WEKO3
アイテム
{"_buckets": {"deposit": "fa1568d2-15bb-496a-a42d-162de3a660c0"}, "_deposit": {"created_by": 18, "id": "10037", "owners": [18], "pid": {"revision_id": 0, "type": "depid", "value": "10037"}, "status": "published"}, "_oai": {"id": "oai:muroran-it.repo.nii.ac.jp:00010037", "sets": ["46", "316", "352"]}, "author_link": ["56585", "39157", "21131", "56586", "56587", "56588"], "item_79_biblio_info_10": {"attribute_name": "書誌情報", "attribute_value_mlt": [{"bibliographicIssueDates": {"bibliographicIssueDate": "2018-06-18", "bibliographicIssueDateType": "Issued"}, "bibliographicIssueNumber": "1", "bibliographicPageEnd": "211", "bibliographicPageStart": "196", "bibliographicVolumeNumber": "14", "bibliographic_titles": [{"bibliographic_title": "IEEE Transactions on Information Forensics and Security", "bibliographic_titleLang": "en"}]}]}, "item_79_description_23": {"attribute_name": "フォーマット", "attribute_value_mlt": [{"subitem_description": "application/pdf", "subitem_description_type": "Other"}]}, "item_79_description_7": {"attribute_name": "抄録", "attribute_value_mlt": [{"subitem_description": "Usage-based insurance (UBI) is regarded as a promising way to provide accurate automotive insurance rates by analyzing the driving behaviors (e.g., speed, mileage, and harsh braking/accelerating) of drivers. The best practice that has been adopted by many insurance programs to protect users\u0027 location privacy is the use of driving speed rather than GPS data. However, in this paper, we challenge this approach by presenting a novel speed-based location trajectory inference framework. The basic strategy of the proposed inference framework is motivated by the following observations. In practice, many environmental factors, such as real-time traffic and traffic regulations, can influence the driving speed. These factors provide side-channel information about the driving route, which can be exploited to infer the vehicle\u0027s trace. We implement our discovered attack on a public data set in New Jersey. The experimental results show that the attacker has a nearly 60% probability of obtaining the real route if he chooses the top 10 candidate routes. To thwart the proposed attack, we design a privacy preserving scoring and data audition framework that enhances drivers\u0027 control on location privacy without affecting the utility of UBI. Our defense framework can also detect users\u0027 dishonest behavior (e.g., modification of speed data) via a probabilistic audition scheme. Extensive experimental results validate the effectiveness of the defense framework.", "subitem_description_language": "en", "subitem_description_type": "Abstract"}]}, "item_79_link_17": {"attribute_name": "出版者版へのリンク", "attribute_value_mlt": [{"subitem_link_text": "10.1109/TIFS.2018.2848227", "subitem_link_url": "https://doi.org/10.1109/TIFS.2018.2848227"}]}, "item_79_link_5": {"attribute_name": "室蘭工業大学研究者データベースへのリンク", "attribute_value_mlt": [{"subitem_link_text": "太田 香(OTA Kaoru)", "subitem_link_url": "http://rdsoran.muroran-it.ac.jp/html/100000140_ja.html"}, {"subitem_link_text": "董 冕雄(DONG Mianxiong)", "subitem_link_url": "http://rdsoran.muroran-it.ac.jp/html/100000145_ja.html"}]}, "item_79_publisher_11": {"attribute_name": "出版者", "attribute_value_mlt": [{"subitem_publisher": "IEEE", "subitem_publisher_language": "en"}]}, "item_79_relation_18": {"attribute_name": "DOI", "attribute_value_mlt": [{"subitem_relation_type": "isVersionOf", "subitem_relation_type_id": {"subitem_relation_type_id_text": "10.1109/TIFS.2018.2848227", "subitem_relation_type_select": "DOI"}}]}, "item_79_rights_19": {"attribute_name": "権利", "attribute_value_mlt": [{"subitem_rights": "© 2018 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.", "subitem_rights_language": "en"}]}, "item_79_source_id_12": {"attribute_name": "ISSN", "attribute_value_mlt": [{"subitem_source_identifier": "1556-6013", "subitem_source_identifier_type": "PISSN"}]}, "item_79_source_id_14": {"attribute_name": "書誌レコードID", "attribute_value_mlt": [{"subitem_source_identifier": "AA12122678", "subitem_source_identifier_type": "NCID"}]}, "item_79_subject_9": {"attribute_name": "日本十進分類法", "attribute_value_mlt": [{"subitem_subject": "007", "subitem_subject_scheme": "NDC"}]}, "item_79_text_4": {"attribute_name": "著者ID(非表示)", "attribute_value_mlt": [{"subitem_text_value": "1000050713971@@@1000020728274"}]}, "item_79_version_type_21": {"attribute_name": "著者版フラグ", "attribute_value_mlt": [{"subitem_version_resource": "http://purl.org/coar/version/c_ab4af688f83e57aa", "subitem_version_type": "AM"}]}, "item_access_right": {"attribute_name": "アクセス権", "attribute_value_mlt": [{"subitem_access_right": "open access", "subitem_access_right_uri": "http://purl.org/coar/access_right/c_abf2"}]}, "item_creator": {"attribute_name": "著者", "attribute_type": "creator", "attribute_value_mlt": [{"creatorNames": [{"creatorName": "ZHOU, Lu", "creatorNameLang": "en"}], "nameIdentifiers": [{"nameIdentifier": "56585", "nameIdentifierScheme": "WEKO"}]}, {"creatorNames": [{"creatorName": "DU, Suguo", "creatorNameLang": "en"}], "nameIdentifiers": [{"nameIdentifier": "56586", "nameIdentifierScheme": "WEKO"}]}, {"creatorNames": [{"creatorName": "ZHU, Haojin", "creatorNameLang": "en"}], "nameIdentifiers": [{"nameIdentifier": "56587", "nameIdentifierScheme": "WEKO"}]}, {"creatorNames": [{"creatorName": "CHEN, Cailian", "creatorNameLang": "en"}], "nameIdentifiers": [{"nameIdentifier": "56588", "nameIdentifierScheme": "WEKO"}]}, {"creatorAffiliations": [{"affiliationNameIdentifiers": [{"affiliationNameIdentifier": "10103", "affiliationNameIdentifierScheme": "kakenhi"}], "affiliationNames": [{"affiliationName": "室蘭工業大学", "affiliationNameLang": "ja"}, {"affiliationName": "Muroran Institute of Technology", "affiliationNameLang": "en"}]}], "creatorNames": [{"creatorName": "OTA, Kaoru", "creatorNameLang": "en"}, {"creatorName": "太田, 香", "creatorNameLang": "ja"}, {"creatorName": "オオタ, カオル", "creatorNameLang": "ja-Kana"}], "familyNames": [{"familyName": "OTA", "familyNameLang": "en"}, {"familyName": "太田", "familyNameLang": "ja"}, {"familyName": "オオタ", "familyNameLang": "ja-Kana"}], "givenNames": [{"givenName": " Kaoru", "givenNameLang": "en"}, {"givenName": "香", "givenNameLang": "ja"}, {"givenName": "カオル", "givenNameLang": "ja-Kana"}], "nameIdentifiers": [{"nameIdentifier": "21131", "nameIdentifierScheme": "WEKO"}, {"nameIdentifier": "1000050713971", "nameIdentifierScheme": "NRID", "nameIdentifierURI": "https://nrid.nii.ac.jp/ja/nrid/1000050713971"}]}, {"creatorAffiliations": [{"affiliationNameIdentifiers": [{"affiliationNameIdentifier": "10103", "affiliationNameIdentifierScheme": "kakenhi"}], "affiliationNames": [{"affiliationName": "室蘭工業大学", "affiliationNameLang": "ja"}, {"affiliationName": "Muroran Institute of Technology", "affiliationNameLang": "en"}]}], "creatorNames": [{"creatorName": "DONG, Mianxiong", "creatorNameLang": "en"}, {"creatorName": "トウ, メンユウ", "creatorNameLang": "ja-Kana"}, {"creatorName": "董, 冕雄", "creatorNameLang": "ja"}], "familyNames": [{"familyName": "DONG", "familyNameLang": "en"}, {"familyName": "トウ", "familyNameLang": "ja-Kana"}, {"familyName": "董", "familyNameLang": "ja"}], "givenNames": [{"givenName": " Mianxiong", "givenNameLang": "en"}, {"givenName": "メンユウ", "givenNameLang": "ja-Kana"}, {"givenName": "冕雄", "givenNameLang": "ja"}], "nameIdentifiers": [{"nameIdentifier": "39157", "nameIdentifierScheme": "WEKO"}, {"nameIdentifier": "1000020728274", "nameIdentifierScheme": "NRID", "nameIdentifierURI": "https://nrid.nii.ac.jp/ja/nrid/1000020728274"}]}]}, "item_files": {"attribute_name": "ファイル情報", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_date", "date": [{"dateType": "Available", "dateValue": "2019-08-26"}], "displaytype": "detail", "download_preview_message": "", "file_order": 0, "filename": "IEEETIFS_14_1_196_211.pdf", "filesize": [{"value": "3.8 MB"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_note", "mimetype": "application/pdf", "size": 3800000.0, "url": {"label": "IEEETIFS_14_1_196_211", "objectType": "fulltext", "url": "https://muroran-it.repo.nii.ac.jp/record/10037/files/IEEETIFS_14_1_196_211.pdf"}, "version_id": "55cfce02-7aaa-49a7-9204-5305e47e52dd"}]}, "item_keyword": {"attribute_name": "キーワード", "attribute_value_mlt": [{"subitem_subject": "Connected vehicles", "subitem_subject_language": "en", "subitem_subject_scheme": "Other"}, {"subitem_subject": "location privacy", "subitem_subject_language": "en", "subitem_subject_scheme": "Other"}, {"subitem_subject": "hidden Markov model", "subitem_subject_language": "en", "subitem_subject_scheme": "Other"}, {"subitem_subject": "secure aggregation protocol", "subitem_subject_language": "en", "subitem_subject_scheme": "Other"}, {"subitem_subject": "inspection game", "subitem_subject_language": "en", "subitem_subject_scheme": "Other"}]}, "item_language": {"attribute_name": "言語", "attribute_value_mlt": [{"subitem_language": "eng"}]}, "item_resource_type": {"attribute_name": "資源タイプ", "attribute_value_mlt": [{"resourcetype": "journal article", "resourceuri": "http://purl.org/coar/resource_type/c_6501"}]}, "item_title": "Location Privacy in Usage-Based Automotive Insurance: Attacks and Countermeasures", "item_titles": {"attribute_name": "タイトル", "attribute_value_mlt": [{"subitem_title": "Location Privacy in Usage-Based Automotive Insurance: Attacks and Countermeasures", "subitem_title_language": "en"}]}, "item_type_id": "79", "owner": "18", "path": ["46", "316", "352"], "permalink_uri": "http://hdl.handle.net/10258/00009985", "pubdate": {"attribute_name": "PubDate", "attribute_value": "2019-08-26"}, "publish_date": "2019-08-26", "publish_status": "0", "recid": "10037", "relation": {}, "relation_version_is_last": true, "title": ["Location Privacy in Usage-Based Automotive Insurance: Attacks and Countermeasures"], "weko_shared_id": -1}
Location Privacy in Usage-Based Automotive Insurance: Attacks and Countermeasures
http://hdl.handle.net/10258/00009985
http://hdl.handle.net/10258/000099850ebc85c9-efea-48b3-9099-bafe43df9e7b
名前 / ファイル | ライセンス | アクション |
---|---|---|
IEEETIFS_14_1_196_211 (3.8 MB)
|
|
Item type | 学術雑誌論文 / Journal Article.(1) | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
公開日 | 2019-08-26 | |||||||||||||||||
タイトル | ||||||||||||||||||
言語 | en | |||||||||||||||||
タイトル | Location Privacy in Usage-Based Automotive Insurance: Attacks and Countermeasures | |||||||||||||||||
言語 | ||||||||||||||||||
言語 | eng | |||||||||||||||||
キーワード | ||||||||||||||||||
言語 | en | |||||||||||||||||
主題Scheme | Other | |||||||||||||||||
主題 | Connected vehicles | |||||||||||||||||
キーワード | ||||||||||||||||||
言語 | en | |||||||||||||||||
主題Scheme | Other | |||||||||||||||||
主題 | location privacy | |||||||||||||||||
キーワード | ||||||||||||||||||
言語 | en | |||||||||||||||||
主題Scheme | Other | |||||||||||||||||
主題 | hidden Markov model | |||||||||||||||||
キーワード | ||||||||||||||||||
言語 | en | |||||||||||||||||
主題Scheme | Other | |||||||||||||||||
主題 | secure aggregation protocol | |||||||||||||||||
キーワード | ||||||||||||||||||
言語 | en | |||||||||||||||||
主題Scheme | Other | |||||||||||||||||
主題 | inspection game | |||||||||||||||||
資源タイプ | ||||||||||||||||||
資源タイプ識別子 | http://purl.org/coar/resource_type/c_6501 | |||||||||||||||||
資源タイプ | journal article | |||||||||||||||||
アクセス権 | ||||||||||||||||||
アクセス権 | open access | |||||||||||||||||
アクセス権URI | http://purl.org/coar/access_right/c_abf2 | |||||||||||||||||
著者 |
ZHOU, Lu
× ZHOU, Lu× DU, Suguo× ZHU, Haojin× CHEN, Cailian× 太田, 香
WEKO
21131
× 董, 冕雄
WEKO
39157
|
|||||||||||||||||
室蘭工業大学研究者データベースへのリンク | ||||||||||||||||||
太田 香(OTA Kaoru) | ||||||||||||||||||
http://rdsoran.muroran-it.ac.jp/html/100000140_ja.html | ||||||||||||||||||
室蘭工業大学研究者データベースへのリンク | ||||||||||||||||||
董 冕雄(DONG Mianxiong) | ||||||||||||||||||
http://rdsoran.muroran-it.ac.jp/html/100000145_ja.html | ||||||||||||||||||
抄録 | ||||||||||||||||||
内容記述タイプ | Abstract | |||||||||||||||||
内容記述 | Usage-based insurance (UBI) is regarded as a promising way to provide accurate automotive insurance rates by analyzing the driving behaviors (e.g., speed, mileage, and harsh braking/accelerating) of drivers. The best practice that has been adopted by many insurance programs to protect users' location privacy is the use of driving speed rather than GPS data. However, in this paper, we challenge this approach by presenting a novel speed-based location trajectory inference framework. The basic strategy of the proposed inference framework is motivated by the following observations. In practice, many environmental factors, such as real-time traffic and traffic regulations, can influence the driving speed. These factors provide side-channel information about the driving route, which can be exploited to infer the vehicle's trace. We implement our discovered attack on a public data set in New Jersey. The experimental results show that the attacker has a nearly 60% probability of obtaining the real route if he chooses the top 10 candidate routes. To thwart the proposed attack, we design a privacy preserving scoring and data audition framework that enhances drivers' control on location privacy without affecting the utility of UBI. Our defense framework can also detect users' dishonest behavior (e.g., modification of speed data) via a probabilistic audition scheme. Extensive experimental results validate the effectiveness of the defense framework. | |||||||||||||||||
言語 | en | |||||||||||||||||
書誌情報 |
en : IEEE Transactions on Information Forensics and Security 巻 14, 号 1, p. 196-211, 発行日 2018-06-18 |
|||||||||||||||||
出版者 | ||||||||||||||||||
言語 | en | |||||||||||||||||
出版者 | IEEE | |||||||||||||||||
出版者版へのリンク | ||||||||||||||||||
10.1109/TIFS.2018.2848227 | ||||||||||||||||||
https://doi.org/10.1109/TIFS.2018.2848227 | ||||||||||||||||||
DOI | ||||||||||||||||||
関連タイプ | isVersionOf | |||||||||||||||||
識別子タイプ | DOI | |||||||||||||||||
関連識別子 | 10.1109/TIFS.2018.2848227 | |||||||||||||||||
日本十進分類法 | ||||||||||||||||||
主題Scheme | NDC | |||||||||||||||||
主題 | 007 | |||||||||||||||||
ISSN | ||||||||||||||||||
収録物識別子タイプ | PISSN | |||||||||||||||||
収録物識別子 | 1556-6013 | |||||||||||||||||
書誌レコードID | ||||||||||||||||||
収録物識別子タイプ | NCID | |||||||||||||||||
収録物識別子 | AA12122678 | |||||||||||||||||
権利 | ||||||||||||||||||
言語 | en | |||||||||||||||||
権利情報 | © 2018 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. | |||||||||||||||||
著者版フラグ | ||||||||||||||||||
出版タイプ | AM | |||||||||||||||||
出版タイプResource | http://purl.org/coar/version/c_ab4af688f83e57aa | |||||||||||||||||
フォーマット | ||||||||||||||||||
内容記述タイプ | Other | |||||||||||||||||
内容記述 | application/pdf |