Abstract
Ubiquitous computing has also reached the insurance industry in the form of Usage Based Insurance models. Modern rates use sensor data to offer the user suitable pricing models adapted to his character. Our overview shows that insurance companies generally rely on driving behaviour to assess a user in risk categories. Based on the collected data, a new attack using kNN-DTW shows that, with the derived information, the identification of a driver in a group of all users of a vehicle is possible with more than 90% accuracy and therefore may represent a misuse of the data collection. Thus, motivated by the General Data Protection Regulation, questions regarding anonymisation become relevant. The suitability of standard methods known from Big Data is evaluated in the complex scenario Pay-How-You-Drive using both real-world and synthetic data. It shows that there are open questions considering the field of privacy-friendly Pay-How-You-Drive models.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
German Federal Supreme Court (Bundesgerichtshof, BGH), 2014, VI ZR 156/13.
- 2.
Vehicle axles: x: transverse axis, y: longitudinal axis, z: vertical axis; smartphone-to-vehicle alignment was carried out, otherwise correct identification is not possible.
References
Ayuso, M., Guillen, M., Nielsen, J.P.: Improving automobile insurance ratemaking using telematics: incorporating mileage and driver behaviour data. Transportation 46(3), 735–752 (2018). https://doi.org/10.1007/s11116-018-9890-7
Benndorf, V., Normann, H.T.: The willingness to sell personal data. Scandinavian J. Econ. 120(4), 1260–1278 (2018)
Eurostat: Household composition statistics (2019). https://ec.europa.eu/eurostat/statistics-explained/index.php/Household_composition_statistics#Household_size
Fung, B.C., Wang, K., Fu, A.W.C., Yu, P.S.: Introduction to Privacy-preserving Data Publishing: Concepts and Techniques. Chapman and Hall/CRC, Boca Raton (2010)
Hong, S.k., Gurjar, K., Kim, H.s., Moon, Y.s.: A survey on privacy preserving time-series data mining. In: 3rd International Conference on Intelligent Computational Systems, ICICS 2013 (2013)
Kang, R., Dabbish, L., Fruchter, N., Kiesler, S.: "My data just goes everywhere": user mental models of the internet and implications for privacy and security. In: Symposium on Usable Privacy and Security (SOUPS), vol. 2015, pp. 39–52 (2015)
Kreuter, F., Haas, G.C., Keusch, F., Bähr, S., Trappmann, M.: Collecting survey and smartphone sensor data with an app: opportunities and challenges around privacy and informed consent. Soc. Sci. Comput. Rev. 089443931881638 (2018)
MartÃnez, M.V., Echanobe, J., Del Campo, I.: Driver identification and impostor detection based on driving behavior signals. In: IEEE Conference on Intelligent Transportation Systems, Proceedings, ITSC, pp. 372–378 (2016)
Paefgen, J., Staake, T., Thiesse, F.: Resolving the misalignment between consumer privacy concerns and ubiquitous is design: the case of usage-based insurance. In: International Conference on Information Systems, ICIS 2012, vol. 3, pp. 2311–2327 (2012)
Pfitzmann, A., Köhntopp, M.: Anonymity, unobservability, and pseudonymity—a proposal for terminology. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol. 2009, pp. 1–9. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-44702-4_1
Schomp, K., Rabinovich, M., Allman, M.: Towards a model of DNS client behavior. In: Karagiannis, T., Dimitropoulos, X. (eds.) PAM 2016. LNCS, vol. 9631, pp. 263–275. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-30505-9_20
Takbiri, N., Houmansadr, A., Goeckel, D.L., Pishro-Nik, H.: Matching anonymized and obfuscated time series to users’ profiles. IEEE Trans. Inf. Theory 65(2), 724–741 (2019)
Thouvenot, V., Nogues, D., Gouttas, C.: Data-driven anonymization process applied to time series. In: CEUR Workshop Proceedings, vol. 2029, pp. 80–90 (2017)
Troncoso, C., Danezis, G., Kosta, E., Preneel, B.: Pripayd: privacy friendly pay-as-you-drive insurance. In: Proceedings of the 2007 ACM Workshop on Privacy in Electronic Society, WPES 2007 (2007)
Tselentis, D.I., Yannis, G., Vlahogianni, E.I.: Innovative motor insurance schemes: a review of current practices and emerging challenges. Accid. Anal. Prev. 98, 139–148 (2017)
Verbraucherschutz, P.d.A.W.: Telematiktarife im versicherungsbereich abschlussbericht der projektgruppe der arbeitsgemeinschaft wirtschaftlicher verbraucherschutz. Technical report (2019)
Zhou, L., Du, S., Zhu, H., Chen, C., Ota, K., Dong, M.: Location privacy in usage-based automotive insurance: attacks and countermeasures. IEEE Trans. Inf. Forensics Secur. 14(1), 196–211 (2019)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Roth, C., Aringer, S., Petersen, J., Nitschke, M. (2020). Are Sensor-Based Business Models a Threat to Privacy? The Case of Pay-How-You-Drive Insurance Models. In: Gritzalis, S., Weippl, E.R., Kotsis, G., Tjoa, A.M., Khalil, I. (eds) Trust, Privacy and Security in Digital Business. TrustBus 2020. Lecture Notes in Computer Science(), vol 12395. Springer, Cham. https://doi.org/10.1007/978-3-030-58986-8_6
Download citation
DOI: https://doi.org/10.1007/978-3-030-58986-8_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-58985-1
Online ISBN: 978-3-030-58986-8
eBook Packages: Computer ScienceComputer Science (R0)