2013 IEEE 1st International Conference on Cyber-Physical Systems, Networks, and Applications (CPSNA) 2013
DOI: 10.1109/cpsna.2013.6614243
|View full text |Cite
|
Sign up to set email alerts
|

Privacy preserving origin-destination flow measurement in vehicular cyber-physical systems

Abstract: Traffic volume measurement is one of the most basic functions of road planning and management. In this paper, we investigate an important problem of privacy preserving "pointto-point" traffic volume measurement. We formalize "pointto-point" traffic as an origin-destination (O-D) flow, which represents the set of vehicles traveling from one geographical location (origin) to another location (destination). We take advantage of vehicular cyber-physical systems (VCPS) to exploit the potential for a fundamental shi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
6
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
8
2

Relationship

2
8

Authors

Journals

citations
Cited by 15 publications
(6 citation statements)
references
References 17 publications
0
6
0
Order By: Relevance
“…The use of personal data and the stringent pressure placed by governments and agencies on differential privacy preservation has spurred a flurry of research to prevent models from revealing sensitive data from their training instances [ 197 , 221 ]. Within the ITS domain, it is possible to find many areas in which privacy preservation has recently been a subject of intense research: from origin-destination flow estimation [ 222 ] to route planners [ 223 , 224 ], or pattern mining [ 225 ], a glance at recent literature reveals the momentum this topic has acquired lately. In any of these examples data are available as a result of the sensing pervasiveness (specially in the case of VANETs) and the capture of user data.…”
Section: Emerging Ai Areas Towards Actionable Itsmentioning
confidence: 99%
“…The use of personal data and the stringent pressure placed by governments and agencies on differential privacy preservation has spurred a flurry of research to prevent models from revealing sensitive data from their training instances [ 197 , 221 ]. Within the ITS domain, it is possible to find many areas in which privacy preservation has recently been a subject of intense research: from origin-destination flow estimation [ 222 ] to route planners [ 223 , 224 ], or pattern mining [ 225 ], a glance at recent literature reveals the momentum this topic has acquired lately. In any of these examples data are available as a result of the sensing pervasiveness (specially in the case of VANETs) and the capture of user data.…”
Section: Emerging Ai Areas Towards Actionable Itsmentioning
confidence: 99%
“…e distributed key sharing algorithm assures that trip reports are available once k vehicles have the same trip with matching O-D and start-end times. Zhou et al [24] measured origin-destination traffic flows using commutative one-way hash functions that are constructed from an RSA-like cryptosystem. Although the hash function hides the vehicle's ID from the RSU, it fails to protect the privacy of the trajectory when all the data are aggregated at the centralized server.…”
Section: Related Workmentioning
confidence: 99%
“…Lou and Yin proposed a model to infer point-to-point statistics from single-point data [14], but it has limited practicability for its high computation overhead. To solve this problem, Zhou et al studied the point-to-point and multi-point traffic measurement problems respectively in [31] and [30], which can balance the privacy preservation and measurement accuracy. We study a new problem in this work, which aims to measure the persistent traffic volume.…”
Section: Related Workmentioning
confidence: 99%