Privacy Protection of Automated and Self-Driving Vehicles (Dagstuhl Seminar 22042)

F. Kargl, Ioannis Krontiris, A. Weimerskirch, I. Williams
{"title":"Privacy Protection of Automated and Self-Driving Vehicles (Dagstuhl Seminar 22042)","authors":"F. Kargl, Ioannis Krontiris, A. Weimerskirch, I. Williams","doi":"10.4230/DagRep.12.1.83","DOIUrl":null,"url":null,"abstract":"This report documents the program and the outcomes of Dagstuhl Seminar 22042 “Privacy Protection of Automated and Self-Driving Vehicles”. The Seminar reviewed existing privacy-enhancing technologies, standards, tools, and frameworks for protecting personal information in the context of automated and self-driving vehicles (AVs). We specifically focused on where such existing techniques clash with requirements of an AV and its data processing and identified the major road blockers on the way to deployment of privacy protection in AVs from a legal, technical, business and ethical perspective. Therefore, the seminar took an interdisciplinary approach involving autonomous and connected driving, privacy protection, and legal data protection experts. This report summarizes the discussions and findings during the seminar, includes the abstracts of talks, and includes a report from the working groups. This talk opened the seminar with an overview over the field of automotive privacy and how it developed over the years. We started from early works on Car-to-Everything (C2X) and discussed how privacy was considered an important requirement from day one. From this perspective, C2X is an excellent example of privacy-by-design and privacy-by-default. We introduced how changing pseudonyms were designed as a mechanism to protect privacy and prevent location tracking, also highlighting its limitations and the need to balance and trade-off technical privacy against effort and efficiency of applications. As an example, we looked into tracking attacks that can easily reconstruct a vehicle’s path from anonymous position samples (if they are available with sufficiently high resolution).","PeriodicalId":91064,"journal":{"name":"Dagstuhl reports","volume":"17 1","pages":"83-100"},"PeriodicalIF":0.0000,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Dagstuhl reports","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4230/DagRep.12.1.83","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

This report documents the program and the outcomes of Dagstuhl Seminar 22042 “Privacy Protection of Automated and Self-Driving Vehicles”. The Seminar reviewed existing privacy-enhancing technologies, standards, tools, and frameworks for protecting personal information in the context of automated and self-driving vehicles (AVs). We specifically focused on where such existing techniques clash with requirements of an AV and its data processing and identified the major road blockers on the way to deployment of privacy protection in AVs from a legal, technical, business and ethical perspective. Therefore, the seminar took an interdisciplinary approach involving autonomous and connected driving, privacy protection, and legal data protection experts. This report summarizes the discussions and findings during the seminar, includes the abstracts of talks, and includes a report from the working groups. This talk opened the seminar with an overview over the field of automotive privacy and how it developed over the years. We started from early works on Car-to-Everything (C2X) and discussed how privacy was considered an important requirement from day one. From this perspective, C2X is an excellent example of privacy-by-design and privacy-by-default. We introduced how changing pseudonyms were designed as a mechanism to protect privacy and prevent location tracking, also highlighting its limitations and the need to balance and trade-off technical privacy against effort and efficiency of applications. As an example, we looked into tracking attacks that can easily reconstruct a vehicle’s path from anonymous position samples (if they are available with sufficiently high resolution).
自动驾驶和自动驾驶车辆的隐私保护(Dagstuhl研讨会22042)
本报告记录了Dagstuhl研讨会22042“自动驾驶和自动驾驶汽车的隐私保护”的计划和成果。研讨会回顾了现有的在自动驾驶和自动驾驶车辆环境下保护个人信息的增强隐私技术、标准、工具和框架。我们特别关注这些现有技术与自动驾驶汽车及其数据处理要求的冲突,并从法律、技术、商业和道德的角度确定了在自动驾驶汽车中部署隐私保护的主要障碍。因此,研讨会采取了跨学科的方式,涉及自动驾驶和互联驾驶,隐私保护和法律数据保护专家。本报告总结了研讨会期间的讨论和结果,包括会谈摘要,并包括工作组的报告。本讲座首先概述了汽车隐私领域及其多年来的发展情况。我们从汽车到一切(C2X)的早期工作开始,讨论了隐私是如何从第一天起就被视为一个重要的需求。从这个角度来看,C2X是设计隐私和默认隐私的一个很好的例子。我们介绍了如何将更改假名设计为一种保护隐私和防止位置跟踪的机制,还强调了其局限性以及在技术隐私与应用程序的努力和效率之间进行平衡和权衡的必要性。作为一个例子,我们研究了跟踪攻击,它可以很容易地从匿名位置样本中重建车辆的路径(如果它们具有足够高的分辨率)。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信