Abstract
Electronic Toll Pricing (ETP), a location-based vehicular service, allows users to pay tolls without stopping or even slowing down their cars. User location records are collected so as to calculate their payments. However, users have privacy concerns as locations are considered as private information. In this paper, we focus on user traceability in ETP systems where anonymous location records are stored by the service providers. Based on user toll payment information, we propose a post-hoc analysis of user traceability, which aims at computing a user’s all possible traces. Moreover, we propose several methods to improve the effectiveness of the analysis by combining other contextual information and propose a number of optimisations to improve its efficiency as well. We develop a prototype and evaluate the effectiveness of the analysis by conducting extensive experiments on a number of simulated datasets.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Troncoso, C., Danezis, G., Kosta, E., Preneel, B.: PriPAYD: privacy friendly pay-as-you-drive insurance. In: Proc. ACM Workshop on Privacy in the Electronic Society (WPES), pp. 99–107. ACM (2007)
Ma, Z., Kargl, F., Weber, M.: Measuring long-term location privacy in vehicular communication systems. Computer Communications 33(12), 1414–1427 (2010)
Giannotti, F., Nanni, M., Pinelli, F., Pedreschi, D.: Trajectory pattern mining. In: Proc. 13th ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD), pp. 330–339. ACM (2007)
de Jonge, W., Jacobs, B.: Privacy-Friendly Electronic Traffic Pricing via Commits. In: Degano, P., Guttman, J., Martinelli, F. (eds.) FAST 2008. LNCS, vol. 5491, pp. 143–161. Springer, Heidelberg (2009)
Popa, R.A., Balakrishnan, H., Blumberg, A.J.: VPriv: Protecting privacy in location-based vehicular services. In: Proc. 18th USENIX Security Symposium, pp. 335–350. USENIX Association (2009)
Balasch, J., Rial, A., Troncoso, C., Geuens, C.: PrETP: Privacy-preserving electronic toll pricing. In: Proc. 19th USENIX Security Symposium, pp. 63–78. USENIX Association (2010)
Chen, X., Lenzini, G., Mauw, S., Pang, J.: A group signature based electronic toll pricing system. In: Proc. 7th Conference on Availability, Reliability and Security (ARES). IEEE CS (to appear, 2012)
Garcia, F., Verheul, E., Jacobs, B.: Cell-Based Roadpricing. In: Petkova-Nikova, S., Pashalidis, A., Pernul, G. (eds.) EuroPKI 2011. LNCS, vol. 7163, pp. 106–122. Springer, Heidelberg (2012)
Meiklejohn, S., Mowery, K., Checkoway, S., Shacham, H.: The phantom tollbooth: Privacy-preserving electronic toll collection in the presence of driver collusion. In: Proc. 20th USENIX Security Symposium. USENIX Association (2011)
Narayanan, A., Shmatikov, V.: Robust de-anonymization of large sparse datasets. In: Proc. 29th IEEE Symposium on Security and Privacy (S&P), pp. 111–125. IEEE CS (2008)
Narayanan, A., Shmatikov, V.: De-anonymizing social networks. In: Proc. 30th IEEE Symposium on Security and Privacy (S&P), pp. 173–187. IEEE CS (2009)
Wondracek, G., Holz, T., Kirda, E., Kruegel, C.: A practical attack to de-anonymize social network users. In: Proc. 31st IEEE Symposium on Security and Privacy (S&P), pp. 223–238. IEEE CS (2010)
Gruteser, M., Hoh, B.: On the Anonymity of Periodic Location Samples. In: Hutter, D., Ullmann, M. (eds.) SPC 2005. LNCS, vol. 3450, pp. 179–192. Springer, Heidelberg (2005)
Hoh, B., Gruteser, M., Xiong, H., Alrabady, A.: Preserving privacy in GPS traces via uncertainty-aware path cloaking. In: Proc. 14th ACM Conference on Computer and Communications Security (CCS), pp. 161–171. ACM (2007)
Shokri, R., Theodorakopoulos, G., Boudec, J.Y.L., Hubaux, J.P.: Quantifying location privacy. In: Proc. 32nd IEEE Symposium on Security and Privacy (S&P), pp. 247–262. IEEE CS (2011)
Trasarti, R., Pinelli, F., Nanni, M., Giannotti, F.: Mining mobility user profiles for car pooling. In: Proc. 17th ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD), pp. 1190–1198. ACM (2011)
Zheng, Y., Zhang, L., Ma, Z., Xie, X., Ma, W.: Recommending friends and locations based on individual location history. ACM Transactions on the Web 5(1), 5 (2011)
Chen, X., Pang, J.: Measuring query privacy in location-based services. In: Proc. 2nd ACM Conference on Data and Application Security and Privacy (CODASPY), pp. 49–60. ACM (2012)
Chaum, D.: The dining cryptographers problem: Unconditional sender and recipient untraceability. Journal of Cryptology 1(1), 65–75 (1988)
Pérez-Jiménez, M.J., Riscos-Núñez, A.: Solving the subset-sum problem by P systems with active membranes. New Generation Computing 23(4), 339–356 (2005)
Garey, M., Johnson, D.: Computers and Intractability: A Guide to the Theory of NP-Completeness. W. H. Freeman & Co. (1990)
Oltean, M., Muntean, O.: Solving the subset-sum problem with a light-based device. Natural Computing 8(2), 321–331 (2009)
Pisinger, D.: Linear time algorithms for knapsack problems with bounded weights. Journal of Algorithms 33(1), 1–14 (1999)
Behrisch, M., Bieker, L., Erdmann, J., Krajzewicz, D.: Sumo - simulation of urban mobility: An overview. In: Proc. 3rd Conference on Advances in System Simulation (SIMUL), pp. 63–68 (2011)
Xiao, X., Zheng, Y., Luo, Q., Xie, X.: Finding similar users using category-based location history. In: Proc. 18th ACM SIGSPATIAL Symposium on Advances in Geographic Information Systems (GIS), pp. 442–445. ACM (2010)
Yuan, J., Zheng, Y., Zhang, C., Xie, W., Xie, X., Sun, G., Huang, Y.: T-drive: Driving directions based on taxi trajectories. In: Proc. 18th ACM SIGSPATIAL Symposium on Advances in Geographic Information Systems (GIS), pp. 99–108. ACM (2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Chen, X., Fonkwe, D., Pang, J. (2013). Post-hoc User Traceability Analysis in Electronic Toll Pricing Systems. In: Di Pietro, R., Herranz, J., Damiani, E., State, R. (eds) Data Privacy Management and Autonomous Spontaneous Security. DPM SETOP 2012 2012. Lecture Notes in Computer Science, vol 7731. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35890-6_3
Download citation
DOI: https://doi.org/10.1007/978-3-642-35890-6_3
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-35889-0
Online ISBN: 978-3-642-35890-6
eBook Packages: Computer ScienceComputer Science (R0)