[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3568160.3570234acmconferencesArticle/Chapter ViewAbstractPublication PagescscsConference Proceedingsconference-collections
research-article
Open access

Lightweight Privacy-Preserving Ride-Sharing Protocols for Autonomous Cars

Published: 08 December 2022 Publication History

Abstract

Ride-sharing is a popular way of transportation that reduces traffic and the costs of the trip. Emerge of autonomous vehicles makes ride-sharing more popular because these vehicles do not require a driver’s effort. Therefore, in order to find a suitable ride-share, the service provider is not restricted to the driver’s trip. Thus, the autonomous cars are more flexible with matching the passengers. Passengers who want to participate in car-sharing send their trip data to a ride-sharing service provider. However, the passenger’s trip data contains sensitive information about the passenger’s locations. Multiple studies show that a person’s location data can reveal personal information about them, e.g., their health condition, home, work, hobbies, and financial situation. In this paper, we propose a lightweight privacy-preserving ride-sharing protocol for autonomous cars. Contrary to previous works on this topic, our protocol does not rely on any extra party to guarantee privacy and security. Our protocol consists of two main phases: i) privacy-preserving group forming, and ii) privacy-preserving fair pick-up point selection. In addition to ride-sharing, the two phases of our protocol can also be applied to other use cases. We have implemented our protocol for a realistic ride-sharing scenario, where 1000 passengers simultaneously request a ride-share. Our evaluation results show that the time and communication costs of our protocol are such that it is feasible for real-world applications.

References

[1]
Ulrich Matchi Aïvodji, Sébastien Gambs, Marie-José Huguet, and Marc-Olivier Killijian. 2016. Meeting points in ridesharing: A privacy-preserving approach. Transportation Research Part C: Emerging Technologies 72 (2016), 239–253.
[2]
Saeed Asadi Bagloee, Madjid Tavana, Mohsen Asadi, and Tracey Oliver. 2016. Autonomous vehicles: challenges, opportunities, and future implications for transportation policies. Journal of modern transportation 24, 4 (2016), 284–303.
[3]
Syagnik Banerjee. 2019. Geosurveillance, location privacy, and personalization. Journal of Public Policy & Marketing 38, 4 (2019), 484–499.
[4]
Leila Benarous and Benamar Kadri. 2022. Obfuscation-based location privacy-preserving scheme in cloud-enabled internet of vehicles. Peer-to-Peer Networking and Applications 15, 1 (2022), 461–472.
[5]
Igor Bilogrevic, Murtuza Jadliwala, Vishal Joneja, Kübra Kalkan, Jean-Pierre Hubaux, and Imad Aad. 2014. Privacy-preserving optimal meeting location determination on mobile devices. IEEE transactions on information forensics and security 9, 7(2014), 1141–1156.
[6]
Timo Brecher, Emmanuel Bresson, and Mark Manulis. 2009. Fully robust tree-Diffie-Hellman group key exchange. In International Conference on Cryptology and Network Security. Springer, 478–497.
[7]
Ryan Browne. 2022. Uber investigates cybersecurity incident after reports of a hack on the company. https://www.cnbc.com/2022/09/16/uber-investigates-cybersecurity-incident-after-reports-of-a-hack.html
[8]
Katriel Cohn-Gordon, Cas Cremers, Luke Garratt, Jon Millican, and Kevin Milner. 2018. On ends-to-ends encryption: Asynchronous group messaging with strong security guarantees. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. 1802–1819.
[9]
Joan Daemen and Vincent Rijmen. 2013. The Design of Rijndael AES – The Advanced Encryption Standard. (2013).
[10]
Whitfield Diffie and Martin E Hellman. 2022. New directions in cryptography. In Democratizing Cryptography: The Work of Whitfield Diffie and Martin Hellman. 365–390.
[11]
Fábio Duarte and Carlo Ratti. 2018. The impact of autonomous vehicles on cities: A review. Journal of Urban Technology 25, 4 (2018), 3–18.
[12]
Per Hallgren, Martin Ochoa, and Andrei Sabelfeld. 2015. Innercircle: A parallelizable decentralized privacy-preserving location proximity protocol. In 2015 13th Annual Conference on Privacy, Security and Trust (PST). IEEE, 1–6.
[13]
Lein Harn, Ching-Fang Hsu, and Bohan Li. 2018. Centralized group key establishment protocol without a mutually trusted third party. Mobile Networks and Applications 23, 5 (2018), 1132–1140.
[14]
Lein Harn and Changlu Lin. 2014. Efficient group Diffie–Hellman key agreement protocols. Computers & Electrical Engineering 40, 6 (2014), 1972–1980.
[15]
Carmit Hazay and Yehuda Lindell. 2010. A note on the relation between the definitions of security for semi-honest and malicious adversaries. Cryptology ePrint Archive(2010).
[16]
Yuanyuan He, Jianbing Ni, Xinyu Wang, Ben Niu, Fenghua Li, and Xuemin Shen. 2018. Privacy-preserving partner selection for ride-sharing services. IEEE Transactions on Vehicular Technology 67, 7 (2018), 5994–6005.
[17]
Jianbo Huang, Liang Chang, Long Li, and Xuguang Bao. 2020. An Adaptive Dummy-based Mechanism to Protect Location Privacy in Smart Health Care System. In 2020 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC). IEEE, 92–97.
[18]
Junxin Huang, Yuchuan Luo, Ming Xu, Bowen Hu, and Jian Long. 2022. pShare: Privacy-Preserving Ride-Sharing System with Minimum-Detouring Route. Applied Sciences 12, 2 (2022), 842.
[19]
Fortune Business Insights. 2022. Ride sharing market size, share and covid-19 impact analysis. https://www.fortunebusinessinsights.com/ride-sharing-market-103336
[20]
Kimmo Järvinen, Ágnes Kiss, Thomas Schneider, Oleksandr Tkachenko, and Zheng Yang. 2018. Faster privacy-preserving location proximity schemes. In International Conference on Cryptology and Network Security. Springer, 3–22.
[21]
Tobias Jeske. 2011. Privacy-preserving smart metering without a trusted-third-party. In Proceedings of the International Conference on Security and Cryptography. IEEE, 114–123.
[22]
Ben Kreuter, Tancrède Lepoint, Michele Orrù, and Mariana Raykova. 2020. Anonymous tokens with private metadata bit. In Annual International Cryptology Conference. Springer, 308–336.
[23]
Miltos Kyriakidis, Riender Happee, and Joost CF de Winter. 2015. Public opinion on automated driving: Results of an international questionnaire among 5000 respondents. Transportation research part F: traffic psychology and behaviour 32 (2015), 127–140.
[24]
Donghe Li, Qingyu Yang, Dou An, Wei Yu, Xinyu Yang, and Xinwen Fu. 2018. On location privacy-preserving online double auction for electric vehicles in microgrids. IEEE Internet of Things Journal 6, 4 (2018), 5902–5915.
[25]
Marco Maier, Lorenz Schauer, and Florian Dorfmeister. 2015. Probetags: Privacy-preserving proximity detection using wi-fi management frames. In 2015 IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). IEEE, 756–763.
[26]
Macià Mut-Puigserver, Miquel A Cabot-Nadal, and M Magdalena Payeras-Capellà. 2020. Removing the trusted third party in a confidential multiparty registered eDelivery protocol using blockchain. IEEE Access 8(2020), 106855–106871.
[27]
Mahmoud Nabil, Ahmed Sherif, Mohamed Mahmoud, Ahmad Alsharif, and Mohamed Abdallah. 2019. Efficient and privacy-preserving ridesharing organization for transferable and non-transferable services. IEEE Transactions on Dependable and Secure Computing 18, 3 (2019), 1291–1306.
[28]
Iynkaran Natgunanathan, Abid Mehmood, Yong Xiang, Longxiang Gao, and Shui Yu. 2018. Location privacy protection in smart health care system. IEEE Internet of Things Journal 6, 2 (2018), 3055–3069.
[29]
Pascal Paillier and David Pointcheval. 1999. Efficient public-key cryptosystems provably secure against active adversaries. In International conference on the theory and application of cryptology and information security. Springer, 165–179.
[30]
Benny Pinkas, Thomas Schneider, and Michael Zohner. 2018. Scalable private set intersection based on OT extension. ACM Transactions on Privacy and Security (TOPS) 21, 2 (2018), 1–35.
[31]
Hua Shen, Mingwu Zhang, Hao Wang, Fuchun Guo, and Willy Susilo. 2020. A lightweight privacy-preserving fair meeting location determination scheme. IEEE Internet of Things Journal 7, 4 (2020), 3083–3093.
[32]
Ahmed BT Sherif, Khaled Rabieh, Mohamed MEA Mahmoud, and Xiaohui Liang. 2016. Privacy-preserving ride sharing scheme for autonomous vehicles in big data era. IEEE Internet of Things Journal 4, 2 (2016), 611–618.
[33]
David G Steer, Leo Strawczynski, Whitfield Diffie, and M Wiener. 1988. A secure audio teleconference system. In Conference on the Theory and Application of Cryptography. Springer, 520–528.
[34]
Nalini Subramanian and Andrews Jeyaraj. 2018. Recent security challenges in cloud computing. Computers & Electrical Engineering 71 (2018), 28–42.
[35]
Hongliang Sun, Linfeng Wei, Libo Wang, Juli Yin, and Wenxuan Ma. 2022. A Trusted and Privacy-Preserving Carpooling Matching Scheme in Vehicular Networks. Journal of Information Security 13, 1 (2022), 1–22.
[36]
Iraklis Symeonidis, Dragos Rotaru, Mustafa A Mustafa, Bart Mennink, Bart Preneel, and Panos Papadimitratos. 2021. HERMES: Scalable, Secure, and Privacy-Enhancing Vehicular Sharing-Access System. IEEE Internet of Things Journal 9, 1 (2021), 129–151.
[37]
Uber team. 2022. Security update. https://www.uber.com/newsroom/security-update/
[38]
Hien To, Gabriel Ghinita, and Cyrus Shahabi. 2014. A framework for protecting worker location privacy in spatial crowdsourcing. Proceedings of the VLDB Endowment 7, 10 (2014), 919–930.
[39]
James M Turner. 2008. The keyed-hash message authentication code (hmac). Federal Information Processing Standards Publication 198, 1(2008), 1–13.
[40]
René Van Bevern, Robert Bredereck, Laurent Bulteau, Jiehua Chen, Vincent Froese, Rolf Niedermeier, and Gerhard J Woeginger. 2017. Partitioning perfect graphs into stars. Journal of Graph Theory 85, 2 (2017), 297–335.
[41]
Debby Wallner, Eric Harder, and Ryan Agee. 1999. Key management for multicast: Issues and architectures. Technical Report.
[42]
Xiaofen Wang, Yi Mu, and Rongmao Chen. 2016. One-round privacy-preserving meeting location determination for smartphone applications. IEEE Transactions on Information Forensics and Security 11, 8(2016), 1712–1721.
[43]
Chung Kei Wong, Mohamed Gouda, and Simon S Lam. 2000. Secure group communications using key graphs. IEEE/ACM transactions on networking 8, 1 (2000), 16–30.
[44]
Xi Xiao, Chunhui Chen, Arun Kumar Sangaiah, Guangwu Hu, Runguo Ye, and Yong Jiang. 2018. CenLocShare: A centralized privacy-preserving location-sharing system for mobile online social networks. Future Generation Computer Systems 86 (2018), 863–872.
[45]
Haining Yu, Hongli Zhang, Xiangzhan Yu, Xiaojiang Du, and Mohsen Guizani. 2020. PGRide: Privacy-preserving group ridesharing matching in online ride hailing services. IEEE Internet of Things Journal 8, 7 (2020), 5722–5735.
[46]
Yao Zheng, Ming Li, Wenjing Lou, and Y Thomas Hou. 2015. Location based handshake and private proximity test with location tags. IEEE Transactions on Dependable and Secure Computing 14, 4 (2015), 406–419.
[47]
Xiaoyan Zhu, Haotian Chi, Ben Niu, Weidong Zhang, Zan Li, and Hui Li. 2013. Mobicache: When k-anonymity meets cache. In 2013 IEEE Global Communications Conference (GLOBECOM). IEEE, 820–825.

Cited By

View all
  • (2024)Computation Efficient Structure-Aware PSI from Incremental Function Secret SharingAdvances in Cryptology – CRYPTO 202410.1007/978-3-031-68397-8_10(309-345)Online publication date: 16-Aug-2024
  • (2023)A Systematic Approach for Automotive Privacy ManagementProceedings of the 7th ACM Computer Science in Cars Symposium10.1145/3631204.3631863(1-12)Online publication date: 5-Dec-2023
  • (2023)Practical Privacy-Preserving Ride Sharing Protocol with Symmetric Key2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)10.1109/TrustCom60117.2023.00234(1718-1727)Online publication date: 1-Nov-2023

Index Terms

  1. Lightweight Privacy-Preserving Ride-Sharing Protocols for Autonomous Cars

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CSCS '22: Proceedings of the 6th ACM Computer Science in Cars Symposium
    December 2022
    127 pages
    ISBN:9781450397865
    DOI:10.1145/3568160
    This work is licensed under a Creative Commons Attribution International 4.0 License.

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 08 December 2022

    Check for updates

    Author Tags

    1. Autonomous Cars
    2. Lightweight Cryptography.
    3. Location Privacy
    4. Privacy-Enhancing Technologies
    5. Private Set Intersection
    6. Ride-Sharing

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    CSCS '22
    CSCS '22: Computer Science in Cars Symposium
    December 8, 2022
    Ingolstadt, Germany

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)308
    • Downloads (Last 6 weeks)26
    Reflects downloads up to 19 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Computation Efficient Structure-Aware PSI from Incremental Function Secret SharingAdvances in Cryptology – CRYPTO 202410.1007/978-3-031-68397-8_10(309-345)Online publication date: 16-Aug-2024
    • (2023)A Systematic Approach for Automotive Privacy ManagementProceedings of the 7th ACM Computer Science in Cars Symposium10.1145/3631204.3631863(1-12)Online publication date: 5-Dec-2023
    • (2023)Practical Privacy-Preserving Ride Sharing Protocol with Symmetric Key2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)10.1109/TrustCom60117.2023.00234(1718-1727)Online publication date: 1-Nov-2023

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format.

    HTML Format

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media