Threat analysis and protection methods of personal information in vehicle probing system

Masaaki Sato, Michiko Izumi, Hideki Sunahara, Keisuke Uehara, Jun Murai

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Abstract

Nowadays, automobiles have a role as a sensor aggregation which is used to grasp the circumstance and its location information. The value from vehicle sensors on each vehicle is called probe data. Organically-consolidated probe data which make social seminal information is deserving of societal expectation. These probe vehicle system also known as floating car Data System (FCD) are developed under active promotion of cooperation among industry, academia, and government. In addition, for providing global social services over the Internet, lots of companies and general persons who use such services have drew attention to privacy, especially the management of personal data. In this paper, After providing a brief overview of general probe vehicle system, we sew up practical difficulties and threat analysis. Based on its analysis, we consider the protection methods that realize protection of personal information. Afterwards, we describe the standardization activities about the international principle based on this examination.

Original languageEnglish
Title of host publicationThird International Conference on Wireless and Mobile Communications 2007, ICWMC '07
PublisherIEEE Computer Society
Pages58-63
Number of pages6
ISBN (Print)0769527965, 9780769527963
DOIs
Publication statusPublished - 2007
EventThird International Conference on Wireless and Mobile Communications 2007, ICWMC '07 - Guadeloupe, Guadeloupe
Duration: 2007 Mar 42007 Mar 9

Publication series

NameThird International Conference on Wireless and Mobile Communications 2007, ICWMC '07

Other

OtherThird International Conference on Wireless and Mobile Communications 2007, ICWMC '07
CountryGuadeloupe
CityGuadeloupe
Period07/3/407/3/9

Keywords

  • Component
  • Intelligent Transport Systems(ITS)
  • Personal data protection
  • Probe vehicle system
  • Standarization

ASJC Scopus subject areas

  • Computer Science Applications
  • Electrical and Electronic Engineering
  • Communication

Fingerprint Dive into the research topics of 'Threat analysis and protection methods of personal information in vehicle probing system'. Together they form a unique fingerprint.

  • Cite this

    Sato, M., Izumi, M., Sunahara, H., Uehara, K., & Murai, J. (2007). Threat analysis and protection methods of personal information in vehicle probing system. In Third International Conference on Wireless and Mobile Communications 2007, ICWMC '07 (pp. 58-63). [4138164] (Third International Conference on Wireless and Mobile Communications 2007, ICWMC '07). IEEE Computer Society. https://doi.org/10.1109/ICWMC.2007.91