Skip to main content

Location Based Communication Privacy in Internet of Vehicles Using Fog Computing

  • Conference paper
  • First Online:
Security, Privacy, and Anonymity in Computation, Communication, and Storage (SpaCCS 2020)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 12383))

  • 989 Accesses

Abstract

In the Vehicular Ad-hoc Networks (VANETs), a vehicle or the vehicle driver could be perceived and followed by listening in its inquiries (e.g., reference points) by an enemy, since these quires contain individual data and information, for example, the questions and area of the vehicle. This attack prompts dangers on the vehicles area protection. The current arrangements, practices anonymizer, a Third Trusted Party (TTP) in the middle of the LBS and the vehicles. The addition of the TTP shifts the imperilled element from the LBS to the Anonymizer, with respect to security hazard, and with the endangered anonymizer, the vehicles or vehicles drivers related information will likewise be in danger. In this paper, we think of productive area based correspondence protection in VANETs communication. In which, we utilize the Fog Computing (FC) alongside TTP calculation and data perturbation. Before sending the inquiry to the TTP first we anonymizes the communication information by utilizing data perturbation. Then, we utilize the Adaptive Interval Cloaking Algorithm (AICA) as TTP to handle the ideal question from vehicles to LBS. In this paper, we provide the double communication privacy based on data perturbations and AICA. Subsequent to accepting the prepared inquiry from the LBS, the TTP sends the outcomes back to the drives, where the vehicle drivers finds their ideal results. The results shows that the proposed method save the security area dependent on the questions at the low correspondence and computational expense.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Agrawal, D., Aggarwal, C.C.: On the design and quantification of privacy preserving data mining algorithms. In: Proceedings of the Twentieth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, pp. 247–255 (2001)

    Google Scholar 

  2. Arif, M., Wang, G.: Cloud-based service oriented architecture for social vehicular ad hoc network communications. Int. J. Commun. Netw. Distrib. Syst. 24(2), 143–166 (2020)

    Google Scholar 

  3. Arif, M., Wang, G., Balas, V.E.: Secure VANETs: trusted communication scheme between vehicles and infrastructure based on fog computing. Stud. Inf. Control 27(2), 235–246 (2018)

    Article  Google Scholar 

  4. Arif, M., Wang, G., Balas, V.E., Geman, O., Castiglione, A., Chen, J.: SDN based communications privacy-preserving architecture for VANETs using fog computing. Veh. Commun. 26, 100265 (2020)

    Google Scholar 

  5. Arif, M., Wang, G., Bhuiyan, M.Z.A., Wang, T., Chen, J.: A survey on security attacks in VANETs: communication, applications and challenges. Veh. Commun. 19, 100179 (2019)

    Google Scholar 

  6. Arif, M., Wang, G., Chen, S.: Deep learning with non-parametric regression model for traffic flow prediction. In: IEEE 16th International Conference on Dependable, Autonomic and Secure Computing, 16th International Conference on Pervasive Intelligence and Computing, 4th International Conference on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC/PiCom/DataCom/CyberSciTech), pp. 681–688. IEEE (2018)

    Google Scholar 

  7. Arif, M., et al.: SDN-based VANETs, security attacks, applications, and challenges. Appl. Sci. 10(9), 3217 (2020)

    Article  Google Scholar 

  8. Arif, M., Wang, G., Peng, T.: Track me if you can? Query based dual location privacy in vanets for V2V and V2I. In: 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), pp. 1091–1096. IEEE (2018)

    Google Scholar 

  9. Arif, M., Wang, G., Peng, T., Balas, V.E., Geman, O., Chen, J.: Optimization of communication in VANETs using fuzzy logic and artificial bee colony. J. Intell. Fuzzy Syst. 1–13 (2020, preprint)

    Google Scholar 

  10. Arif, M., Wang, G., Wang, T., Peng, T.: SDN-based secure VANETs communication with fog computing. In: Wang, G., Chen, J., Yang, L.T. (eds.) SpaCCS 2018. LNCS, vol. 11342, pp. 46–59. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-05345-1_4

    Chapter  Google Scholar 

  11. Bonomi, F., Milito, R., Zhu, J., Addepalli, S.: Fog computing and its role in the internet of things. In: Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, pp. 13–16 (2012)

    Google Scholar 

  12. Bylykbashi, K., Qafzezi, E., Ikeda, M., Matsuo, K., Barolli, L.: Fuzzy-based driver monitoring system (FDMS): implementation of two intelligent FDMSs and a testbed for safe driving in VANETs. Future Gener. Comput. Syst. 105, 665–674 (2020)

    Article  Google Scholar 

  13. Chaum, D.L.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24(2), 84–90 (1981)

    Article  Google Scholar 

  14. Chen, C.M., Huang, Y., Wang, K.H., Kumari, S., Wu, M.E.: A secure authenticated and key exchange scheme for fog computing. Enterp. Inf. Syst. 1–16 (2020). https://doi.org/10.1080/17517575.2020.1712746

  15. Chen, K., Liu, L.: A random rotation perturbation approach to privacy preserving data classification (2005)

    Google Scholar 

  16. Chen, K., Liu, L.: A survey of multiplicative perturbation for privacy-preserving data mining. In: Aggarwal, C.C., Yu, P.S. (eds.) Privacy-Preserving Data Mining. Advances in Database SystemsAdvances in Database Systems, vol. 34, pp. 157–181. Springer, Boston (2008). https://doi.org/10.1007/978-0-387-70992-5_7

    Chapter  Google Scholar 

  17. Chen, K., Sun, G., Liu, L.: Towards attack-resilient geometric data perturbation. In: Proceedings of the 2007 SIAM International Conference on Data Mining, pp. 78–89. SIAM (2007)

    Google Scholar 

  18. Dastjerdi, A.V., Buyya, R.: Fog computing: helping the internet of things realize its potential. Computer 49(8), 112–116 (2016)

    Article  Google Scholar 

  19. Evfimievski, A., Gehrke, J., Srikant, R.: Limiting privacy breaches in privacy preserving data mining. In: Proceedings of the Twenty-second ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, pp. 211–222 (2003)

    Google Scholar 

  20. Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of the 1st International Conference on Mobile Systems, Applications and Services, pp. 31–42 (2003)

    Google Scholar 

  21. Han, M., Liu, S., Ma, S., Wan, A.: Anonymous-authentication scheme based on fog computing for VANET. PLoS One 15(2), e0228319 (2020)

    Article  Google Scholar 

  22. Hjaltason, G.R., Samet, H.: Ranking in spatial databases. In: Egenhofer, M.J., Herring, J.R. (eds.) SSD 1995. LNCS, vol. 951, pp. 83–95. Springer, Heidelberg (1995). https://doi.org/10.1007/3-540-60159-7_6

    Chapter  Google Scholar 

  23. Khattak, H.A., Islam, S.U., Din, I.U., Guizani, M.: Integrating fog computing with VANETs: a consumer perspective. IEEE Commun. Stan. Mag. 3(1), 19–25 (2019)

    Article  Google Scholar 

  24. Liu, K., Xiao, K., Dai, P., Lee, V., Guo, S., Cao, J.: Fog computing empowered data dissemination in software defined heterogeneous vanets. IEEE Trans. Mobile Comput. (2020). https://doi.org/10.1109/TMC.2020.2997460

  25. Lu, R., Liang, X., Li, X., Lin, X., Shen, X.: EPPA: an efficient and privacy-preserving aggregation scheme for secure smart grid communications. IEEE Trans. Parallel Distrib. Syst. 23(9), 1621–1631 (2012)

    Article  Google Scholar 

  26. Luan, T.H., Cai, L.X., Chen, J., Shen, X., Bai, F.: VTube: towards the media rich city life with autonomous vehicular content distribution. In: 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, pp. 359–367. IEEE (2011)

    Google Scholar 

  27. Ning, Z., Huang, J., Wang, X.: Vehicular fog computing: enabling real-time traffic management for smart cities. IEEE Wirel. Commun. 26(1), 87–93 (2019)

    Article  Google Scholar 

  28. Oliveira, S.R.M., Zaïane, O.R.: Achieving privacy preservation when sharing data for clustering. In: Jonker, W., Petković, M. (eds.) SDM 2004. LNCS, vol. 3178, pp. 67–82. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-30073-1_6

    Chapter  Google Scholar 

  29. Poolsappasit, N., Ray, I.: Towards achieving personalized privacy for location-based services. Trans. Data Priv. 2(1), 77–99 (2009)

    MathSciNet  Google Scholar 

  30. Sadun, L.A.: Applied Linear Algebra: The Decoupling Principle. American Mathematical Society, Providence (2007)

    Book  Google Scholar 

  31. Samarati, P., Sweeney, L.: Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression (1998)

    Google Scholar 

  32. Stewart, G.W.: The efficient generation of random orthogonal matrices with an application to condition estimators. SIAM J. Numer. Anal. 17(3), 403–409 (1980)

    Article  MathSciNet  Google Scholar 

  33. Vaquero, L.M., Rodero-Merino, L.: Finding your way in the fog: towards a comprehensive definition of fog computing. ACM SIGCOMM Comput. Commun. Rev. 44(5), 27–32 (2014)

    Article  Google Scholar 

Download references

Acknowledgments

This work was supported in part by the National Natural Science Foundation of China under Grant 61632009 and Grant 61872097, in part by the Guangdong Provincial Natural Science Foundation under Grant 2017A030308006, and in part by the High-Level Talents Program of Higher Education in Guangdong Province under Grant 2016ZJ01.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Guojun Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Arif, M., Chen, J., Liu, P., Wang, G. (2021). Location Based Communication Privacy in Internet of Vehicles Using Fog Computing. In: Wang, G., Chen, B., Li, W., Di Pietro, R., Yan, X., Han, H. (eds) Security, Privacy, and Anonymity in Computation, Communication, and Storage. SpaCCS 2020. Lecture Notes in Computer Science(), vol 12383. Springer, Cham. https://doi.org/10.1007/978-3-030-68884-4_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-68884-4_7

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-68883-7

  • Online ISBN: 978-3-030-68884-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics