Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/570705.570711acmconferencesArticle/Chapter ViewAbstractPublication PageswmcConference Proceedingsconference-collections
Article

Framework for security and privacy in automotive telematics

Published: 28 September 2002 Publication History

Abstract

Automotive telematics may be defined as the information-intensive applications that are being enabled for vehicles by a combination of telecommunications and computing technology. Telematics by its nature requires the capture of sensor data, storage and exchange of data to obtain remote services. In order for automotive telematics to grow to its full potential, telematics data must be protected. Data protection must include privacy and security for end-users, service providers and application providers. In this paper, we propose a new framework for data protection that is built on the foundation of privacy and security technologies. The privacy technology enables users and service providers to define flexible data model and policy models. The security technology provides traditional capabilities such as encryption, authentication, non-repudiation. In addition, it provides secure environments for protected execution, which is essential to limiting data access to specific purposes.

References

[1]
{1} Hoffman, D. L., Novak, T. P., and Peralta, M. A. "Building Consumer Trust Online," Communications of the ACM, Volume 42 (4), 80-85, April, 1999.
[2]
{2} Kingpin and Mudge, "Analysis of Potable Devices and Their Weaknesses Against Malicious Code Threats", RSA Conference, San Francisco, CA, April 11, 2001.
[3]
{3} Kingpin and Mudge, "Security Analysis of the Palm Operating System and its Weaknesses Against Malicious Code Threats", Proceedings of the 10th USENIX Security Symposium, Washington, DC, August 13-17, 2001.
[4]
{4} Bohrer, K., Liu, X., Kesdogan, D., Schonberg, E., Singh, M. and Spraragen, S.L. "Personal Information Management and Distribution", Proceedings of the 4th International Conference on Electronic Commerce Research, Dallas, TX, November 8-11, 2001.
[5]
{5} Bohrer, K., Kesdogan, D., Liu, X., Podlaseck, M., Schonberg, E., Singh, M. and Spraragen, S. L. "How to Go Shopping On the World Wide Web Without Having Your Privacy Violated", Proceedings of the 4th International Conference on Electronic Commerce Research, Dallas, TX, November 8-11, 2001.
[6]
{6} Novell Inc, "digitalMe: Making life easier on the net," http://www.digitalme.com
[7]
{7} Lumeria, "An Informediary Approach to Privacy Problem," http://www.lumeria.com/whitepaper.shtml
[8]
{8} Zero-Knowledge-Systems, Inc. "The Freedom Network Architecture," http://www.freedom.net/
[9]
{9} Microsoft Inc., "A platform for user-centric application," http://www.microsoft.com/myservices/
[10]
{10} AT&T, "Privacy Minder," http://www.research.att.com/projects/p3p/pm
[11]
{11} "The Platform for Privacy Preferences 1.0 (P3P1.0) Specification". April, 2002 http://www.w3.org/TR/P3P
[12]
{12} CPExchange, "Global standards for privacy-enabled customer data exchange," http://www.cpexchange.org/standard/
[13]
{13} IBM, "Enterprise Privacy Architecture (EPA)," http://www.ibm.com/services/security/epa.html
[14]
{14} Karjoth, G., Schunter, M., and Waidner, M., "Platform for Enterprise Privacy Practices: Privacy-enabled Management of Customer Data", Proceedings of the 2nd Workshop on Privacy Enhancing Technologies, 2002.
[15]
{15} Russell, D., and Gangemi Sr., G. T. "Computer Security Basics", O'Reilly & Associates, Inc. 1991.
[16]
{16} Karger, P., Yair, F., "Security and Privacy Threats to ITS", The Second World Congress on Intelligent Transport Systems, pp. 2452-2458, November 1995.
[17]
{17} Smith, S. W., and Weingart, S. H. (April 1999) "Building a High-Performance, Programmable Secure Coprocessor", Computer Networks (Special Issue on Computer Network Security), 31: 831-860
[18]
{18} Dyer, J., Perez, R., Sailer, R., Van Doorn, L., "Personal Firewalls and Intrusion Detection Systems", 2nd Australian Information Warfare and Security Conference 2001, November 2001.
[19]
{19} Arbaugh, W. A., Farber, D. J., and Smith, J. M. "A Secure and Reliable Bootstrap Architecture." 1997.
[20]
{20} Security-Enhanced Linux, http://www.nsa.gov/selinux
[21]
{21} Bastille Linux, http://www.bastille-linux.org
[22]
{22} Langheinrich, M., "Privacy by Design -- Principles of Privacy-Aware Ubiquitous Systems," ACM UbiComp, 2001.
[23]
{23} Agre, P., "Looking Down the Road: Transport Informatics and the New Landscape of Privacy Issues", CPSR Newsletter 13(3). 1995.
[24]
{24} Samfat, D., Molva, R., Asokan, N., "Untraceability in Mobile Networks", Mobicom. 1995.
[25]
{25} Reed, J., Krizman, K., Woerner, B., Rappaport, T., "An Overview of the Challenges and Progress in Meeting the E- 911 Requirement for Location Service," IEEE Communications Magazine, 30-37, April 1998.
[26]
{26} Covington, M. J., Long, W., Srinivasan, S., Dey, A. K., Ahamad, M., and Abowd, G. D. Securing context-aware applications using environment roles. In 6th ACM Symposium on Access Control Models and Technologies (SACMAT 2001). 2001.
[27]
{27} Simone Fischer-Hubner, editor. IT-Security and Privacy - Design and Use of Privacy-Enhancing Security Mechanisms. LNCS. Springer. 2001.
[28]
{28} Pfitzmann, A., and Koehntopp, M. Anonymity, unobservability, and pseudonymity - a proposal for terminology. In Workshop on Design Issues in Anonymity and Unobservability. 2000.
[29]
{29} Blacksher, S., Foley. T. Boulder HOPs Aboard GPS Tracking. In GPS World, January 01, 2002
[30]
{30} Open Services Gateway Initiative, http://www.osgi.org/

Cited By

View all
  • (2024)Efficient Management of Containers for Software Defined VehiclesACM Transactions on Software Engineering and Methodology10.1145/367246133:8(1-36)Online publication date: 9-Jul-2024
  • (2024)Integration of traditional and telematics data for efficient insurance claims predictionASTIN Bulletin10.1017/asb.2024.6(1-17)Online publication date: 15-Feb-2024
  • (2024)A Network-Based, Data-Driven Methodology for Identifying and Ranking Freight BottlenecksData Science for Transportation10.1007/s42421-024-00107-z6:3Online publication date: 9-Sep-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
WMC '02: Proceedings of the 2nd international workshop on Mobile commerce
September 2002
116 pages
ISBN:1581136005
DOI:10.1145/570705
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 28 September 2002

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. automotive telematics
  2. privacy
  3. privacy policies
  4. security

Qualifiers

  • Article

Conference

WMC02
Sponsor:

Acceptance Rates

Overall Acceptance Rate 10 of 15 submissions, 67%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)65
  • Downloads (Last 6 weeks)6
Reflects downloads up to 05 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Efficient Management of Containers for Software Defined VehiclesACM Transactions on Software Engineering and Methodology10.1145/367246133:8(1-36)Online publication date: 9-Jul-2024
  • (2024)Integration of traditional and telematics data for efficient insurance claims predictionASTIN Bulletin10.1017/asb.2024.6(1-17)Online publication date: 15-Feb-2024
  • (2024)A Network-Based, Data-Driven Methodology for Identifying and Ranking Freight BottlenecksData Science for Transportation10.1007/s42421-024-00107-z6:3Online publication date: 9-Sep-2024
  • (2023)Regulatory options for vehicle telematics devices: balancing driver safety, data privacy and data securityInternational Review of Law, Computers & Technology10.1080/13600869.2023.224267138:1(86-110)Online publication date: 14-Sep-2023
  • (2022)Ensuring Situation-Aware Privacy for Connected VehiclesProceedings of the 12th International Conference on the Internet of Things10.1145/3567445.3569163(135-138)Online publication date: 7-Nov-2022
  • (2022)Data Usage Monitoring Method Using Metadata in Vehicle Data Distribution2022 IEEE 11th Global Conference on Consumer Electronics (GCCE)10.1109/GCCE56475.2022.10014197(622-626)Online publication date: 18-Oct-2022
  • (2021)Data Ownership: A SurveyInformation10.3390/info1211046512:11(465)Online publication date: 10-Nov-2021
  • (2021)Driving Data Dissemination: The "Term" Governing Connected Car InformationIEEE Intelligent Transportation Systems Magazine10.1109/MITS.2020.303731513:1(20-30)Online publication date: Sep-2022
  • (2020)Millennials Acceptance of Insurance Telematics: An Integrative Empirical StudyAmerican Business Review10.37625/abr.23.1.156-18123:1(156-181)Online publication date: May-2020
  • (2019)Energy Management for Smart Homes—State of the ArtApplied Sciences10.3390/app91734599:17(3459)Online publication date: 21-Aug-2019
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media