Requirements for protection methods of personal information in vehicle probing system

Michiko Izumi, Masaaki Sato, Hideki Sunahara

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Nowadays, automobiles have a role as a sensor aggregation which is used to grasp the circumstance and its locational information. The value from sensors on each vehicle is called probe data. Organically-consolidated probe data which make social seminal information is deserving of societal expectation. These probe vehicle systems also known as floating car Data System (FCD) are developed under active promotion of cooperation among industry, academia, and government. In addition, for providing global social services over the Internet, lots of companies and general persons who use such services have drew attention to privacy, especially the management of personal data. In this paper, After providing a brief overview of general probe vehicle system, we sew up practical difficulties and threat analysis. Base on its analysis, we consider the requirements for envision a design and deployment of secure probe vehicle system, and inform the related activities at ISO.

Original languageEnglish
Title of host publication2007 International Symposium on Applications and the Internet - Workshops, SAINT-W
PublisherIEEE Computer Society
Pages70-73
Number of pages4
ISBN (Print)0769527574, 9780769527574
DOIs
Publication statusPublished - 2007
Event2007 International Symposium on Applications and the Internet - Workshops, SAINT-W - Hiroshima, Japan
Duration: 2007 Jan 152007 Jan 19

Publication series

NameSAINT - 2007 International Symposium on Applications and the Internet - Workshops, SAINT-W

Other

Other2007 International Symposium on Applications and the Internet - Workshops, SAINT-W
CountryJapan
CityHiroshima
Period07/1/1507/1/19

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Computer Science Applications
  • Software

Fingerprint Dive into the research topics of 'Requirements for protection methods of personal information in vehicle probing system'. Together they form a unique fingerprint.

  • Cite this

    Izumi, M., Sato, M., & Sunahara, H. (2007). Requirements for protection methods of personal information in vehicle probing system. In 2007 International Symposium on Applications and the Internet - Workshops, SAINT-W (pp. 70-73). [4090140] (SAINT - 2007 International Symposium on Applications and the Internet - Workshops, SAINT-W). IEEE Computer Society. https://doi.org/10.1109/SAINT-W.2007.92