TY - GEN
T1 - Threat analysis and protection methods of personal information in vehicle probing system
AU - Sato, Masaaki
AU - Izumi, Michiko
AU - Sunahara, Hideki
AU - Uehara, Keisuke
AU - Murai, Jun
PY - 2007
Y1 - 2007
N2 - Nowadays, automobiles have a role as a sensor aggregation which is used to grasp the circumstance and its location information. The value from vehicle sensors on each vehicle is called probe data. Organically-consolidated probe data which make social seminal information is deserving of societal expectation. These probe vehicle system also known as floating car Data System (FCD) are developed under active promotion of cooperation among industry, academia, and government. In addition, for providing global social services over the Internet, lots of companies and general persons who use such services have drew attention to privacy, especially the management of personal data. In this paper, After providing a brief overview of general probe vehicle system, we sew up practical difficulties and threat analysis. Based on its analysis, we consider the protection methods that realize protection of personal information. Afterwards, we describe the standardization activities about the international principle based on this examination.
AB - Nowadays, automobiles have a role as a sensor aggregation which is used to grasp the circumstance and its location information. The value from vehicle sensors on each vehicle is called probe data. Organically-consolidated probe data which make social seminal information is deserving of societal expectation. These probe vehicle system also known as floating car Data System (FCD) are developed under active promotion of cooperation among industry, academia, and government. In addition, for providing global social services over the Internet, lots of companies and general persons who use such services have drew attention to privacy, especially the management of personal data. In this paper, After providing a brief overview of general probe vehicle system, we sew up practical difficulties and threat analysis. Based on its analysis, we consider the protection methods that realize protection of personal information. Afterwards, we describe the standardization activities about the international principle based on this examination.
KW - Component
KW - Intelligent Transport Systems(ITS)
KW - Personal data protection
KW - Probe vehicle system
KW - Standarization
UR - http://www.scopus.com/inward/record.url?scp=37649031572&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=37649031572&partnerID=8YFLogxK
U2 - 10.1109/ICWMC.2007.91
DO - 10.1109/ICWMC.2007.91
M3 - Conference contribution
AN - SCOPUS:37649031572
SN - 0769527965
SN - 9780769527963
T3 - Third International Conference on Wireless and Mobile Communications 2007, ICWMC '07
SP - 58
EP - 63
BT - Third International Conference on Wireless and Mobile Communications 2007, ICWMC '07
PB - IEEE Computer Society
T2 - Third International Conference on Wireless and Mobile Communications 2007, ICWMC '07
Y2 - 4 March 2007 through 9 March 2007
ER -