Skip to main content
Log in

A survey of local differential privacy for securing internet of vehicles

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

Internet of connected vehicles (IoV) are expected to enable intelligent traffic management, intelligent dynamic information services, intelligent vehicle control, etc. However, vehicles’ data privacy is argued to be a major barrier toward the application and development of IoV, thus causing a wide range of attentions. Local differential privacy (LDP) is the relaxed version of the privacy standard, differential privacy, and it can protect users’ data privacy against the untrusted third party in the worst adversarial setting. Therefore, LDP is potential to protect vehicles’ data privacy in the practical scenario, IoV, although vehicles exhibit unique features, e.g., high mobility, short connection times, etc. To this end, in this paper, we first give an overview of the existing LDP techniques and present the thorough comparisons of these work in terms of advantages, disadvantages, and computation cost, in order to get the readers well acquainted with LDP. Thereafter, we investigate the potential applications of LDP in securing IoV in detail. Last, we direct several future research directions of LDP in IoV, to bridge the gaps between LDP researches and the privacy preservation in IoV. The originality of this survey is that it is the first work to summarize and compare the existing LDP research work and that it also does an pioneering work toward the in-depth analysis of the potential applications of LDP in privacy preservation in IoV.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. 5.2 million vehicles will be on world’s roads. Available at 5.2 Million Electric Vehicles Will Be On World’s Roads By 2017. https://www.sogou.com/link?url=DSOYnZeCC_obPuaw6mFPWe4YBIs76YGqSEjsBEpORElYSw3r_2XEntVyzmvXbimxEqJPGVypItYeQ5gq3b3_vyra29P1rkT7iRI32N2X1uAxCie5vXk7hv0KmOA4bUvlT_PAMheO8n5Sj3w-WsG0SA. Accessed 6 Dec 2019

  2. Corrigan-Gibbs H, Boneh D (2017) Prio: private, robust, and scalable computation of aggregate statistics. In: Proceeding of NSDI

  3. The number of cars worldwide is set to double by 2040. https://www.weforum.org/agenda/2016/04/the-number-of-cars-worldwide-is-set-to-double-by-2040. Accessed 6 Dec 2019

  4. Zhao P, Li J, Zeng F, Xiao F, Wang C, Jiang H, Jiang H (2018) ILLIA: enabling k-anonymity-based privacy preserving against location injection attacks in continuous LBS queries. IEEE Internet Things J 99:1–10

    Google Scholar 

  5. Jiang H, Zhao P, Wang C (2018) RobLoP: towards robust privacy preserving against location dependent attacks in continuous LBS queries. IEEE/ACM Trans Netw 26(2):1018–1032

    Google Scholar 

  6. DEF CON 23: Digital certificates key to mobile security, says researcher. https://www.computerweekly.com/news/4500251370/Def-Con-23-Digital-certificates-key-tomobile-security-says-researcher. Accessed 6 Dec 2019

  7. Privacy leaks in IOV. http://www.afzhan.com/news/detail/74983.html. Accessed 6 Dec 2019

  8. Zhang Y, Chen Q, Zhong S (2017) Efficient and privacy-preserving min and k th min computations in mobile sensing systems. IEEE Trans Dependable Secure Comput 14(1):9–21

    Google Scholar 

  9. Ben-Sasson E, Chiesa A, Genkin D (2013) SNARKs for c: verifying program executions succinctly and in zero knowledge. In: Advances in Cryptology-CRYPTO, pp 90–108

  10. Home page of EU GDPR. http://www.eugdpr.org/. Accessed 6 Dec 2019

  11. Araki T, Furukawa J, Lindell Y, Nof A, Ohara K (2016) High-throughput semi-honest secure three-party computation with an honest majority. In: Proceedin of ACM SIGSAC Conference on Computer and Communications Security

  12. Bonawitz K, Ivanov V, Kreuter B, Marcedone A, McMahan HB, Patel S, Ramage D, Segal A, Seth K (2017) Practical secure aggregation for privacy-preserving machine learning. In: Proceeding of ACM SIGSAC Conference on Computer and Communications Security

  13. Nguyen T, Xiao T, Yang X, Hui Y, Shin SC, Shin H (2016) Collecting and analyzing data from smart device users with local differential privacy. arXiv preprint arXiv:1606.05053

  14. Qin Z, Yu T, Yang Y, Khalil I, Xiao X, Ren K (2017) Generating synthetic decentralized social graphs with local differential privacy. In: Proceeding of ACM SIGSAC Conference on Computer and Communications Security, pp 425–438

  15. This is what Apple’s differential privacy means for ios 10. https://www.theverge.com/2016/6/17/11957782/apple-differential-privacy-ios-10-wwdc-2016. Accessed 6 Dec 2019

  16. How Google tricks itself to protect Chrome user privacy. https://www.cnet.com/au/news/how-google-tricks-itself-to-protect-chrome-user-privacy/. Accessed 6 Dec 2019

  17. Erlingsson, ulfar, Pihur V, Korolova A (2014) Rappor: randomized aggregatable privacy-preserving ordinal response. In: Proceeding of ACM SIGSAC conference on computer and communications security, pp 10–23

  18. Bassily R, Smith A (2015) Local, private, efficient protocols for succinct histograms. In: Proceeding of ACM symposium on Theory of computing, pp 10–19

  19. Qin Z, Yang Y, Yu T, Khalil I, Xiao X, Ren K (2016) Heavy hitter estimation over set-valued data with local differential privacy. In: Proceeding of ACM SIGSAC Conference on Computer and Communications Security, pp 192–203

  20. Smith A (2011) Privacy-preserving statistical estimation with optimal convergence rates. In: Proceeding of ACM Symposium on Theory of Computing

  21. Samet S (2015) Privacy-preserving logistic regression. J Adv Inf Technol 6(3):1–8

    Google Scholar 

  22. Shokri R, Shmatikov V (2015) Privacy-preserving deep learning. In: Proceeding of ACM SIGSAC Conference on Computer and Communications Security

  23. LeCun Y, Bengio Y, Hinton G (2015) Deep learning. Nature 521(7553):436–444

    Google Scholar 

  24. Li C, Hay M, Rastogi V, Miklau G, McGregor A (2010) Optimizing linear counting queries under differential privacy. In: Proceeding of ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, pp 123–134

  25. Yuan G, Zhang Z, Winslett M, Xiao X, Yang Y, Hao Z (2012) Low-rank mechanism: optimizing batch queries under differential privacy. In: Proceeding of VLDB Endowment, pp 1352–1363

  26. Li C, Miklau G (2011) Efficient batch query answering under differential privacy. arXiv preprint arXiv:1103.1367

  27. Wan S, Li X, Xue Y, Lin W, Xu X (2019) Efficient computation offloading for internet of vehicles in edge computing-assisted 5G networks. J Supercomput. https://doi.org/10.1007/s11227-019-03011-4

    Article  Google Scholar 

  28. Xu X, Gu R, Dai F, Qi L, Wan S (2019) Multi-objective computation offloading for internet of vehicles in cloud-edge computing. Wirel Netw. https://doi.org/10.1007/s11276-019-02127-y

    Article  Google Scholar 

  29. McSherry Frank, Mironov I (2009) Differentially private recommender systems: Building privacy into the netflix prize contenders. In: Proceeding of ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp 1–9

  30. Machanavajjhala Ashwin A, Korolova, Sarma AD (2011) Personalized social recommendations: accurate or private. In: Proceeding of the VLDB Endowment, pp 440–450

  31. Frank M, Mahajan R (2011) Differentially-private network trace analysis. ACM SIGCOMM Comput Commun Rev 41(4):123–134

    Google Scholar 

  32. Wan S, Zhao Y, Wang T, Gu Z, Abbasi QH, Choo K-KR (2019) Multi-dimensional data indexing and range query processing via voronoi diagram for internet of things. Future Gener Comput Syst 91:382–391

    Google Scholar 

  33. Xu X, Xue Y, Qi L, Yuan Y, Zhang X, Umer T, Wan S (2019) An edge computing-enabled computation offloading method with privacy preservation for internet of connected vehicles. Future Gener Comput Syst 96:89–100

    Google Scholar 

  34. Purohit S, Smith W, Chappell A, West P, Lee B, Stephan E, Fox P (2016) Effective tooling for linked data publishing in scientific research. In: Proceeding of IEEE Tenth International Conference on Semantic Computing, pp 24–31

  35. Ye Q, Meng X, Zhu M, Huo Z (2018) Survey on differential privacy. Ruan Jian Xue Bao/Journal of Software, no. 7

  36. Xu X, He C, Xu Z et al (2019) Joint optimization of offloading utility and privacy for edge computing enabled IoT. IEEE Internet Things J. https://doi.org/10.1109/JIOT.2019.2944007

    Article  Google Scholar 

  37. Gao Z, Xuan H-Z, Zhang H, Wan S, Choo K-KR (2019) Adaptive fusion and category-level dictionary learning model for multi-view human action recognition. IEEE Internet Things J. https://doi.org/10.1109/JIOT.2019.2911669

    Article  Google Scholar 

  38. Niari AK, Berangi R, Fathy M (2018) ECCN: an extended CCN architecture to improve data access in vehicular content-centric network. J Supercomput 74(1):205–221

    Google Scholar 

  39. NT, Xiao T, Yang X, Hui Y, Shin SC, SJ (2016) Collecting and analyzing data from smart device users with local differential privacy. arXiv preprint arXiv:1606.05053

  40. Ren X, Yu CM, Yu W, Yang S, Yang X, Mccann JA, Yu PS (2018) LoPub: High-dimensional crowdsourced data publication with local differential privacy. IEEE Trans Inf Forensics Secur 13(9):2151–2166

    Google Scholar 

  41. Ren X, Yu C, Yu W, Yang S, Yang X, McCann J (2016) High-dimensional crowdsourced data distribution estimation with local privacy. In: Proceeding of IEEE International Conference on Computer and Information Technology (CIT), pp 226–233

  42. Chen C, Liu L, Qiu T, Yang K, Gong F, Song H (2018) ASGR: an artificial spider-web-based geographic routing in heterogeneous vehicular networks. IEEE Trans Intell Trans Syst 20(5):1604–1620

    Google Scholar 

  43. Chen C, Liu L, Qiu T, Ren Z, Hu J, Ti F (2018) Driver’s intention identification and risk evaluation at intersections in the internet of vehicles. IEEE Internet Things J 5(3):1575–1587

    Google Scholar 

  44. Wan S, Gu Z, Ni Q (2019) Cognitive computing and wireless communications on the edge for healthcare service robots. Comput Commun 149:99–106

    Google Scholar 

  45. Zhang R, Xie P, Wang C, Liu G, Wan S (2019) Classifying transportation mode and speed from trajectory data via deep multi-scale learning. Comput Netw 162:106861

    Google Scholar 

  46. Park JJ (2018) Fusion algorithms and high-performance applications for vehicular cloud computing. J Supercomput 74(3):995–1000

    Google Scholar 

  47. Ye M, Barg A (2018) Optimal schemes for discrete distribution estimation under locally differential privacy. IEEE Trans Inf Theory 64(8):5662–5676

    MathSciNet  MATH  Google Scholar 

  48. Fanti G, Pihur V, Erlingsson l (2016) Building a rappor with the unknown: privacy-preserving learning of associations and data dictionaries. Proc Priv Enhanc Technol 3:41–61

    Google Scholar 

  49. Liu J, Wang W, Li D, Wan S, Liu H (2019) Role of gifts in decision making: an endowment effect incentive mechanism for offloading in the IoV. IEEE Internet Things J 6(4):6933–6951

    Google Scholar 

  50. MIJ, Duchi, John C, Wainwright MJ (2013) Local privacy, data processing inequalities, and statistical minimax rates. arXiv preprint arXiv:1302.3203

  51. Duchi JC, Jordan MI, Wainwright MJ (2014) Privacy aware learning. J ACM 61(6):1–57

    MathSciNet  MATH  Google Scholar 

  52. Ye M, Barg A (2018) Optimal schemes for discrete distribution estimation under locally differential privacy. IEEE Trans Inf Theory 64:5662–5676

    MathSciNet  MATH  Google Scholar 

  53. Kairouz P, Oh S, Viswanath P (2014) Extremal mechanisms for local differential privacy. Adv Neural Inf Process Syst 4:2879–2887

    MATH  Google Scholar 

  54. Balouchzahi N-M, Fathy M, Akbari A (2016) An efficient infrastructure based service discovery in vehicular networks using P2P structures. J Supercomput 72(3):1013–1034

    Google Scholar 

  55. Wang Q, Zhang Y, Lu X, Wang Z, Qin Z, Ren K (2018) Real-time and spatio-temporal crowd-sourced social network data publishing with differential privacy. IEEE Trans Dependable Secure Comput 15(4):591–606

    Google Scholar 

  56. Jagielski M, Oprea A, Biggio B et al (2018) Manipulating machine learning: Poisoning attacks and countermeasures for regression learning. IEEE Symp Secur Priv (SP): 19–35

  57. Zhang X, Meng X (2014) Differential privacy protection for data publishing and analysis. J Comput 4:927–949

    Google Scholar 

  58. Chen C, Pei Q, Li X (2016) A GTS allocation scheme to improve multiple-access performance in vehicular sensor networks. IEEE Trans Veh Technol 65(3):1549–1563

    Google Scholar 

  59. Jinna H, Qiu T, Atiquzzaman M et al (2018) CVCG: Cooperative V2V-aided transmission scheme based on coalitional game for popular content distribution in vehicular ad-hoc networks. IEEE Trans Mob Comput 18(12):2811–2828

    Google Scholar 

  60. Khosravi MR, Samadi S (2019) Reliable data aggregation in internet of ViSAR vehicles using chained dual-phase adaptive interpolation and data embedding. IEEE Internet Things J. https://doi.org/10.1109/JIOT.2019.2952284

    Article  Google Scholar 

  61. Chaudhuri K, Monteleoni C, Sarwate AD (2011) Differentially private empirical risk minimization. J Mach Learn Res 12:1069–1109

    MathSciNet  MATH  Google Scholar 

  62. Khosravi MR, Basri H, Rostami H, Samadi S (2018) Distributed random cooperation for VBF-based routing in high-speed dense underwater acoustic sensor networks. J Supercomput 74(11):6184–6200

    Google Scholar 

  63. Chen C, Hu J, Qiu T, Atiquzzaman M, Ren Z (2019) CVCG: cooperative V2V-aided transmission scheme based on coalitional game for popular content distribution in vehicular ad-hoc networks. IEEE Trans Mob Comput 18(12):2811–2828

    Google Scholar 

  64. Zhang J, Zhang Z, Xiao X, Yang Y, Winslett M (2012) Functional mechanism: regression analysis under differential privacy. In: Proceeding of VLDB Endowment, pp 1364–1375

  65. Lei J (2011) Differentially private m-estimators. Adv Neural Inf Proc Syst 2011:361–369

    Google Scholar 

  66. Khosravi MR, Basri H, Rostami H (2018) Efficient routing for dense UWSNs with high-speed mobile nodes using spherical divisions. J Supercomput 74(2):696–716

    Google Scholar 

  67. Wu W-C (2017) A secret push messaging service in VANET clouds. J Supercomput 73(7):3085–3097

    Google Scholar 

  68. Chaudhuri K, Monteleoni C, Sarwate AD (2011) Differentially private empirical risk minimization. J Mach Learn Res JMLR 12(2):1069

    MathSciNet  MATH  Google Scholar 

  69. Zhang J, Xiao X, Yang Y, Zhang Z, Winslett M (2013) Privgene:differentially private model fitting using genetic algorithms. In: Proceeding of ACM SIGMOD International Conference on Management of Data, pp 665–676

  70. Lecuyer M, Atlidakis V, Geambasu R et al (2019) Certified robustness to adversarial examples with differential privacy. IEEE Symp Secur Priv (SP) 2019:656–672

    Google Scholar 

  71. Li P, Li T, Ye H, Li J, Chen X, Xiang Y (2018) Privacy-preserving machine learning with multiple data providers. Future Gener Comput Syst 87:341–350

    Google Scholar 

  72. Li T, Li J, Liu Z, Li P, Jia C (2019) Differentially private Naive Bayes learning over multiple data sources. Inf Sci 444:89–104

    MathSciNet  MATH  Google Scholar 

  73. Mironov I, Talwar K, Zhang L (2019) Rényi differential privacy of the sampled Gaussian mechanism. arXiv:1908.10530 [cs.LG]

  74. Wang J, Cai Z, Ai C, Yang D, Gao H, Cheng X (2016) Differentially private k-anonymity: achieving query privacy in location-based services. In: Proceeding of International Conference on Identification, Information and Knowledge in the Internet of Things, pp 475–480

  75. Zhuang Y, Fong S, Yuan M, Sung Y, Cho K, Wong RK (2017) Predicting the next turn at road junction from big traffic data. J Supercomput 73(7):3128–3148

    Google Scholar 

  76. Karimi V, Mohseni R, Samadi S (2019) Ofdm waveform design based on mutual information for cognitive radar applications. J Supercomput 75(5):2518–2534

    Google Scholar 

  77. Cormode G, Procopiuc C, Srivastava D, Shen E, Yu T (2012) Differentially private spatial decompositions. IEEE 28th Int Conf Data Eng 41(4):20–31

    Google Scholar 

  78. Chen R, Mohammed N, Fung BCM, Desai BC, Xiong L (2012) Publishing setvalued data via differential privacy. VLDB 4(4):1087–1098

    Google Scholar 

  79. Li N, Yang W, Qardaji W (2013) Differentially private grids for geospatial data. In: Proceeding of IEEE International Conference on Data Engineering, pp 757–768

  80. Peng S, Yang Y, Zhang Z et al (2012) DP-tree: indexing multi-dimensional data under differential privacy. In: Proceedings of the 2012 ACM SIGMOD International Conference on Management of Data. ACM, pp 864–864

  81. Xiao X, Wang G, Gehrke J (2011) Differential privacy via wavelet transforms. IEEE Trans Knowl Data Eng 23(8):1200–1214

    Google Scholar 

  82. Hay M, Rastogi V, Miklau G, Dan S (2010) Boosting the accuracy of differentially private histograms through consistency. Proc VLDB Endow 3(1–2):1021–1032

    Google Scholar 

  83. Xu J, Zhang Z, Xiao X, Yang Y, Yu G (2012) Differentially private histogram publication. In: IEEE International Conference on Data Engineering, pp 32–43

  84. Acs G, Castelluccia C, Chen R (2013) Differentially private histogram publishing through lossy compression. In: Proceeding of IEEE International Conference on Data Mining, pp 1–10

  85. Karimi V, Mohseni R (2019) Intelligent target spectrum estimation based on ofdm signals for cognitive radar applications. J Intell Fuzzy Syst 36(3):2557–2569

    Google Scholar 

  86. Nkenyereye L, Park Y, Rhee K-H (2018) Secure vehicle traffic data dissemination and analysis protocol in vehicular cloud computing. J Supercomput 74(3):1024–1044

    Google Scholar 

  87. Ping X, Tianqing Z, Xiaofeng W (2014) A survey on differential privacy and applications. Chin J Comput 37(1):101–122

    Google Scholar 

  88. Patel AA, Dharwa JN (2017) An integrated hybrid recommendation model using graph database. In: Proceeding of International Conference on ICT in Business Industry and Government, pp 1–5

  89. Xiong P, Zhu T, Wang X (2014) Differential privacy protection and its application. J Comput 37(1):101–122

    Google Scholar 

  90. Zhu T, Li G, Ren Y, Zhou W, Xiong P (2013) Differential privacy for neighborhood-based collaborative filtering. In: Proceeding of IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, pp 752–759

  91. Chen R, Fung B, Desai BC, Sossou NM (2012) Differentially private transit data publication: a case study on the montreal transportation system. In: Proceeding of ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp 213–221

  92. Gotz M, Machanavajjhala A, Wang G, Xiao X, Gehrke J (2012) Publishing search logsa comparative study of privacy guarantees. IEEE Trans Knowl Data Eng 24(3):520–532

    Google Scholar 

  93. Lindell Y, Pinkas B, Smart NP, Yanai A (2015) Efficient constant round multi-party computation combining BMR and SPDZ. In: Proceeding of Annual Cryptology Conference

  94. Corrigan-Gibbs H, Wolinsky DI, Ford B (2013) Proactively accountable anonymous messaging in verdict. In: Proceeding of USENIX Security Symposium

  95. Elahi T, Danezis G, Goldberg I (2014) Privex: private collection of traffic statistics for anonymous communication networks. In: Proceeding of ACM SIGSAC Conference on Computer and Communications Security

  96. Goryczka S, Xiong L (2017) A comprehensive comparison of multiparty secure additions with differential privacy. IEEE Trans Dependable Secure Comput 14(5):463–477

    Google Scholar 

  97. Rastogi V, Nath S (2010) Differentially private aggregation of distributed time-series with transformation and encryption. In: Proceeding of ACM SIGMOD International Conference on Management of Data

  98. Qi L, Zhang X, Li S, Wan S, Wen Y, Gong W (2019) Spatial-temporal data-driven service recommendation with privacy-preservation. Inf Sci. https://doi.org/10.1016/j.ins.2019.11.021

    Article  Google Scholar 

  99. Wang X, Liu Y, Shi Z, Lu X (2015) A privacy-preserving fuzzy localization scheme with csi fingerprint. In: IEEE Global Communications Conference

  100. Higuchi T, Martin P, Chakraborty S, Srivastava M (2015) Anonycast: privacy-preserving location distribution for anonymous crowd tracking systems. In: ACM International Joint Conference on Pervasive and Ubiquitous Computing

  101. Primault V, Mokhtar S. Ben, Brunie L (2015) Privacy-preserving publication of mobility data with high utility. In: IEEE International Conference on Distributed Computing Systems

  102. Berg Insight: LBS Revenue to Grow to 34.8 billion in 2020. http://www.gpsbusinessnews.com/Berg-Insight-LBS-Revenue-to-Grow-to-34-8-billion-in-2020-a5627.html. Accessed 6 Dec 2019

  103. Ietf ”geographic location/privacy (georriv) working group”. https://www.ietf.org/. Accessed 6 Dec 2019

  104. W3C, platform for privacy preferences (P3P) project. https://www.w3.org/P3P/. Accessed 6 Dec 2019

  105. Manickam P, Shankar K, Perumal E, Ilayaraja M, Sathesh Kumar K (2019) Secure data transmission through reliable vehicles in VANET using optimal lightweight cryptography. Cybersecurity and secure information systems. Springer, Cham, pp 193–204

    Google Scholar 

  106. Lu Z, Wang Q, Chen X, Qu G, Lyu Y, Liu Z (2019) Leap: a lightweight encryption and authentication protocol for in-vehicle communications. IEEE Intell Transp Syst Conf 2019:1158–1164

    Google Scholar 

  107. Brousmiche K. Leo, Durand A, Heno T, Poulain C, Dalmieres A, Hamida EB (2018) Hybrid cryptographic protocol for secure vehicle data sharing over a consortium blockchain. In: 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), pp 1281–1286

  108. Kang J, Lin D, Jiang W, Bertino E (2018) Highly efficient randomized authentication in vanets. Pervasive Mob Comput 44:31–44

    Google Scholar 

  109. Liu L, Chen C, Qiu T, Zhang M, Li S, Zhou B (2018) A data dissemination scheme based on clustering and probabilistic broadcasting in vanets. Veh Commun 13:78–88

    Google Scholar 

  110. Xu D, He X, Xu B, Wang Y, Zhang C, Li F (2012) L2P2: location-aware location privacy protection for location-based services. IEEE Infocom. https://doi.org/10.1109/INFCOM.2012.6195577

    Article  Google Scholar 

  111. Lv N, Chen C, Qiu T, Sangaiah AK (2018) Deep learning and superpixel feature extraction based on contractive autoencoder for change detection in sar images. IEEE Trans Ind Inf 14(12):5530–5538

    Google Scholar 

  112. Karimi V, Mohseni R, Samadi S (2019) Adaptive OFDM waveform design for cognitive radar in signal-dependent clutter. IEEE Syst J 99:1–12

    Google Scholar 

  113. Chen Y, Li B, Zhang Q (2016) Incentivizing crowdsourcing systems with network effects. In: IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer Communications. IEEE, pp 1–9

  114. Zhuo G, Jia Q, Guo L, Li M, Li P (2016) Privacy-preserving verifiable data aggregation and analysis for cloud-assisted mobile crowdsourcing. In: IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer Communications. IEEE, pp 1–9

  115. Wu S, Wang X, Wang S, Zhang Z, Tung AK (2014) K-anonymity for crowdsourcing database. IEEE Trans Knowl Data Eng 26(9):2207–2221

    Google Scholar 

  116. Varshney LR, Vempaty A, Varshney PK (2014) Assuring privacy and reliability in crowdsourcing with coding. In: Information Theory and Applications Workshop (ITA), 2014. IEEE, pp 1–6

Download references

Acknowledgements

This work was supported in part by the National Natural Science Foundation of China under Grant 61902060, part by Shanghai Sailing Program 19YF1402100, part by the Fundamental Research Funds for the Central Universities 2232019D3-51, 2722019PY052, and part by “Chenguang Program” supported by Shanghai Education Development Foundation and Shanghai Municipal Education Commission.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shaohua Wan.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhao, P., Zhang, G., Wan, S. et al. A survey of local differential privacy for securing internet of vehicles. J Supercomput 76, 8391–8412 (2020). https://doi.org/10.1007/s11227-019-03104-0

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-019-03104-0

Keywords

Navigation