Research output: Contribution to Journal/Magazine › Journal article › peer-review
Research output: Contribution to Journal/Magazine › Journal article › peer-review
}
TY - JOUR
T1 - Towards Privacy Protection Composition Framework on Internet of Vehicles
AU - Wu, Xiaotong
AU - Xu, Xiaolong
AU - Bilal, Muhammad
PY - 2022/11/1
Y1 - 2022/11/1
N2 - As an emerging computing paradigm, the Internet of Vehicles (IoV) brings a lot of benefits for drivers and consumers, such as route recommendation, reducing traffic congestion, and parking difficulty. However, participants in IoV are inevitably exposed to privacy threats because their data are outsourced to a third party. This article presents a comprehensive analysis of the root causes of privacy risks in IoV and the potential solutions. We begin by introducing the concrete privacy challenges, which are tied to the structural properties of IoV. Then, we present a unified framework of data privacy preservation in IoV, which integrates multiple privacy techniques, including encryption, anonymity, and perturbation. Next, we investigate the possible research directions for route recommendation, charging deployment, traffic prediction under different privacy requirements in detail. Finally, we discuss emerging techniques and environments (e.g., blockchain, smart grid, and 5G communication) to strengthen the ability and application of IoV under strong protection.
AB - As an emerging computing paradigm, the Internet of Vehicles (IoV) brings a lot of benefits for drivers and consumers, such as route recommendation, reducing traffic congestion, and parking difficulty. However, participants in IoV are inevitably exposed to privacy threats because their data are outsourced to a third party. This article presents a comprehensive analysis of the root causes of privacy risks in IoV and the potential solutions. We begin by introducing the concrete privacy challenges, which are tied to the structural properties of IoV. Then, we present a unified framework of data privacy preservation in IoV, which integrates multiple privacy techniques, including encryption, anonymity, and perturbation. Next, we investigate the possible research directions for route recommendation, charging deployment, traffic prediction under different privacy requirements in detail. Finally, we discuss emerging techniques and environments (e.g., blockchain, smart grid, and 5G communication) to strengthen the ability and application of IoV under strong protection.
U2 - 10.1109/MCE.2021.3092303
DO - 10.1109/MCE.2021.3092303
M3 - Journal article
VL - 11
SP - 32
EP - 38
JO - IEEE Consumer Electronics Magazine
JF - IEEE Consumer Electronics Magazine
SN - 2162-2248
IS - 6
ER -