Threat analysis and protection methods of personal information in vehicle probing system

Masaaki Sato, Michiko Izumi, Hideki Sunahara, Keisuke Uehara, Jun Murai

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Abstract

Nowadays, automobiles have a role as a sensor aggregation which is used to grasp the circumstance and its location information. The value from vehicle sensors on each vehicle is called probe data. Organically-consolidated probe data which make social seminal information is deserving of societal expectation. These probe vehicle system also known as floating car Data System (FCD) are developed under active promotion of cooperation among industry, academia, and government. In addition, for providing global social services over the Internet, lots of companies and general persons who use such services have drew attention to privacy, especially the management of personal data. In this paper, After providing a brief overview of general probe vehicle system, we sew up practical difficulties and threat analysis. Based on its analysis, we consider the protection methods that realize protection of personal information. Afterwards, we describe the standardization activities about the international principle based on this examination.

Original languageEnglish
Title of host publicationThird International Conference on Wireless and Mobile Communications 2007, ICWMC '07
DOIs
Publication statusPublished - 2007
EventThird International Conference on Wireless and Mobile Communications 2007, ICWMC '07 - Guadeloupe, Guadeloupe
Duration: 2007 Mar 42007 Mar 9

Other

OtherThird International Conference on Wireless and Mobile Communications 2007, ICWMC '07
CountryGuadeloupe
CityGuadeloupe
Period07/3/407/3/9

Fingerprint

threat
personal data
floating
aggregation
mobile social services
Data privacy
motor vehicle
privacy
Sensors
promotion
Standardization
Automobiles
Internet
Industry
examination
Railroad cars
Agglomeration
human being
industry
management

Keywords

  • Component
  • Intelligent Transport Systems(ITS)
  • Personal data protection
  • Probe vehicle system
  • Standarization

ASJC Scopus subject areas

  • Computer Science Applications
  • Electrical and Electronic Engineering
  • Communication

Cite this

Sato, M., Izumi, M., Sunahara, H., Uehara, K., & Murai, J. (2007). Threat analysis and protection methods of personal information in vehicle probing system. In Third International Conference on Wireless and Mobile Communications 2007, ICWMC '07 [4138164] https://doi.org/10.1109/ICWMC.2007.91

Threat analysis and protection methods of personal information in vehicle probing system. / Sato, Masaaki; Izumi, Michiko; Sunahara, Hideki; Uehara, Keisuke; Murai, Jun.

Third International Conference on Wireless and Mobile Communications 2007, ICWMC '07. 2007. 4138164.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Sato, M, Izumi, M, Sunahara, H, Uehara, K & Murai, J 2007, Threat analysis and protection methods of personal information in vehicle probing system. in Third International Conference on Wireless and Mobile Communications 2007, ICWMC '07., 4138164, Third International Conference on Wireless and Mobile Communications 2007, ICWMC '07, Guadeloupe, Guadeloupe, 07/3/4. https://doi.org/10.1109/ICWMC.2007.91
Sato M, Izumi M, Sunahara H, Uehara K, Murai J. Threat analysis and protection methods of personal information in vehicle probing system. In Third International Conference on Wireless and Mobile Communications 2007, ICWMC '07. 2007. 4138164 https://doi.org/10.1109/ICWMC.2007.91
Sato, Masaaki ; Izumi, Michiko ; Sunahara, Hideki ; Uehara, Keisuke ; Murai, Jun. / Threat analysis and protection methods of personal information in vehicle probing system. Third International Conference on Wireless and Mobile Communications 2007, ICWMC '07. 2007.
@inproceedings{67c0d39bada249afa0ee3472a7e71d8d,
title = "Threat analysis and protection methods of personal information in vehicle probing system",
abstract = "Nowadays, automobiles have a role as a sensor aggregation which is used to grasp the circumstance and its location information. The value from vehicle sensors on each vehicle is called probe data. Organically-consolidated probe data which make social seminal information is deserving of societal expectation. These probe vehicle system also known as floating car Data System (FCD) are developed under active promotion of cooperation among industry, academia, and government. In addition, for providing global social services over the Internet, lots of companies and general persons who use such services have drew attention to privacy, especially the management of personal data. In this paper, After providing a brief overview of general probe vehicle system, we sew up practical difficulties and threat analysis. Based on its analysis, we consider the protection methods that realize protection of personal information. Afterwards, we describe the standardization activities about the international principle based on this examination.",
keywords = "Component, Intelligent Transport Systems(ITS), Personal data protection, Probe vehicle system, Standarization",
author = "Masaaki Sato and Michiko Izumi and Hideki Sunahara and Keisuke Uehara and Jun Murai",
year = "2007",
doi = "10.1109/ICWMC.2007.91",
language = "English",
isbn = "0769527965",
booktitle = "Third International Conference on Wireless and Mobile Communications 2007, ICWMC '07",

}

TY - GEN

T1 - Threat analysis and protection methods of personal information in vehicle probing system

AU - Sato, Masaaki

AU - Izumi, Michiko

AU - Sunahara, Hideki

AU - Uehara, Keisuke

AU - Murai, Jun

PY - 2007

Y1 - 2007

N2 - Nowadays, automobiles have a role as a sensor aggregation which is used to grasp the circumstance and its location information. The value from vehicle sensors on each vehicle is called probe data. Organically-consolidated probe data which make social seminal information is deserving of societal expectation. These probe vehicle system also known as floating car Data System (FCD) are developed under active promotion of cooperation among industry, academia, and government. In addition, for providing global social services over the Internet, lots of companies and general persons who use such services have drew attention to privacy, especially the management of personal data. In this paper, After providing a brief overview of general probe vehicle system, we sew up practical difficulties and threat analysis. Based on its analysis, we consider the protection methods that realize protection of personal information. Afterwards, we describe the standardization activities about the international principle based on this examination.

AB - Nowadays, automobiles have a role as a sensor aggregation which is used to grasp the circumstance and its location information. The value from vehicle sensors on each vehicle is called probe data. Organically-consolidated probe data which make social seminal information is deserving of societal expectation. These probe vehicle system also known as floating car Data System (FCD) are developed under active promotion of cooperation among industry, academia, and government. In addition, for providing global social services over the Internet, lots of companies and general persons who use such services have drew attention to privacy, especially the management of personal data. In this paper, After providing a brief overview of general probe vehicle system, we sew up practical difficulties and threat analysis. Based on its analysis, we consider the protection methods that realize protection of personal information. Afterwards, we describe the standardization activities about the international principle based on this examination.

KW - Component

KW - Intelligent Transport Systems(ITS)

KW - Personal data protection

KW - Probe vehicle system

KW - Standarization

UR - http://www.scopus.com/inward/record.url?scp=37649031572&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=37649031572&partnerID=8YFLogxK

U2 - 10.1109/ICWMC.2007.91

DO - 10.1109/ICWMC.2007.91

M3 - Conference contribution

SN - 0769527965

SN - 9780769527963

BT - Third International Conference on Wireless and Mobile Communications 2007, ICWMC '07

ER -