Affiliation:
1. Key Laboratory of Aerospace Information Security and Trusted Computing, School of Cyber Science and Engineering, Ministry of Education, Wuhan University, Wuhan 430072, China
Abstract
The rapid development of electric vehicles provides users with convenience of life. When users enjoy the V2G charging service, privacy leakage of their charging location is a crucial security issue. Existing privacy-preserving algorithms for EV access to charging locations suffer from the problem of nondefendable background knowledge attacks and privacy attacks by untrustworthy third parties. We propose a personalized location privacy protection scheme (PPVC) based on differential privacy to meet users’ personalized EV charging requirements while protecting their privacy. First, by constructing a decision matrix, PPVC describes recommended routes’ utility and privacy effects. Then, a utility model is constructed based on the multiattribute theory. The user’s privacy preferences are integrated into the model to provide the route with the best utility. Finally, considering the privacy preference needs of users, the Euclidean distance share is used to assign appropriate privacy budgets to users and determine the generation range of false locations to generate the service request location with the highest utility. The experimental results show that the proposed personalized location privacy protection scheme can meet the service demands of users while reasonably protecting their privacy to provide higher service quality. Compared with existing solutions, PPVC improves the charging efficiency by up to 25%, and 8% at the same privacy protection level.
Funder
National Natural Science Foundation of China
National Key Research and Development Program of China
Provincial Key Research and Development Program of Hubei, China
Subject
General Mathematics,Engineering (miscellaneous),Computer Science (miscellaneous)
Reference38 articles.
1. A Survey on the Electrification of Transportation in a Smart Grid Environment;Su;IEEE Trans. Ind. Inform.,2012
2. Near linear time algorithm to detect community structures in large-scale networks;Raghavan;Phys. Rev. E,2007
3. Smart Meter Data Privacy: A Survey;Asghar;IEEE Commun. Surv. Tutor.,2017
4. Qian, J., Li, X., Zhang, C., and Chen, L. (2016, January 10–14). De-anonymizing social networks and inferring private attributes using knowledge graphs. Proceedings of the IEEE INFOCOM 2016—The 35th Annual IEEE International Conference on Computer Communications, San Francisco, CA, USA.
5. Community detection in graphs;Fortunato;Phys. Rep.-Rev. Sec. Phys. Lett.,2010