2017
DOI: 10.1109/jiot.2016.2569090
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-Preserving Ride Sharing Scheme for Autonomous Vehicles in Big Data Era

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
16
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 65 publications
(16 citation statements)
references
References 14 publications
0
16
0
Order By: Relevance
“…A polynomialbased scheme for a symmetric key generation in SCADA is discussed in [88] and a cryptographic framework for the threats in cyber-physical systems is analyzed in [89]. Also [60] proposes a similarity technique between encrypted data to preserve the privacy of ride-sharing autonomous vehicles. Secure estimation with privacy assurance of the encoded data is discussed in [90].…”
Section: B Defense Mechanismsmentioning
confidence: 99%
“…A polynomialbased scheme for a symmetric key generation in SCADA is discussed in [88] and a cryptographic framework for the threats in cyber-physical systems is analyzed in [89]. Also [60] proposes a similarity technique between encrypted data to preserve the privacy of ride-sharing autonomous vehicles. Secure estimation with privacy assurance of the encoded data is discussed in [90].…”
Section: B Defense Mechanismsmentioning
confidence: 99%
“…Three performance metrics are used for comparison and assessment between our NRS scheme and the proposed scheme in the literature, complete city representation-based scheme(CCRS) [20].…”
Section: Performance Metricsmentioning
confidence: 99%
“…The closest work in the literature to this paper is the schemes proposed in [20] and [31]. In [20] and [31], they address only non-transferable ridesharing service In [20], a scheme called CCRS has been proposed, where users (both riders and drivers) obscure their trips' data from the TOS by using kNN encryption scheme. The TOS matches the ciphertext of the users and connects the users that can share rides.…”
Section: Related Workmentioning
confidence: 99%
“…Nowadays, the pick-up service provided by part-time private car users by using Uber, Didi software platforms, is also ride-sharing. Ride-sharing has two basic features: (1) the walking routes of the owner and passenger must be overlapped totally or partly; (2) both the owner and passenger must use the car at the same time, but the passenger has no control right [4] . The emergence of the time-sharing lease mode separates the owner and the passenger successfully, and the passenger has control right during the paid period.…”
Section: Fig 2 China's New-energy Car Lease Industry Chainmentioning
confidence: 99%