Skip to main content

Privacy Protection Framework in Social Networked Cars

  • Conference paper
  • First Online:

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 540))

Abstract

With the social networked cars develops, security issues begin to be concerned. In this paper, we survey the major security threats and attacks types; then present the security objectives for social networked cars; finally, considering the key treat is the privacy challenges, we propose corresponding privacy protection solutions for social networked cars. The experiment has been executed, and preliminary results have been encouraging.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Redelmeier, D.A., Tibshirani, R.J.: Association between Cellular-Telephone Calls and Motor Vehicle Collisions. The New England Journal of Medicine 336, 453–458 (1997)

    Google Scholar 

  2. ‘Toyota Friend’: Social network for cars, owners, dealers & Toyota, Telematics News (May 23, 2011)

    Google Scholar 

  3. Gong, Z., Sun, G.-Z., Xie, X.: Protecting privacy in location-based services using K-anonymity without cloaked region. In: Eleventh International Conference on Mobile Data Management (2010)

    Google Scholar 

  4. Zhang, W., Cui, X., Li, D., Yuan, D., Wang, M.: 2010 18th International Conference on Geoinformatics, Beijing, China (2010)

    Google Scholar 

  5. Dewri, R., Thurimella, R.: Exploiting Service Similarity for Privacy in Location Based Search Queries. IEEE Transactions on Parallel and Distributed Systems, February 25, 2013

    Google Scholar 

  6. Nosko, A., Wood, E., Molema, S.: All about me: Disclosure in online social networking profiles: The case of FACEBOOK. Computers in Human Behavior 26(3), 406–418 (2010)

    Article  Google Scholar 

  7. Chalkias, K., Baldimtsi, F., Hristu-Varsakelis, D., Stephanides, G.: Two Types of Key-Compromise Impersonation Attacks against One-Pass Key Establishment Protocols. Communications in Computer and Information Science 23(pt. 3), 227–238 (2009)

    Google Scholar 

  8. Jian-Zhu, L., Zhou, J.: Preventing delegation-based mobile authentications from man-in-the-middle attacks. Computer Standards & Interfaces 34(3), 314–326 (2012)

    Article  Google Scholar 

  9. Jahid, S., Nilizadeh, S., Mittal, P., Borisov, N., Kapadia, A.: DECENT: A decentralized architecture for enforcing privacy in online social networks. In: 2012 IEEE International Conference on Pervasive Computing and Communications Workshops (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Eric Ke Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wang, E.K., Lin, CW., Wu, TY., Chen, CM., Ye, Y. (2015). Privacy Protection Framework in Social Networked Cars. In: Wang, L., Uesugi, S., Ting, IH., Okuhara, K., Wang, K. (eds) Multidisciplinary Social Networks Research. MISNC 2015. Communications in Computer and Information Science, vol 540. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-48319-0_46

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-48319-0_46

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-48318-3

  • Online ISBN: 978-3-662-48319-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics