skip to main content
10.1145/3125649.3125652acmconferencesArticle/Chapter ViewAbstractPublication PagesiteConference Proceedingsconference-collections
research-article

Information Privacy of Cyber Transportation System: Opportunities and Challenges

Authors Info & Claims
Published:04 October 2017Publication History

ABSTRACT

The Cyber Transport Systems (CTSs) have made significant advancement along with the development of the information technology and transportation industries worldwide. The rapid proliferation of cyber transportation technology provides rich information and infinite possibilities for our society to understand and use the complex inherent mechanism, which governs the novel intelligence world. In addition, applying information technology to cyber transportation applications open a range of new application scenarios, such as vehicular safety, energy efficiency, reduced pollution, and intelligent maintenance services. However, while enjoying the services and convenience provided by CTS, users, vehicles, even the systems might lose privacy during information transmitting and processing. This paper summarizes the state-of-art research findings on information privacy issues in a broad range. We firstly introduce the typical types of information and the basic mechanisms of information communication in CTS. Secondly, considering the information privacy issues of CTS, we present the literature on information privacy issues and privacy protection approaches in CTS. Thirdly, we discuss the emerging challenges and the opportunities for the information technology community in CTS.

References

  1. HORIZON 2020. 2015. Smart Cyber-Physical Systems. (2015). https://ec.europa.eu/programmes/horizon2020/en/h2020-section/smart-cyber-physical-systemsGoogle ScholarGoogle Scholar
  2. Saurabh Amin, Galina A Schwartz, and Alefiya Hussain. 2013. In quest of benchmarking security risks to cyber-physical systems. IEEE Network, Vol. 27, 1 (2013), 19--24.Google ScholarGoogle ScholarCross RefCross Ref
  3. Saurabh Amin, Galina A. Schwartz, and S. Shankar Sastry. 2013. Security of interdependent and identical networked control systems. Automatica, Vol. 49, 1 (2013), 186--192. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Bharathan Balaji, Mohammad Abdullah Al Faruque, Nikil Dutt, Rajesh Gupta, and Yuvraj Agarwal. 2015. Models, Abstractions, and Architectures: The Missing Links in Cyber-physical Systems. (2015), 82 pages.Google ScholarGoogle Scholar
  5. E. Earl Eiland and Lorie M. Liebrock 2006. An application of information theory to intrusion detection Information Assurance, 2006. IWIA 2006. Fourth IEEE International Workshop on. IEEE, 16--pp. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Laura Feinstein, Dan Schnackenberg, Ravindra Balupari, and Darrell Kindred 2003. Statistical approaches to DDoS attack detection and response DARPA Information Survivability Conference and Exposition, 2003. Proceedings, Vol. Vol. 1. IEEE, 303--314.Google ScholarGoogle Scholar
  7. Philippe Golle, Dan Greene, and Jessica Staddon. 2004. Detecting and correcting malicious data in VANETs. Proceedings of the 1st ACM international workshop on Vehicular ad hoc networks. ACM, 29--37. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Jinhua Guo, John P. Baugh, and Shengquan Wang 2007. A group signature based secure and privacy-preserving vehicular communication framework. In 2007 Mobile Networking for Vehicular Environments. IEEE, 103--108.Google ScholarGoogle Scholar
  9. Meng Han, Qilong Han, Lijie Li, Ji Li, and Yingshu Li 2017. Maximizing influence in sensed heterogenous social network with privacy preservation. International Journal of Sensor Networks (2017), 1--11.Google ScholarGoogle Scholar
  10. Meng Han, Ji Li, Zhipeng Cai, and Qilong Han. 2016. Privacy reserved influence maximization in gps-enabled cyber-physical and online social networks. In 2016 IEEE International Conferences on Social Computing and Networking (SocialCom). IEEE, 284--292.Google ScholarGoogle ScholarCross RefCross Ref
  11. Meng Han, Mingyuan Yan, Zhipeng Cai, and Yingshu Li. 2016. An exploration of broader influence maximization in timeliness networks with opportunistic selection. Journal of Network and Computer Applications Vol. 63 (2016), 39--49. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Meng Han, Mingyuan Yan, Zhipeng Cai, Yingshu Li, Xingquan Cai, and Jiguo Yu. 2017. Influence maximization by probing partial communities in dynamic online social networks. Transactions on Emerging Telecommunications Technologies, Vol. 28, 4 (2017).Google ScholarGoogle ScholarCross RefCross Ref
  13. Jean-Pierre Hubaux, Srdjan Capkun, and Jun Luo 2004. The security and privacy of smart vehicles. IEEE Security & Privacy Magazine Vol. 2, LCA-ARTICLE-2004-007 (2004), 49--55. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. IBM 2007. IBM builds a smarter planet. (2007). http://www.ibm.com/smarterplanet/us/en/Google ScholarGoogle Scholar
  15. Eike Kiltz and Krzysztof Pietrzak 2010. Leakage resilient elgamal encryption. In International Conference on the Theory and Application of Cryptology and Information Security. Springer, 595--612.Google ScholarGoogle ScholarCross RefCross Ref
  16. Jie Li, Huang Lu, and Mohsen Guizani 2015. ACPN: a novel authentication framework with conditional privacy-preservation and non-repudiation for VANETs. IEEE Transactions on Parallel and Distributed Systems, Vol. 26, 4 (2015), 938--948.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Asare Philip, Broman David, Lee Edward A., Prinsloo Gerro, Torngren Martin, and Sunder S. Shyam. 2012. Cyber-Physical Systems. (2012). http://cyberphysicalsystems.org/Google ScholarGoogle Scholar
  18. Maxim Raya and Jean Pierre Hubaux 2005. The Security of Vehicular Ad Hoc Networks. (2005), 11--12. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Maxim Raya and Jean-Pierre Hubaux 2007. Securing vehicular ad hoc networks. Journal of Computer Security Vol. 15, 1 (2007), 39--68. Google ScholarGoogle ScholarCross RefCross Ref
  20. Daniel B. Work and Alexandre M. Bayen 2008. Impacts of the mobile internet on transportation cyberphysical systems: traffic monitoring using smartphones. (2008), 18--20 pages.Google ScholarGoogle Scholar
  21. Q. Wu, J. Domingo-Ferrer, and Gonzalez-Nicolas 2010. Balanced Trustworthiness, Safety, and Privacy in Vehicle-to-Vehicle Communications. IEEE Transactions on Vehicular Technology Vol. 59, 2 (2010), 559--573.Google ScholarGoogle ScholarCross RefCross Ref
  22. Gang Xiong, Fenghua Zhu, Xiwei Liu, Xisong Dong, Wuling Huang, Songhang Chen, and Kai Zhao 2015. Cyber-physical-social system in intelligent transportation. IEEE/CAA Journal of Automatica Sinica Vol. 2, 3 (2015), 320--333.Google ScholarGoogle ScholarCross RefCross Ref
  23. Chenxi Zhang, Rongxing Lu, Xiaodong Lin, P-H Ho, and Xuemin Shen 2008. An efficient identity-based batch verification scheme for vehicular sensor networks INFOCOM 2008. The 27th Conference on Computer Communications. 246--250.Google ScholarGoogle Scholar
  24. Jun Zhou, Xiaolei Dong, Zhenfu Cao, and Athanasios V. Vasilakos 2015. Secure and Privacy Preserving Protocol for Cloud-Based Vehicular DTNs. IEEE Transactions on Information Forensics and Security, Vol. 10, 6 (2015), 1299--1314.Google ScholarGoogle ScholarCross RefCross Ref
  25. Yian Zhou, Shigang Chen, You Zhou, Min Chen, and Qingjun Xiao. Privacy-Preserving Multi-Point Traffic Volume Measurement Through Vehicle-to-Infrastructure Communications. IEEE Transactions on Vehicular Technology Vol. 64, 12 (????), 5619--5630.Google ScholarGoogle Scholar

Index Terms

  1. Information Privacy of Cyber Transportation System: Opportunities and Challenges

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          RIIT '17: Proceedings of the 6th Annual Conference on Research in Information Technology
          October 2017
          48 pages
          ISBN:9781450351201
          DOI:10.1145/3125649

          Copyright © 2017 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 4 October 2017

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          RIIT '17 Paper Acceptance Rate6of11submissions,55%Overall Acceptance Rate51of116submissions,44%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader