ABSTRACT
The Cyber Transport Systems (CTSs) have made significant advancement along with the development of the information technology and transportation industries worldwide. The rapid proliferation of cyber transportation technology provides rich information and infinite possibilities for our society to understand and use the complex inherent mechanism, which governs the novel intelligence world. In addition, applying information technology to cyber transportation applications open a range of new application scenarios, such as vehicular safety, energy efficiency, reduced pollution, and intelligent maintenance services. However, while enjoying the services and convenience provided by CTS, users, vehicles, even the systems might lose privacy during information transmitting and processing. This paper summarizes the state-of-art research findings on information privacy issues in a broad range. We firstly introduce the typical types of information and the basic mechanisms of information communication in CTS. Secondly, considering the information privacy issues of CTS, we present the literature on information privacy issues and privacy protection approaches in CTS. Thirdly, we discuss the emerging challenges and the opportunities for the information technology community in CTS.
- HORIZON 2020. 2015. Smart Cyber-Physical Systems. (2015). https://ec.europa.eu/programmes/horizon2020/en/h2020-section/smart-cyber-physical-systemsGoogle Scholar
- Saurabh Amin, Galina A Schwartz, and Alefiya Hussain. 2013. In quest of benchmarking security risks to cyber-physical systems. IEEE Network, Vol. 27, 1 (2013), 19--24.Google ScholarCross Ref
- Saurabh Amin, Galina A. Schwartz, and S. Shankar Sastry. 2013. Security of interdependent and identical networked control systems. Automatica, Vol. 49, 1 (2013), 186--192. Google ScholarDigital Library
- Bharathan Balaji, Mohammad Abdullah Al Faruque, Nikil Dutt, Rajesh Gupta, and Yuvraj Agarwal. 2015. Models, Abstractions, and Architectures: The Missing Links in Cyber-physical Systems. (2015), 82 pages.Google Scholar
- E. Earl Eiland and Lorie M. Liebrock 2006. An application of information theory to intrusion detection Information Assurance, 2006. IWIA 2006. Fourth IEEE International Workshop on. IEEE, 16--pp. Google ScholarDigital Library
- Laura Feinstein, Dan Schnackenberg, Ravindra Balupari, and Darrell Kindred 2003. Statistical approaches to DDoS attack detection and response DARPA Information Survivability Conference and Exposition, 2003. Proceedings, Vol. Vol. 1. IEEE, 303--314.Google Scholar
- Philippe Golle, Dan Greene, and Jessica Staddon. 2004. Detecting and correcting malicious data in VANETs. Proceedings of the 1st ACM international workshop on Vehicular ad hoc networks. ACM, 29--37. Google ScholarDigital Library
- Jinhua Guo, John P. Baugh, and Shengquan Wang 2007. A group signature based secure and privacy-preserving vehicular communication framework. In 2007 Mobile Networking for Vehicular Environments. IEEE, 103--108.Google Scholar
- Meng Han, Qilong Han, Lijie Li, Ji Li, and Yingshu Li 2017. Maximizing influence in sensed heterogenous social network with privacy preservation. International Journal of Sensor Networks (2017), 1--11.Google Scholar
- Meng Han, Ji Li, Zhipeng Cai, and Qilong Han. 2016. Privacy reserved influence maximization in gps-enabled cyber-physical and online social networks. In 2016 IEEE International Conferences on Social Computing and Networking (SocialCom). IEEE, 284--292.Google ScholarCross Ref
- Meng Han, Mingyuan Yan, Zhipeng Cai, and Yingshu Li. 2016. An exploration of broader influence maximization in timeliness networks with opportunistic selection. Journal of Network and Computer Applications Vol. 63 (2016), 39--49. Google ScholarDigital Library
- Meng Han, Mingyuan Yan, Zhipeng Cai, Yingshu Li, Xingquan Cai, and Jiguo Yu. 2017. Influence maximization by probing partial communities in dynamic online social networks. Transactions on Emerging Telecommunications Technologies, Vol. 28, 4 (2017).Google ScholarCross Ref
- Jean-Pierre Hubaux, Srdjan Capkun, and Jun Luo 2004. The security and privacy of smart vehicles. IEEE Security & Privacy Magazine Vol. 2, LCA-ARTICLE-2004-007 (2004), 49--55. Google ScholarDigital Library
- IBM 2007. IBM builds a smarter planet. (2007). http://www.ibm.com/smarterplanet/us/en/Google Scholar
- Eike Kiltz and Krzysztof Pietrzak 2010. Leakage resilient elgamal encryption. In International Conference on the Theory and Application of Cryptology and Information Security. Springer, 595--612.Google ScholarCross Ref
- Jie Li, Huang Lu, and Mohsen Guizani 2015. ACPN: a novel authentication framework with conditional privacy-preservation and non-repudiation for VANETs. IEEE Transactions on Parallel and Distributed Systems, Vol. 26, 4 (2015), 938--948.Google ScholarDigital Library
- Asare Philip, Broman David, Lee Edward A., Prinsloo Gerro, Torngren Martin, and Sunder S. Shyam. 2012. Cyber-Physical Systems. (2012). http://cyberphysicalsystems.org/Google Scholar
- Maxim Raya and Jean Pierre Hubaux 2005. The Security of Vehicular Ad Hoc Networks. (2005), 11--12. Google ScholarDigital Library
- Maxim Raya and Jean-Pierre Hubaux 2007. Securing vehicular ad hoc networks. Journal of Computer Security Vol. 15, 1 (2007), 39--68. Google ScholarCross Ref
- Daniel B. Work and Alexandre M. Bayen 2008. Impacts of the mobile internet on transportation cyberphysical systems: traffic monitoring using smartphones. (2008), 18--20 pages.Google Scholar
- Q. Wu, J. Domingo-Ferrer, and Gonzalez-Nicolas 2010. Balanced Trustworthiness, Safety, and Privacy in Vehicle-to-Vehicle Communications. IEEE Transactions on Vehicular Technology Vol. 59, 2 (2010), 559--573.Google ScholarCross Ref
- Gang Xiong, Fenghua Zhu, Xiwei Liu, Xisong Dong, Wuling Huang, Songhang Chen, and Kai Zhao 2015. Cyber-physical-social system in intelligent transportation. IEEE/CAA Journal of Automatica Sinica Vol. 2, 3 (2015), 320--333.Google ScholarCross Ref
- Chenxi Zhang, Rongxing Lu, Xiaodong Lin, P-H Ho, and Xuemin Shen 2008. An efficient identity-based batch verification scheme for vehicular sensor networks INFOCOM 2008. The 27th Conference on Computer Communications. 246--250.Google Scholar
- Jun Zhou, Xiaolei Dong, Zhenfu Cao, and Athanasios V. Vasilakos 2015. Secure and Privacy Preserving Protocol for Cloud-Based Vehicular DTNs. IEEE Transactions on Information Forensics and Security, Vol. 10, 6 (2015), 1299--1314.Google ScholarCross Ref
- Yian Zhou, Shigang Chen, You Zhou, Min Chen, and Qingjun Xiao. Privacy-Preserving Multi-Point Traffic Volume Measurement Through Vehicle-to-Infrastructure Communications. IEEE Transactions on Vehicular Technology Vol. 64, 12 (????), 5619--5630.Google Scholar
Index Terms
- Information Privacy of Cyber Transportation System: Opportunities and Challenges
Recommendations
A Study on Developing Framework for Information Privacy Protection
ICEC '15: Proceedings of the 17th International Conference on Electronic Commerce 2015Although Information privacy is one of the biggest issues in the enterprises, privacy incidents are relatively increasing because most companies concern privacy protection as a short term project not like an essential factor which needs to be considered ...
Privacy in the digital age: a review of information privacy research in information systems
Information privacy refers to the desire of individuals to control or have some influence over data about themselves. Advances in information technology have raised concerns about information privacy and its impacts, and have motivated Information ...
State of the information privacy literature: where are we now and where should we go?
While information privacy has been studied in multiple disciplines over the years, the advent of the information age has both elevated the importance of privacy in theory and practice, and increased the relevance of information privacy literature for ...
Comments