[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

Characterizing and Optimizing Differentially-Private Techniques for High-Utility, Privacy-Preserving Internet-of-Vehicles

  • Conference paper
  • First Online:
HCI in Mobility, Transport, and Automotive Systems (HCII 2023)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 14048))

Included in the following conference series:

  • 1012 Accesses

Abstract

Recent developments of advanced Human-Vehicle Interactions rely on Internet-of-Vehicles (IoV), to achieve large-scale communications and synchronizations of data in practice. IoV is highly similar to a distributed system, where each vehicle is considered as a node and all nodes are grouped with a centralized server. In this manner, concerns of data privacy are rising, since privacy leak possibly occurs when all vehicles collect, process and share personal statistics (e.g. driver’s heart rate, skin conductance and etc.). Therefore, it’s important to understand how to efficiently apply modern privacy-preserving techniques on IoV. In this work, we first present a comprehensive study to characterize modern privacy-preserving techniques for IoV, and then propose a Differential Privacy(DP) privacy-protection framework specialized for unique characteristics of IoV. Our characterization focuses on DP, a representative set of mathematically-guaranteed mechanisms for both privacy-preserving processing and sharing of sensitive data. It demystifies the tradeoffs of deploying DP techniques, in terms of service quality and privacy-preserving effects. The lessons learned from characterization reveal the importance of data utility in DP-protected IoV and motivate us to examine new opportunities. To better balance tradeoffs and improve service quality, we introduce HUT, for high-utility, batched queries under DP-protection on IoV. We quantitatively examine the benefits of HUT, and experimentally show that, in an IoV context, HUT can reduce information loss by 95.69% while enabling strong mathematically-guaranteed protection over sensitive data. Based on our characterization and optimizations, we identify key challenges and opportunities for future studies, to enable privacy-preserving IoV with low service quality degradation.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 55.99
Price includes VAT (United Kingdom)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 69.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    11 dimensions include Facial Video, Vehicle Speed, Vehicle Acceleration, Vehicle Coordinate, Distance of Vehicle Ahead, Steering Wheel Coordinates, Throttle Status, Brake Status, Heart Rate, Skin Conductance, and Eye Tracking.

References

  1. Abernethy, J.D., Jung, Y.H., Lee, C., McMillan, A., Tewari, A.: Online learning via the differential privacy lens. In: Wallach, H., Larochelle, H., Beygelzimer, A., d’ Alché-Buc, F., Fox, E., Garnett, R. (eds.) Advances in Neural Information Processing Systems. vol. 32. Curran Associates, Inc. (2019). https://proceedings.neurips.cc//paper/2019/file/c36b1132ac829ece87dda55d77ac06a4-Paper.pdf

  2. Aman, M.N., Javaid, U., Sikdar, B.: A privacy-preserving and scalable authentication protocol for the internet of vehicles. IEEE Internet Things J. 8(2), 1123–1139 (2021). https://doi.org/10.1109/JIOT.2020.3010893. https://doi.org/10.1109/JIOT.2020.3010893

  3. Barak, B., Chaudhuri, K., Dwork, C., Kale, S., McSherry, F., Talwar, K.: Privacy, accuracy, and consistency too: A holistic solution to contingency table release. In: Proceedings of the Twenty-Sixth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, pp. 273–282. PODS 2007, Association for Computing Machinery, New York, NY, USA (2007). https://doi.org/10.1145/1265530.1265569

  4. Bi, Z., Ming, X., Liu, J., Peng, X., Jin, W.: FIGCONs: exploiting FIne-Grained CONstructs of Facial Expressions for Efficient and Accurate Estimation of In-Vehicle Drivers’ Statistics. In: International Conference on Human-Computer Interaction (2023)

    Google Scholar 

  5. Chen, L.W., Chang, C.C.: Cooperative traffic control with green wave coordination for multiple intersections based on the internet of vehicles. IEEE Trans. Syst. Man Cybern. Syst. 47(7), 1321–1335 (2017). https://doi.org/10.1109/TSMC.2016.2586500

    Article  Google Scholar 

  6. Chou, E., Beal, J., Levy, D., Yeung, S., Haque, A., Fei-Fei, L.: Faster cryptonets: leveraging sparsity for real-world encrypted inference. CoRR abs/1811.09953 (2018). https://arxiv.org/abs/1811.09953

  7. Dandala, T.T., Krishnamurthy, V., Alwan, R.: Internet of vehicles (iov) for traffic management. In: 2017 International Conference on Computer, Communication and Signal Processing (ICCCSP), pp. 1–4 (2017). https://doi.org/10.1109/ICCCSP.2017.7944096

  8. Ding, B., Winslett, M., Han, J., Li, Z.: Differentially private data cubes: optimizing noise sources and consistency. In: Proceedings of the 2011 ACM SIGMOD International Conference on Management of Data, pp. 217–228 (2011)

    Google Scholar 

  9. Duan, Y., Liu, J., Jin, W., Peng, X.: Characterizing differentially-private techniques in the era of internet-of-vehicles. Technical Report-Feb-03 at User-Centric Computing Group, University of Nottingham Ningbo China (2022)

    Google Scholar 

  10. Gabay, D., Akkaya, K., Cebe, M.: Privacy-preserving authentication scheme for connected electric vehicles using blockchain and zero knowledge proofs. IEEE Trans. Veh. Technol. 69(6), 5760–5772 (2020). https://doi.org/10.1109/TVT.2020.2977361

  11. Ghazi, B., Golowich, N., Kumar, R., Manurangsi, P., Zhang, C.: Deep learning with label differential privacy. In: Ranzato, M., Beygelzimer, A., Dauphin, Y., Liang, P., Vaughan, J.W. (eds.) Advances in Neural Information Processing Systems. vol. 34, pp. 27131–27145. Curran Associates, Inc. (2021). https://proceedings.neurips.cc//paper/2021/file/e3a54649aeec04cf1c13907bc6c5c8aa-Paper.pdf

  12. Gilad-Bachrach, R., Dowlin, N., Laine, K., Lauter, K.E., Naehrig, M., Wernsing, J.: Cryptonets: Applying neural networks to encrypted data with high throughput and accuracy. In: Balcan, M., Weinberger, K.Q. (eds.) Proceedings of the 33nd International Conference on Machine Learning, ICML 2016, New York City, NY, USA, 19–24 June 2016. JMLR Workshop and Conference Proceedings, vol. 48, pp. 201–210. JMLR.org (2016). http://proceedings.mlr.press/v48/gilad-bachrach16.html

  13. Hasidim, A., Kaplan, H., Mansour, Y., Matias, Y., Stemmer, U.: Adversarially robust streaming algorithms via differential privacy. In: Larochelle, H., Ranzato, M., Hadsell, R., Balcan, M., Lin, H. (eds.) Advances in Neural Information Processing Systems. vol. 33, pp. 147–158. Curran Associates, Inc. (2020). https://proceedings.neurips.cc//paper/2020/file/0172d289da48c48de8c5ebf3de9f7ee1-Paper.pdf

  14. Hay, M., Rastogi, V., Miklau, G., Suciu, D.: Boosting the accuracy of differentially private histograms through consistency. Proc. VLDB Endow. 3(1–2), 1021–1032 (2010). https://doi.org/10.14778/1920841.1920970

  15. Hua, L., Anisi, H., Por, Y., Alam, M.: Social networking-based cooperation mechanisms in vehicular ad-hoc network- a survey. Vehicular Commun. 10, 57–73 (2017). https://doi.org/10.1016/j.vehcom.2017.11.001

  16. Huang, Z., et al.: Face2multi-modal: In-vehicle multi-modal predictors via facial expressions. In: Adjunct Proceedings of the 12th International Conference on Automotive User Interfaces and Interactive Vehicular Applications, AutomotiveUI 2020, Virtual Event, Washington, DC, USA, 21–22 September 2020, pp. 30–33. ACM (2020)

    Google Scholar 

  17. Jin, W., Duan, Y., Liu, J., Huang, S., Xiong, Z., Peng, X.: BROOK Dataset: a playground for exploiting data-driven techniques in human-vehicle interactive designs. Technical Report-Feb-01 at User-Centric Computing Group, University of Nottingham Ningbo China (2022)

    Google Scholar 

  18. Jin, W., Ming, X., Song, Z., Xiong, Z., Peng, X.: Towards Emulating Internet-of-Vehicles on a Single Machine. In: AutomotiveUI ’21: 13th International Conference on Automotive User Interfaces and Interactive Vehicular Applications, Leeds, United Kingdom, 9–14 September 2021 - Adjunct Proceedings, pp. 112–114. ACM (2021). https://doi.org/10.1145/3473682.3480275

  19. Kazhamiaka, F., Zaharia, M., Bailis, P.: Challenges and opportunities for autonomous vehicle query systems. In: 11th Conference on Innovative Data Systems Research, CIDR 2021, Virtual Event, 11–15 January 2021, Online Proceedings. http://www.cidrdb.org/ (2021). http://cidrdb.org/cidr2021/papers/cidr2021_paper18.pdf

  20. Khatoun, R., Gut, P., Doulami, R., Khoukhi, L., Serhrouchni, A.: A reputation system for detection of black hole attack in vehicular networking. In: 2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC), pp. 1–5 (2015). https://doi.org/10.1109/SSIC.2015.7245328

  21. Kilari, V.T., Yu, R., Misra, S., Xue, G.: Robust revocable anonymous authentication for vehicle to grid communications. IEEE Trans. Intell. Transp. Syst. 21(11), 4845–4857 (2020). https://doi.org/10.1109/TITS.2019.2948803

  22. Li, C., Hay, M., Miklau, G., Wang, Y.: A data- and workload-aware algorithm for range queries under differential privacy. Proc. VLDB Endow. 7(5), 341–352 (2014). https://doi.org/10.14778/2732269.2732271

  23. Liu, J., Duan, Y., Bi, Z., Ming, X., Jin, W., Song, Z., Peng, X.: BROOK Dataset: a playground for exploiting data-driven techniques in human-vehicle interactive designs. In: International Conference on Human-Computer Interaction (2023)

    Google Scholar 

  24. Liu, J., Jin, W., He, Z., Ming, X., Duan, Y., Xiong, Z., Peng, X.: HUT: enabling high-utility, batched queries under differential privacy protection for internet-of-vehicles. Technical Report-Feb-02 at User-Centric Computing Group, University of Nottingham Ningbo China (2022)

    Google Scholar 

  25. Mehrish, A., Subramanyam, A., Kankanhalli, M.: Multimedia signatures for vehicle forensics (2017). https://doi.org/10.1109/ICME.2017.8019488

  26. Ming, X., et al.: Enabling efficient emulation of internet-of-vehicles on a single machine: practices and lessons. In: International Conference on Human-Computer Interaction (2023)

    Google Scholar 

  27. Panichpapiboon, S., Pattara-atikom, W.: A review of information dissemination protocols for vehicular ad hoc networks. Commun. Surv. Tutor. IEEE 14, 1–15 (2012). https://doi.org/10.1109/SURV.2011.070711.00131

  28. Patro, S.G.K., Sahu, K.K.: Normalization: a preprocessing stage (2015)

    Google Scholar 

  29. Peng, X., Huang, Z., Sun, X.: Building BROOK: a multi-modal and facial video database for human-vehicle interaction research, pp. 1–9 (2020). https://arxiv.org/abs/2005.08637

  30. Song, Z., Duan, Y., Jin, W., Huang, S., Wang, S., Peng, X.: Omniverse-OpenDS: enabling agile developments for complex driving scenarios via reconfigurable abstractions. In: International Conference on Human-Computer Interaction (2022)

    Google Scholar 

  31. Song, Z., Wang, S., Kong, W., Peng, X., Sun, X.: First attempt to build realistic driving scenes using video-to-video synthesis in OpenDS framework. In: Adjunct Proceedings of the 11th International Conference on Automotive User Interfaces and Interactive Vehicular Applications, AutomotiveUI 2019, Utrecht, The Netherlands, 21–25 September 2019, pp. 387–391. ACM (2019). https://doi.org/10.1145/3349263.3351497

  32. Soria-Comas, J., Domingo-Ferrer, J., Sánchez, D., Martínez, S.: Enhancing data utility in differential privacy via microaggregation-based $$k$$ k -anonymity. VLDB J. 23(5), 771–794 (2014). https://doi.org/10.1007/s00778-014-0351-4

  33. Sun, X., et al.: Exploring personalised autonomous vehicles to influence user trust. Cogn. Comput. 12(6), 1170–1186 (2020). https://doi.org/10.1007/s12559-020-09757-x

    Article  Google Scholar 

  34. Tai, B., Li, S., Huang, Y.: K-aggregation: Improving accuracy for differential privacy synthetic dataset by utilizing k-anonymity algorithm. In: Barolli, L., Takizawa, M., Enokido, T., Hsu, H., Lin, C. (eds.) 31st IEEE International Conference on Advanced Information Networking and Applications, AINA 2017, Taipei, Taiwan, 27–29 March 2017, pp. 772–779. IEEE Computer Society (2017). https://doi.org/10.1109/AINA.2017.97

  35. Wang, J., Xiong, Z., Duan, Y., Liu, J., Song, Z., Peng, X.: The importance distribution of drivers’ facial expressions varies over time! In: 13th International Conference on Automotive User Interfaces and Interactive Vehicular Applications, pp. 148–151 (2021)

    Google Scholar 

  36. Wang, S., et al.: Oneiros-OpenDS: an interactive and extensible toolkit for agile and automated developments of complicated driving scenes. In: International Conference on Human-Computer Interaction (2022)

    Google Scholar 

  37. Xiao, X., Wang, G., Gehrke, J.: Differential privacy via wavelet transforms. IEEE Trans. Knowl. Data Eng. 23(8), 1200–1214 (2010)

    Article  Google Scholar 

  38. Xiong, Z., et al.: Face2Statistics: user-friendly, low-cost and effective alternative to in-vehicle sensors/monitors for drivers. In: Kromker, H. (eds) HCI in Mobility, Transport, and Automotive Systems. HCII 2022. Lecture Notes in Computer Science, vol. 13335, pp. 289–308. Springer, Cham (2022). https://doi.org/10.1007/978-3-031-04987-3_20

  39. Zhang, Yu., Jin, W., Xiong, Z., Li, Z., Liu, Y., Peng, X.: Demystifying interactions between driving behaviors and styles through self-clustering algorithms. In: Krömker, H. (ed.) HCII 2021. LNCS, vol. 12791, pp. 335–350. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-78358-7_23

    Chapter  Google Scholar 

  40. Zhao, P., Zhang, G., Wan, S., Liu, G., Umer, T.: A survey of local differential privacy for securing internet of vehicles. J. Supercomput. 76, 8391–8412 (2020). https://doi.org/10.1007/s11227-019-03104-0

  41. Zhao, Z.Q., Zheng, P., Xu, S.T., Wu, X.: Object detection with deep learning: a review. IEEE Trans. Neural Netw. Learn. Syst. 30(11), 3212–3232 (2019). https://doi.org/10.1109/TNNLS.2018.2876865

    Article  Google Scholar 

Download references

Acknowledgements

We thank the anonymous reviewers from AutomotiveUI 2022 and HCI 2023 for their valuable feedback. We thank all members from User-Centric Computing Group for their valuable feedback and discussions. Earlier versions of this work was released at [9, 24].

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yicun Duan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Duan, Y., Liu, J., Ming, X., Jin, W., Song, Z., Peng, X. (2023). Characterizing and Optimizing Differentially-Private Techniques for High-Utility, Privacy-Preserving Internet-of-Vehicles. In: Krömker, H. (eds) HCI in Mobility, Transport, and Automotive Systems. HCII 2023. Lecture Notes in Computer Science, vol 14048. Springer, Cham. https://doi.org/10.1007/978-3-031-35678-0_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-35678-0_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-35677-3

  • Online ISBN: 978-3-031-35678-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics