Skip to main navigation Skip to search Skip to main content

Data and location privacy of smart devices over vehicular cloud computing

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    45 Downloads (Pure)

    Abstract

    In this paper, we have addressed the problem of data and location privacy in smart devices over vehicular cloud computing (VCC). We proposed a framework to identify and register the smart IoT GPS devices over VCC service and allow the users to monitor their devices in real time. The proposed framework divides into three parts: First, data anonymization of users' information over VCC, by masking the original data of the user and replaced with fake data. The proposed technique will remove the user identity and other linkers to identify the users. Second, proposed a technique using asymmetric cryptography (RSA) technique, the proposed technique provides location privacy of users' trajectories before requesting point of interest (POI) from location-based services (LBS). Third, secure communication between users and the VCC, based on Token-based authentication by authenticating the trusted users while requesting a location from the VCC service. The proposed framework shows the efficiency and reliability of responding to user trajectories from different sources of IoT GPS devices and datasets.
    Original languageEnglish
    Title of host publicationProceedings of the 32nd Conference of Open Innovations Association (FRUCT)
    PublisherIEEE
    Pages30-37
    Number of pages8
    ISBN (Electronic)9789526924489
    ISBN (Print)9781665493260
    DOIs
    Publication statusPublished - 28 Nov 2022

    Publication series

    NameIEEE Conference Proceedings
    ISSN (Print)2305-7254

    Keywords

    • data privacy
    • cloud computing
    • technological innovation
    • authentication
    • trajectory
    • registers
    • reliability

    Fingerprint

    Dive into the research topics of 'Data and location privacy of smart devices over vehicular cloud computing'. Together they form a unique fingerprint.

    Cite this