Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
. 2022 Dec 15:8:e1165.
doi: 10.7717/peerj-cs.1165. eCollection 2022.

Privacy-preserving solution for vehicle parking services complying with EU legislation

Affiliations

Privacy-preserving solution for vehicle parking services complying with EU legislation

Petr Dzurenda et al. PeerJ Comput Sci. .

Abstract

Today, many modern cities adopt online smart parking services as best practices. Citizens can easily access these services using their smartphones or the infotainment panels in their cars. These services' primary objective is to give drivers the ability to quickly identify free parking slots, which should reduce parking time, save fuel, and relieve traffic in urban areas. However, the privacy offered by these services should be comparable to that of the standard paper-based parking solutions offered by parking ticket machines. On the other hand, a privacy-preserving smart parking service's design may raise a number of issues, including how to prevent double or multiple uses of parking tickets, how to prevent user tracking and profiling, how to revoke malicious users, how to handle data statistics without violating users' privacy, and how to comply with regulations like the General Data Protection Regulation (GDPR). In this article, we present multidisciplinary research on a comprehensive vehicle parking system that protects users' privacy. The research includes a range of topics, from the examination of regulatory compliance to the design of privacy-preserving parking registration and vehicle parking services to the implementation of privacy-preserving parking data processing features for data analysts. We provide a security analysis of our concept as well as several experimental results.

Keywords: Intelligent infrastructure; Legislation; Parking services; Privacy by design; Privacy preserving statistical analysis; Privacy preserving technology.

PubMed Disclaimer

Conflict of interest statement

The authors declare there are no competing interests.

Figures

Figure 1
Figure 1. Privacy-preserving parking system.
Figure 2
Figure 2. Register user.
Figure 3
Figure 3. Issue parking permit.
Figure 4
Figure 4. Park vehicle.
Figure 5
Figure 5. Extend parking time.
Figure 6
Figure 6. WI-Schnorr partially blind signature.
Figure 7
Figure 7. Register algorithm.
Figure 8
Figure 8. Issue algorithm.
Figure 9
Figure 9. Verify algorithm.
Figure 10
Figure 10. Register algorithm implementing non-repudiation feature to the parking system.
Figure 11
Figure 11. Time complexity of Revoke algorithm.
Figure 12
Figure 12. Multi-client SSE functionality.
Figure 13
Figure 13. Boolean search time.
Figure 14
Figure 14. Token creation time.
Figure 15
Figure 15. Token size.

References

    1. Abe M, Okamoto T. Provably secure partially blind signatures. Annual international cryptology conference; Cham. 2000. pp. 271–286.
    1. Al Amiri W, Baza M, Banawan K, Mahmoud M, Alasmary W, Akkaya K. Privacy-preserving smart parking system using blockchain and private information retrieval. 2019 international conference on smart applications, communications and networking (SmartNets); Piscataway. 2019. pp. 1–6.
    1. Al-Turjman F, Malekloo A. Smart parking in IoT-enabled cities: a survey. Sustainable Cities and Society; 2019. p. 101608. - DOI
    1. Al-Turjman F, Zahmatkesh H, Shahroze R. An overview of security and privacy in smart cities’ IoT communications. Transactions on Emerging Telecommunications Technologies. 2019;33(3):e3677
    1. Andrés ME, Bordenabe NE, Chatzikokolakis K, Palamidessi C. Geo-indistinguishability: differential privacy for location-based systems. Proceedings of the 2013 ACM SIGSAC conference on computer & communications security; 2013. pp. 901–914.

LinkOut - more resources