Abstract
Internet of connected vehicles (IoV) are expected to enable intelligent traffic management, intelligent dynamic information services, intelligent vehicle control, etc. However, vehicles’ data privacy is argued to be a major barrier toward the application and development of IoV, thus causing a wide range of attentions. Local differential privacy (LDP) is the relaxed version of the privacy standard, differential privacy, and it can protect users’ data privacy against the untrusted third party in the worst adversarial setting. Therefore, LDP is potential to protect vehicles’ data privacy in the practical scenario, IoV, although vehicles exhibit unique features, e.g., high mobility, short connection times, etc. To this end, in this paper, we first give an overview of the existing LDP techniques and present the thorough comparisons of these work in terms of advantages, disadvantages, and computation cost, in order to get the readers well acquainted with LDP. Thereafter, we investigate the potential applications of LDP in securing IoV in detail. Last, we direct several future research directions of LDP in IoV, to bridge the gaps between LDP researches and the privacy preservation in IoV. The originality of this survey is that it is the first work to summarize and compare the existing LDP research work and that it also does an pioneering work toward the in-depth analysis of the potential applications of LDP in privacy preservation in IoV.
Similar content being viewed by others
References
5.2 million vehicles will be on world’s roads. Available at 5.2 Million Electric Vehicles Will Be On World’s Roads By 2017. https://www.sogou.com/link?url=DSOYnZeCC_obPuaw6mFPWe4YBIs76YGqSEjsBEpORElYSw3r_2XEntVyzmvXbimxEqJPGVypItYeQ5gq3b3_vyra29P1rkT7iRI32N2X1uAxCie5vXk7hv0KmOA4bUvlT_PAMheO8n5Sj3w-WsG0SA. Accessed 6 Dec 2019
Corrigan-Gibbs H, Boneh D (2017) Prio: private, robust, and scalable computation of aggregate statistics. In: Proceeding of NSDI
The number of cars worldwide is set to double by 2040. https://www.weforum.org/agenda/2016/04/the-number-of-cars-worldwide-is-set-to-double-by-2040. Accessed 6 Dec 2019
Zhao P, Li J, Zeng F, Xiao F, Wang C, Jiang H, Jiang H (2018) ILLIA: enabling k-anonymity-based privacy preserving against location injection attacks in continuous LBS queries. IEEE Internet Things J 99:1–10
Jiang H, Zhao P, Wang C (2018) RobLoP: towards robust privacy preserving against location dependent attacks in continuous LBS queries. IEEE/ACM Trans Netw 26(2):1018–1032
DEF CON 23: Digital certificates key to mobile security, says researcher. https://www.computerweekly.com/news/4500251370/Def-Con-23-Digital-certificates-key-tomobile-security-says-researcher. Accessed 6 Dec 2019
Privacy leaks in IOV. http://www.afzhan.com/news/detail/74983.html. Accessed 6 Dec 2019
Zhang Y, Chen Q, Zhong S (2017) Efficient and privacy-preserving min and k th min computations in mobile sensing systems. IEEE Trans Dependable Secure Comput 14(1):9–21
Ben-Sasson E, Chiesa A, Genkin D (2013) SNARKs for c: verifying program executions succinctly and in zero knowledge. In: Advances in Cryptology-CRYPTO, pp 90–108
Home page of EU GDPR. http://www.eugdpr.org/. Accessed 6 Dec 2019
Araki T, Furukawa J, Lindell Y, Nof A, Ohara K (2016) High-throughput semi-honest secure three-party computation with an honest majority. In: Proceedin of ACM SIGSAC Conference on Computer and Communications Security
Bonawitz K, Ivanov V, Kreuter B, Marcedone A, McMahan HB, Patel S, Ramage D, Segal A, Seth K (2017) Practical secure aggregation for privacy-preserving machine learning. In: Proceeding of ACM SIGSAC Conference on Computer and Communications Security
Nguyen T, Xiao T, Yang X, Hui Y, Shin SC, Shin H (2016) Collecting and analyzing data from smart device users with local differential privacy. arXiv preprint arXiv:1606.05053
Qin Z, Yu T, Yang Y, Khalil I, Xiao X, Ren K (2017) Generating synthetic decentralized social graphs with local differential privacy. In: Proceeding of ACM SIGSAC Conference on Computer and Communications Security, pp 425–438
This is what Apple’s differential privacy means for ios 10. https://www.theverge.com/2016/6/17/11957782/apple-differential-privacy-ios-10-wwdc-2016. Accessed 6 Dec 2019
How Google tricks itself to protect Chrome user privacy. https://www.cnet.com/au/news/how-google-tricks-itself-to-protect-chrome-user-privacy/. Accessed 6 Dec 2019
Erlingsson, ulfar, Pihur V, Korolova A (2014) Rappor: randomized aggregatable privacy-preserving ordinal response. In: Proceeding of ACM SIGSAC conference on computer and communications security, pp 10–23
Bassily R, Smith A (2015) Local, private, efficient protocols for succinct histograms. In: Proceeding of ACM symposium on Theory of computing, pp 10–19
Qin Z, Yang Y, Yu T, Khalil I, Xiao X, Ren K (2016) Heavy hitter estimation over set-valued data with local differential privacy. In: Proceeding of ACM SIGSAC Conference on Computer and Communications Security, pp 192–203
Smith A (2011) Privacy-preserving statistical estimation with optimal convergence rates. In: Proceeding of ACM Symposium on Theory of Computing
Samet S (2015) Privacy-preserving logistic regression. J Adv Inf Technol 6(3):1–8
Shokri R, Shmatikov V (2015) Privacy-preserving deep learning. In: Proceeding of ACM SIGSAC Conference on Computer and Communications Security
LeCun Y, Bengio Y, Hinton G (2015) Deep learning. Nature 521(7553):436–444
Li C, Hay M, Rastogi V, Miklau G, McGregor A (2010) Optimizing linear counting queries under differential privacy. In: Proceeding of ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, pp 123–134
Yuan G, Zhang Z, Winslett M, Xiao X, Yang Y, Hao Z (2012) Low-rank mechanism: optimizing batch queries under differential privacy. In: Proceeding of VLDB Endowment, pp 1352–1363
Li C, Miklau G (2011) Efficient batch query answering under differential privacy. arXiv preprint arXiv:1103.1367
Wan S, Li X, Xue Y, Lin W, Xu X (2019) Efficient computation offloading for internet of vehicles in edge computing-assisted 5G networks. J Supercomput. https://doi.org/10.1007/s11227-019-03011-4
Xu X, Gu R, Dai F, Qi L, Wan S (2019) Multi-objective computation offloading for internet of vehicles in cloud-edge computing. Wirel Netw. https://doi.org/10.1007/s11276-019-02127-y
McSherry Frank, Mironov I (2009) Differentially private recommender systems: Building privacy into the netflix prize contenders. In: Proceeding of ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp 1–9
Machanavajjhala Ashwin A, Korolova, Sarma AD (2011) Personalized social recommendations: accurate or private. In: Proceeding of the VLDB Endowment, pp 440–450
Frank M, Mahajan R (2011) Differentially-private network trace analysis. ACM SIGCOMM Comput Commun Rev 41(4):123–134
Wan S, Zhao Y, Wang T, Gu Z, Abbasi QH, Choo K-KR (2019) Multi-dimensional data indexing and range query processing via voronoi diagram for internet of things. Future Gener Comput Syst 91:382–391
Xu X, Xue Y, Qi L, Yuan Y, Zhang X, Umer T, Wan S (2019) An edge computing-enabled computation offloading method with privacy preservation for internet of connected vehicles. Future Gener Comput Syst 96:89–100
Purohit S, Smith W, Chappell A, West P, Lee B, Stephan E, Fox P (2016) Effective tooling for linked data publishing in scientific research. In: Proceeding of IEEE Tenth International Conference on Semantic Computing, pp 24–31
Ye Q, Meng X, Zhu M, Huo Z (2018) Survey on differential privacy. Ruan Jian Xue Bao/Journal of Software, no. 7
Xu X, He C, Xu Z et al (2019) Joint optimization of offloading utility and privacy for edge computing enabled IoT. IEEE Internet Things J. https://doi.org/10.1109/JIOT.2019.2944007
Gao Z, Xuan H-Z, Zhang H, Wan S, Choo K-KR (2019) Adaptive fusion and category-level dictionary learning model for multi-view human action recognition. IEEE Internet Things J. https://doi.org/10.1109/JIOT.2019.2911669
Niari AK, Berangi R, Fathy M (2018) ECCN: an extended CCN architecture to improve data access in vehicular content-centric network. J Supercomput 74(1):205–221
NT, Xiao T, Yang X, Hui Y, Shin SC, SJ (2016) Collecting and analyzing data from smart device users with local differential privacy. arXiv preprint arXiv:1606.05053
Ren X, Yu CM, Yu W, Yang S, Yang X, Mccann JA, Yu PS (2018) LoPub: High-dimensional crowdsourced data publication with local differential privacy. IEEE Trans Inf Forensics Secur 13(9):2151–2166
Ren X, Yu C, Yu W, Yang S, Yang X, McCann J (2016) High-dimensional crowdsourced data distribution estimation with local privacy. In: Proceeding of IEEE International Conference on Computer and Information Technology (CIT), pp 226–233
Chen C, Liu L, Qiu T, Yang K, Gong F, Song H (2018) ASGR: an artificial spider-web-based geographic routing in heterogeneous vehicular networks. IEEE Trans Intell Trans Syst 20(5):1604–1620
Chen C, Liu L, Qiu T, Ren Z, Hu J, Ti F (2018) Driver’s intention identification and risk evaluation at intersections in the internet of vehicles. IEEE Internet Things J 5(3):1575–1587
Wan S, Gu Z, Ni Q (2019) Cognitive computing and wireless communications on the edge for healthcare service robots. Comput Commun 149:99–106
Zhang R, Xie P, Wang C, Liu G, Wan S (2019) Classifying transportation mode and speed from trajectory data via deep multi-scale learning. Comput Netw 162:106861
Park JJ (2018) Fusion algorithms and high-performance applications for vehicular cloud computing. J Supercomput 74(3):995–1000
Ye M, Barg A (2018) Optimal schemes for discrete distribution estimation under locally differential privacy. IEEE Trans Inf Theory 64(8):5662–5676
Fanti G, Pihur V, Erlingsson l (2016) Building a rappor with the unknown: privacy-preserving learning of associations and data dictionaries. Proc Priv Enhanc Technol 3:41–61
Liu J, Wang W, Li D, Wan S, Liu H (2019) Role of gifts in decision making: an endowment effect incentive mechanism for offloading in the IoV. IEEE Internet Things J 6(4):6933–6951
MIJ, Duchi, John C, Wainwright MJ (2013) Local privacy, data processing inequalities, and statistical minimax rates. arXiv preprint arXiv:1302.3203
Duchi JC, Jordan MI, Wainwright MJ (2014) Privacy aware learning. J ACM 61(6):1–57
Ye M, Barg A (2018) Optimal schemes for discrete distribution estimation under locally differential privacy. IEEE Trans Inf Theory 64:5662–5676
Kairouz P, Oh S, Viswanath P (2014) Extremal mechanisms for local differential privacy. Adv Neural Inf Process Syst 4:2879–2887
Balouchzahi N-M, Fathy M, Akbari A (2016) An efficient infrastructure based service discovery in vehicular networks using P2P structures. J Supercomput 72(3):1013–1034
Wang Q, Zhang Y, Lu X, Wang Z, Qin Z, Ren K (2018) Real-time and spatio-temporal crowd-sourced social network data publishing with differential privacy. IEEE Trans Dependable Secure Comput 15(4):591–606
Jagielski M, Oprea A, Biggio B et al (2018) Manipulating machine learning: Poisoning attacks and countermeasures for regression learning. IEEE Symp Secur Priv (SP): 19–35
Zhang X, Meng X (2014) Differential privacy protection for data publishing and analysis. J Comput 4:927–949
Chen C, Pei Q, Li X (2016) A GTS allocation scheme to improve multiple-access performance in vehicular sensor networks. IEEE Trans Veh Technol 65(3):1549–1563
Jinna H, Qiu T, Atiquzzaman M et al (2018) CVCG: Cooperative V2V-aided transmission scheme based on coalitional game for popular content distribution in vehicular ad-hoc networks. IEEE Trans Mob Comput 18(12):2811–2828
Khosravi MR, Samadi S (2019) Reliable data aggregation in internet of ViSAR vehicles using chained dual-phase adaptive interpolation and data embedding. IEEE Internet Things J. https://doi.org/10.1109/JIOT.2019.2952284
Chaudhuri K, Monteleoni C, Sarwate AD (2011) Differentially private empirical risk minimization. J Mach Learn Res 12:1069–1109
Khosravi MR, Basri H, Rostami H, Samadi S (2018) Distributed random cooperation for VBF-based routing in high-speed dense underwater acoustic sensor networks. J Supercomput 74(11):6184–6200
Chen C, Hu J, Qiu T, Atiquzzaman M, Ren Z (2019) CVCG: cooperative V2V-aided transmission scheme based on coalitional game for popular content distribution in vehicular ad-hoc networks. IEEE Trans Mob Comput 18(12):2811–2828
Zhang J, Zhang Z, Xiao X, Yang Y, Winslett M (2012) Functional mechanism: regression analysis under differential privacy. In: Proceeding of VLDB Endowment, pp 1364–1375
Lei J (2011) Differentially private m-estimators. Adv Neural Inf Proc Syst 2011:361–369
Khosravi MR, Basri H, Rostami H (2018) Efficient routing for dense UWSNs with high-speed mobile nodes using spherical divisions. J Supercomput 74(2):696–716
Wu W-C (2017) A secret push messaging service in VANET clouds. J Supercomput 73(7):3085–3097
Chaudhuri K, Monteleoni C, Sarwate AD (2011) Differentially private empirical risk minimization. J Mach Learn Res JMLR 12(2):1069
Zhang J, Xiao X, Yang Y, Zhang Z, Winslett M (2013) Privgene:differentially private model fitting using genetic algorithms. In: Proceeding of ACM SIGMOD International Conference on Management of Data, pp 665–676
Lecuyer M, Atlidakis V, Geambasu R et al (2019) Certified robustness to adversarial examples with differential privacy. IEEE Symp Secur Priv (SP) 2019:656–672
Li P, Li T, Ye H, Li J, Chen X, Xiang Y (2018) Privacy-preserving machine learning with multiple data providers. Future Gener Comput Syst 87:341–350
Li T, Li J, Liu Z, Li P, Jia C (2019) Differentially private Naive Bayes learning over multiple data sources. Inf Sci 444:89–104
Mironov I, Talwar K, Zhang L (2019) Rényi differential privacy of the sampled Gaussian mechanism. arXiv:1908.10530 [cs.LG]
Wang J, Cai Z, Ai C, Yang D, Gao H, Cheng X (2016) Differentially private k-anonymity: achieving query privacy in location-based services. In: Proceeding of International Conference on Identification, Information and Knowledge in the Internet of Things, pp 475–480
Zhuang Y, Fong S, Yuan M, Sung Y, Cho K, Wong RK (2017) Predicting the next turn at road junction from big traffic data. J Supercomput 73(7):3128–3148
Karimi V, Mohseni R, Samadi S (2019) Ofdm waveform design based on mutual information for cognitive radar applications. J Supercomput 75(5):2518–2534
Cormode G, Procopiuc C, Srivastava D, Shen E, Yu T (2012) Differentially private spatial decompositions. IEEE 28th Int Conf Data Eng 41(4):20–31
Chen R, Mohammed N, Fung BCM, Desai BC, Xiong L (2012) Publishing setvalued data via differential privacy. VLDB 4(4):1087–1098
Li N, Yang W, Qardaji W (2013) Differentially private grids for geospatial data. In: Proceeding of IEEE International Conference on Data Engineering, pp 757–768
Peng S, Yang Y, Zhang Z et al (2012) DP-tree: indexing multi-dimensional data under differential privacy. In: Proceedings of the 2012 ACM SIGMOD International Conference on Management of Data. ACM, pp 864–864
Xiao X, Wang G, Gehrke J (2011) Differential privacy via wavelet transforms. IEEE Trans Knowl Data Eng 23(8):1200–1214
Hay M, Rastogi V, Miklau G, Dan S (2010) Boosting the accuracy of differentially private histograms through consistency. Proc VLDB Endow 3(1–2):1021–1032
Xu J, Zhang Z, Xiao X, Yang Y, Yu G (2012) Differentially private histogram publication. In: IEEE International Conference on Data Engineering, pp 32–43
Acs G, Castelluccia C, Chen R (2013) Differentially private histogram publishing through lossy compression. In: Proceeding of IEEE International Conference on Data Mining, pp 1–10
Karimi V, Mohseni R (2019) Intelligent target spectrum estimation based on ofdm signals for cognitive radar applications. J Intell Fuzzy Syst 36(3):2557–2569
Nkenyereye L, Park Y, Rhee K-H (2018) Secure vehicle traffic data dissemination and analysis protocol in vehicular cloud computing. J Supercomput 74(3):1024–1044
Ping X, Tianqing Z, Xiaofeng W (2014) A survey on differential privacy and applications. Chin J Comput 37(1):101–122
Patel AA, Dharwa JN (2017) An integrated hybrid recommendation model using graph database. In: Proceeding of International Conference on ICT in Business Industry and Government, pp 1–5
Xiong P, Zhu T, Wang X (2014) Differential privacy protection and its application. J Comput 37(1):101–122
Zhu T, Li G, Ren Y, Zhou W, Xiong P (2013) Differential privacy for neighborhood-based collaborative filtering. In: Proceeding of IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, pp 752–759
Chen R, Fung B, Desai BC, Sossou NM (2012) Differentially private transit data publication: a case study on the montreal transportation system. In: Proceeding of ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp 213–221
Gotz M, Machanavajjhala A, Wang G, Xiao X, Gehrke J (2012) Publishing search logsa comparative study of privacy guarantees. IEEE Trans Knowl Data Eng 24(3):520–532
Lindell Y, Pinkas B, Smart NP, Yanai A (2015) Efficient constant round multi-party computation combining BMR and SPDZ. In: Proceeding of Annual Cryptology Conference
Corrigan-Gibbs H, Wolinsky DI, Ford B (2013) Proactively accountable anonymous messaging in verdict. In: Proceeding of USENIX Security Symposium
Elahi T, Danezis G, Goldberg I (2014) Privex: private collection of traffic statistics for anonymous communication networks. In: Proceeding of ACM SIGSAC Conference on Computer and Communications Security
Goryczka S, Xiong L (2017) A comprehensive comparison of multiparty secure additions with differential privacy. IEEE Trans Dependable Secure Comput 14(5):463–477
Rastogi V, Nath S (2010) Differentially private aggregation of distributed time-series with transformation and encryption. In: Proceeding of ACM SIGMOD International Conference on Management of Data
Qi L, Zhang X, Li S, Wan S, Wen Y, Gong W (2019) Spatial-temporal data-driven service recommendation with privacy-preservation. Inf Sci. https://doi.org/10.1016/j.ins.2019.11.021
Wang X, Liu Y, Shi Z, Lu X (2015) A privacy-preserving fuzzy localization scheme with csi fingerprint. In: IEEE Global Communications Conference
Higuchi T, Martin P, Chakraborty S, Srivastava M (2015) Anonycast: privacy-preserving location distribution for anonymous crowd tracking systems. In: ACM International Joint Conference on Pervasive and Ubiquitous Computing
Primault V, Mokhtar S. Ben, Brunie L (2015) Privacy-preserving publication of mobility data with high utility. In: IEEE International Conference on Distributed Computing Systems
Berg Insight: LBS Revenue to Grow to 34.8 billion in 2020. http://www.gpsbusinessnews.com/Berg-Insight-LBS-Revenue-to-Grow-to-34-8-billion-in-2020-a5627.html. Accessed 6 Dec 2019
Ietf ”geographic location/privacy (georriv) working group”. https://www.ietf.org/. Accessed 6 Dec 2019
W3C, platform for privacy preferences (P3P) project. https://www.w3.org/P3P/. Accessed 6 Dec 2019
Manickam P, Shankar K, Perumal E, Ilayaraja M, Sathesh Kumar K (2019) Secure data transmission through reliable vehicles in VANET using optimal lightweight cryptography. Cybersecurity and secure information systems. Springer, Cham, pp 193–204
Lu Z, Wang Q, Chen X, Qu G, Lyu Y, Liu Z (2019) Leap: a lightweight encryption and authentication protocol for in-vehicle communications. IEEE Intell Transp Syst Conf 2019:1158–1164
Brousmiche K. Leo, Durand A, Heno T, Poulain C, Dalmieres A, Hamida EB (2018) Hybrid cryptographic protocol for secure vehicle data sharing over a consortium blockchain. In: 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), pp 1281–1286
Kang J, Lin D, Jiang W, Bertino E (2018) Highly efficient randomized authentication in vanets. Pervasive Mob Comput 44:31–44
Liu L, Chen C, Qiu T, Zhang M, Li S, Zhou B (2018) A data dissemination scheme based on clustering and probabilistic broadcasting in vanets. Veh Commun 13:78–88
Xu D, He X, Xu B, Wang Y, Zhang C, Li F (2012) L2P2: location-aware location privacy protection for location-based services. IEEE Infocom. https://doi.org/10.1109/INFCOM.2012.6195577
Lv N, Chen C, Qiu T, Sangaiah AK (2018) Deep learning and superpixel feature extraction based on contractive autoencoder for change detection in sar images. IEEE Trans Ind Inf 14(12):5530–5538
Karimi V, Mohseni R, Samadi S (2019) Adaptive OFDM waveform design for cognitive radar in signal-dependent clutter. IEEE Syst J 99:1–12
Chen Y, Li B, Zhang Q (2016) Incentivizing crowdsourcing systems with network effects. In: IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer Communications. IEEE, pp 1–9
Zhuo G, Jia Q, Guo L, Li M, Li P (2016) Privacy-preserving verifiable data aggregation and analysis for cloud-assisted mobile crowdsourcing. In: IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer Communications. IEEE, pp 1–9
Wu S, Wang X, Wang S, Zhang Z, Tung AK (2014) K-anonymity for crowdsourcing database. IEEE Trans Knowl Data Eng 26(9):2207–2221
Varshney LR, Vempaty A, Varshney PK (2014) Assuring privacy and reliability in crowdsourcing with coding. In: Information Theory and Applications Workshop (ITA), 2014. IEEE, pp 1–6
Acknowledgements
This work was supported in part by the National Natural Science Foundation of China under Grant 61902060, part by Shanghai Sailing Program 19YF1402100, part by the Fundamental Research Funds for the Central Universities 2232019D3-51, 2722019PY052, and part by “Chenguang Program” supported by Shanghai Education Development Foundation and Shanghai Municipal Education Commission.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Zhao, P., Zhang, G., Wan, S. et al. A survey of local differential privacy for securing internet of vehicles. J Supercomput 76, 8391–8412 (2020). https://doi.org/10.1007/s11227-019-03104-0
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-019-03104-0