-privacy and security issues. In: 2017 26th International Conference on Computer Communication and Networks (ICCCN), pp. 1–9. IEEE (2017). https://doi.org/10.1109/ICCCN.2017.8038391

  7. Kalnis, P., Mamoulis, N., Bakiras, S.: On discovering moving clusters in spatio-temporal data. In: Bauzer Medeiros, C., Egenhofer, M.J., Bertino, E. (eds.) SSTD 2005. LNCS, vol. 3633, pp. 364–381. Springer, Heidelberg (2005). https://doi.org/10.1007/11535331_21

    Chapter  Google Scholar 

  8. Kang, J., Yu, R., Huang, X., Zhang, Y.: Privacy-preserved pseudonym scheme for fog computing supported Internet of vehicles. IEEE Trans. Intell. Transp. Syst. 19(8), 2627–2637 (2017). https://doi.org/10.1109/TITS.2017.2764095

    Article  Google Scholar 

  9. Lim, J., Yu, H., Kim, K., Kim, M., Lee, S.B.: Preserving location privacy of connected vehicles with highly accurate location updates. IEEE Commun. Lett. 21(3), 540–543 (2017). https://doi.org/10.1109/LCOMM.2016.2637902

    Article  Google Scholar 

  10. Liu, H., Zhang, Y., Yang, T.: Blockchain-enabled security in electric vehicles cloud and edge computing. IEEE Netw. 32(3), 78–83 (2018). https://doi.org/10.1109/MNET.2018.1700344

    Article  Google Scholar 

  11. Liu, Y., Wang, Y., Chang, G.: Efficient privacy-preserving dual authentication and key agreement scheme for secure V2V communications in an IoV paradigm. IEEE Trans. Intell. Transp. Syst. 18(10), 2740–2749 (2017). https://doi.org/10.1109/TITS.2017.2657649

    Article  Google Scholar 

  12. Mason, J.C., Handscomb, D.C.: Chebyshev Polynomials. Chapman and Hall/CRC (2002)

    Google Scholar 

  13. Niu, B., Zhang, Z., Li, X., Li, H.: Privacy-area aware dummy generation algorithms for location-based services. In: 2014 IEEE International Conference on Communications (ICC), pp. 957–962. IEEE (2014). https://doi.org/10.1109/ICC.2014.6883443

  14. Wang, L., Liu, X.: NOTSA: novel OBU with three-level security architecture for Internet of vehicles. IEEE Internet Things J. 5(5), 3548–3558 (2018). https://doi.org/10.1109/JIOT.2018.2800281

    Article  Google Scholar 

Download references

Acknowledgment

This work is funded by the National Key R&D Program of China (2017YFB0802300), and National Natural Science Foundation of China (61601129). This work is partially supported by the Shanghai Science and Technology Commission Program (No. 18511105700).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hong Liu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Luo, J., Liu, H., Cheng, Q. (2019). Cooperative Privacy Preservation for Internet of Vehicles with Mobile Edge Computing. In: Vaidya, J., Zhang, X., Li, J. (eds) Cyberspace Safety and Security. CSS 2019. Lecture Notes in Computer Science(), vol 11982. Springer, Cham. https://doi.org/10.1007/978-3-030-37337-5_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-37337-5_24

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-37336-8

  • Online ISBN: 978-3-030-37337-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics