Abstract
A naive implementation of a road pricing system will collect an enormous amount of personal location data. In this paper we present a sophisticated system that is privacy friendly, i.e. where the invoices contain aggregated pricing information and where only the driver has insight into all the underlying details. Enforcement based on spot checking is used to keep drivers honest, and to make the system fraud resistant. These spot checks are integrated in the system in a novel way that does not impair the privacy of the overall system, as is the case in systems previously proposed. Our solution can easily be applied to other privacy sensitive contexts such as smart metering and e-ticketing in public transport.
Chapter PDF
References
Aurenhammer, F., Klein, R.: Voronoi Diagrams. In: Sack, J.-R., Urrutia, J. (eds.) Handbook of Computational Geometry, pp. 201–290. North-Holland, Amsterdam (2000)
Balasch, J., Rial, A., Troncoso, C., Geuens, C., Preneel, B., Verbauwhede, I.: PrETP: Privacy-Preserving Electronic Toll Pricing. Technical Report, COSIC, KU Leuven (2010)
Blumberg, A., Keeler, L., Shelar, A.: Automated traffic enforcement which respects driver privacy. In: 7th Int. IEEE Conf. on Intelligent Transportation Systems, ITSC (2004)
Chaum, D.: Blind Signatures for Untraceable Payments. In: Chaum, D., Rivest, R.L., Sherman, A.T. (eds.) Advances in Cryptology: Proceedings of CRYPTO 1982, pp. 199–203. Plemum, New York (1982)
Dolev, D., Dwork, C., Naor, M.: Nonmalleable Cryptography. SIAM J. Comput. 30(2), 391–437 (2000)
Eisses, S., de Jonge, W., Habers, V.: Privacy and distance-based charging for all vehicles on all roads. In: Proceedings of the 13th ITS World Congress (2006)
Gruteser, M., Liu, X.: Protecting Privacy in Continuous Location-Tracking Applications. IEEE Security & Privacy 2(2), 28–34 (2004)
Hubaux, J.P., Capkun, S., Luo, J.: The Security and Privacy of Smart Vehicles. IEEE Security & Privacy 2(3), 49–55 (2004)
de Jonge, W., Jacobs, B.: Privacy-Friendly Electronic Traffic Pricing via Commits. In: Degano, P., Guttman, J., Martinelli, F. (eds.) FAST 2008. LNCS, vol. 5491, pp. 143–161. Springer, Heidelberg (2009)
Jonsson, J., Kaliski, B.: Public-Key Cryptography Standards (PKCS) #1: RSA Cryptography Specifications Version 2.1, RFC 3447 (2003)
Pieper, R.: MobiMiles: Bewust op weg. (report produced for the Ministry of Transport, Public Works and Water Management) (2001)
Popa, R.A., Balakrishnan, H., Blumberg, A.J.: VPriv: Protecting Privacy in Location-Based Vehicular Services. In: Proc. 18th USENIX Security Symposium, San Jose, CA, USA, pp. 335–150 (2009)
Rass, S., Fuchs, S., Schaffer, M., Kyamakya, K.: How to protect privacy in floating car data systems. In: Sadekar, V.K., Santi, P., Hu, Y.C., Mauve, M. (eds.) Proceedings of the Fifth International Workshop on Vehicular Ad Hoc Networks, VANET 2008, San Francisco, California, USA, September 15, pp. 17–22. ACM, New York (2008)
Rivest, R.L., Shamir, A., Adleman, L.M.: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. ACM Commun. 21(2), 120–126 (1978)
Troncoso, C., Danezis, G., Kosta, E., Preneel, B.: PriPAYD: privacy friendly pay-as-you-drive insurance. In: WPES, pp. 99–107 (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 IFIP
About this paper
Cite this paper
Hoepman, JH., Huitema, G. (2010). Privacy Enhanced Fraud Resistant Road Pricing. In: Berleur, J., Hercheui, M.D., Hilty, L.M. (eds) What Kind of Information Society? Governance, Virtuality, Surveillance, Sustainability, Resilience. HCC CIP 2010 2010. IFIP Advances in Information and Communication Technology, vol 328. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-15479-9_20
Download citation
DOI: https://doi.org/10.1007/978-3-642-15479-9_20
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-15478-2
Online ISBN: 978-3-642-15479-9
eBook Packages: Computer ScienceComputer Science (R0)