Abstract
In the Vehicular Ad-hoc Networks (VANETs), a vehicle or the vehicle driver could be perceived and followed by listening in its inquiries (e.g., reference points) by an enemy, since these quires contain individual data and information, for example, the questions and area of the vehicle. This attack prompts dangers on the vehicles area protection. The current arrangements, practices anonymizer, a Third Trusted Party (TTP) in the middle of the LBS and the vehicles. The addition of the TTP shifts the imperilled element from the LBS to the Anonymizer, with respect to security hazard, and with the endangered anonymizer, the vehicles or vehicles drivers related information will likewise be in danger. In this paper, we think of productive area based correspondence protection in VANETs communication. In which, we utilize the Fog Computing (FC) alongside TTP calculation and data perturbation. Before sending the inquiry to the TTP first we anonymizes the communication information by utilizing data perturbation. Then, we utilize the Adaptive Interval Cloaking Algorithm (AICA) as TTP to handle the ideal question from vehicles to LBS. In this paper, we provide the double communication privacy based on data perturbations and AICA. Subsequent to accepting the prepared inquiry from the LBS, the TTP sends the outcomes back to the drives, where the vehicle drivers finds their ideal results. The results shows that the proposed method save the security area dependent on the questions at the low correspondence and computational expense.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Agrawal, D., Aggarwal, C.C.: On the design and quantification of privacy preserving data mining algorithms. In: Proceedings of the Twentieth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, pp. 247–255 (2001)
Arif, M., Wang, G.: Cloud-based service oriented architecture for social vehicular ad hoc network communications. Int. J. Commun. Netw. Distrib. Syst. 24(2), 143–166 (2020)
Arif, M., Wang, G., Balas, V.E.: Secure VANETs: trusted communication scheme between vehicles and infrastructure based on fog computing. Stud. Inf. Control 27(2), 235–246 (2018)
Arif, M., Wang, G., Balas, V.E., Geman, O., Castiglione, A., Chen, J.: SDN based communications privacy-preserving architecture for VANETs using fog computing. Veh. Commun. 26, 100265 (2020)
Arif, M., Wang, G., Bhuiyan, M.Z.A., Wang, T., Chen, J.: A survey on security attacks in VANETs: communication, applications and challenges. Veh. Commun. 19, 100179 (2019)
Arif, M., Wang, G., Chen, S.: Deep learning with non-parametric regression model for traffic flow prediction. In: IEEE 16th International Conference on Dependable, Autonomic and Secure Computing, 16th International Conference on Pervasive Intelligence and Computing, 4th International Conference on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC/PiCom/DataCom/CyberSciTech), pp. 681–688. IEEE (2018)
Arif, M., et al.: SDN-based VANETs, security attacks, applications, and challenges. Appl. Sci. 10(9), 3217 (2020)
Arif, M., Wang, G., Peng, T.: Track me if you can? Query based dual location privacy in vanets for V2V and V2I. In: 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), pp. 1091–1096. IEEE (2018)
Arif, M., Wang, G., Peng, T., Balas, V.E., Geman, O., Chen, J.: Optimization of communication in VANETs using fuzzy logic and artificial bee colony. J. Intell. Fuzzy Syst. 1–13 (2020, preprint)
Arif, M., Wang, G., Wang, T., Peng, T.: SDN-based secure VANETs communication with fog computing. In: Wang, G., Chen, J., Yang, L.T. (eds.) SpaCCS 2018. LNCS, vol. 11342, pp. 46–59. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-05345-1_4
Bonomi, F., Milito, R., Zhu, J., Addepalli, S.: Fog computing and its role in the internet of things. In: Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, pp. 13–16 (2012)
Bylykbashi, K., Qafzezi, E., Ikeda, M., Matsuo, K., Barolli, L.: Fuzzy-based driver monitoring system (FDMS): implementation of two intelligent FDMSs and a testbed for safe driving in VANETs. Future Gener. Comput. Syst. 105, 665–674 (2020)
Chaum, D.L.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24(2), 84–90 (1981)
Chen, C.M., Huang, Y., Wang, K.H., Kumari, S., Wu, M.E.: A secure authenticated and key exchange scheme for fog computing. Enterp. Inf. Syst. 1–16 (2020). https://doi.org/10.1080/17517575.2020.1712746
Chen, K., Liu, L.: A random rotation perturbation approach to privacy preserving data classification (2005)
Chen, K., Liu, L.: A survey of multiplicative perturbation for privacy-preserving data mining. In: Aggarwal, C.C., Yu, P.S. (eds.) Privacy-Preserving Data Mining. Advances in Database SystemsAdvances in Database Systems, vol. 34, pp. 157–181. Springer, Boston (2008). https://doi.org/10.1007/978-0-387-70992-5_7
Chen, K., Sun, G., Liu, L.: Towards attack-resilient geometric data perturbation. In: Proceedings of the 2007 SIAM International Conference on Data Mining, pp. 78–89. SIAM (2007)
Dastjerdi, A.V., Buyya, R.: Fog computing: helping the internet of things realize its potential. Computer 49(8), 112–116 (2016)
Evfimievski, A., Gehrke, J., Srikant, R.: Limiting privacy breaches in privacy preserving data mining. In: Proceedings of the Twenty-second ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, pp. 211–222 (2003)
Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of the 1st International Conference on Mobile Systems, Applications and Services, pp. 31–42 (2003)
Han, M., Liu, S., Ma, S., Wan, A.: Anonymous-authentication scheme based on fog computing for VANET. PLoS One 15(2), e0228319 (2020)
Hjaltason, G.R., Samet, H.: Ranking in spatial databases. In: Egenhofer, M.J., Herring, J.R. (eds.) SSD 1995. LNCS, vol. 951, pp. 83–95. Springer, Heidelberg (1995). https://doi.org/10.1007/3-540-60159-7_6
Khattak, H.A., Islam, S.U., Din, I.U., Guizani, M.: Integrating fog computing with VANETs: a consumer perspective. IEEE Commun. Stan. Mag. 3(1), 19–25 (2019)
Liu, K., Xiao, K., Dai, P., Lee, V., Guo, S., Cao, J.: Fog computing empowered data dissemination in software defined heterogeneous vanets. IEEE Trans. Mobile Comput. (2020). https://doi.org/10.1109/TMC.2020.2997460
Lu, R., Liang, X., Li, X., Lin, X., Shen, X.: EPPA: an efficient and privacy-preserving aggregation scheme for secure smart grid communications. IEEE Trans. Parallel Distrib. Syst. 23(9), 1621–1631 (2012)
Luan, T.H., Cai, L.X., Chen, J., Shen, X., Bai, F.: VTube: towards the media rich city life with autonomous vehicular content distribution. In: 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, pp. 359–367. IEEE (2011)
Ning, Z., Huang, J., Wang, X.: Vehicular fog computing: enabling real-time traffic management for smart cities. IEEE Wirel. Commun. 26(1), 87–93 (2019)
Oliveira, S.R.M., Zaïane, O.R.: Achieving privacy preservation when sharing data for clustering. In: Jonker, W., Petković, M. (eds.) SDM 2004. LNCS, vol. 3178, pp. 67–82. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-30073-1_6
Poolsappasit, N., Ray, I.: Towards achieving personalized privacy for location-based services. Trans. Data Priv. 2(1), 77–99 (2009)
Sadun, L.A.: Applied Linear Algebra: The Decoupling Principle. American Mathematical Society, Providence (2007)
Samarati, P., Sweeney, L.: Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression (1998)
Stewart, G.W.: The efficient generation of random orthogonal matrices with an application to condition estimators. SIAM J. Numer. Anal. 17(3), 403–409 (1980)
Vaquero, L.M., Rodero-Merino, L.: Finding your way in the fog: towards a comprehensive definition of fog computing. ACM SIGCOMM Comput. Commun. Rev. 44(5), 27–32 (2014)
Acknowledgments
This work was supported in part by the National Natural Science Foundation of China under Grant 61632009 and Grant 61872097, in part by the Guangdong Provincial Natural Science Foundation under Grant 2017A030308006, and in part by the High-Level Talents Program of Higher Education in Guangdong Province under Grant 2016ZJ01.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Arif, M., Chen, J., Liu, P., Wang, G. (2021). Location Based Communication Privacy in Internet of Vehicles Using Fog Computing. In: Wang, G., Chen, B., Li, W., Di Pietro, R., Yan, X., Han, H. (eds) Security, Privacy, and Anonymity in Computation, Communication, and Storage. SpaCCS 2020. Lecture Notes in Computer Science(), vol 12383. Springer, Cham. https://doi.org/10.1007/978-3-030-68884-4_7
Download citation
DOI: https://doi.org/10.1007/978-3-030-68884-4_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-68883-7
Online ISBN: 978-3-030-68884-4
eBook Packages: Computer ScienceComputer Science (R0)