Abstract
Keywords
Introduction
With the rapid development of wireless communication technologies, Internet of vehicles (IoV) is expected to provide new ways to enhance the traffic safety, road environment, and entertainment for drivers and passengers,1,2 as is shown in Figure 1. Although IoV brings many useful services, it makes people’s privacy and security suffer from unprecedented threats. Due to the wireless communication mode, adversaries against IoV could control communication channels easily. Attackers could easily intercept, modify, replay messages transmitted in IoV, and steal sensitive information such as identity, location, and preferences, making it vulnerable to many kinds of attacks.

System architecture of IoV.
Location-based services (LBS) can provide personalized services based on location information of moving objects and has already been widely used in public safety services, transportation, entertainment, and many other areas. 3 However, there are potential threats to location privacy when the vehicles obtain LBS from third-party service providers (SPs). It is reported that the US Sense Network handles more than 4 billion location data every day, 4 which could extract user habits, age, beliefs, income, and other property information, and the leakage of location information may also result in users being tracked and even causing more serious consequences. There are a variety of methods available for location privacy protection, for example, 5 focused on the anonymity-based approaches that can mitigate the location tracking of a target by providing the target with an anonymity set. Such approaches consider anonymity in terms of unlink-ability. And an obfuscation operator which offers high assurances on obfuscation uniformity was proposed in Perazzo and Dini, 6 even in case of imprecise location measurement. But location privacy protection and high-quality services are always a contradiction.
In order to provide high-quality services, the cloud manager first customizes virtual machines (VMs) for vehicles to support LBS according to the vehicles’ demands. 7 Moreover, a major concern that hinders IoV application is cost. The Lee and Lai 8 and Bayat et al. 9 are currently a better solution to improve security and improve computational efficiency, but these schemes use bilinear pairing operations. Bilinear pairing is a complex operation among modern encryption algorithms. To reduce the cost of the large-scale data transmissions, compared with the previous studies, our work does not use bilinear pairings, thus greatly reducing the computation cost. In this article, we propose a quality of services (QoS)–based location privacy protection method (QBPP) for LBS in cloud-enabled IoV. Our main contributions in this article are summarized as follows: (1) We propose a conditional anonymity scheme to balance location privacy and QoS. (2) The function of batch verification is considered in solving security and privacy-preserving problems in IoV and ensures the data integrity. (3) We further conduct a security analysis to demonstrate that the QBPP satisfies a variety of security requirements. (4) To improve performance, the QBPP reduces the computation and transmission cost by means of VMs and without using bilinear pairings.
This research aims to explore the location privacy protection issues by proposing the QBPP in cloud-enabled IoV. The article is organized as follows. The “Introduction” section briefly introduces the background of IoV and related potential issues. In section “Related work,” the article presents some related works of recent years that make contributions to the location privacy protection. In the “Definition” section, we summarize some definitions including network model, security requirements, and challenges that are faced within the location privacy protection in IoV. In the “Scheme design” section, we propose a QBPP method for LBS in cloud-enabled IoV. In the “Simulation” section, simulation results verify the effectiveness of resisting location privacy leakage. The “Conclusion” section concludes the article and highlights our future work.
Related work
Currently, various threats to the location privacy are motivating researchers to conduct research on protection techniques and methods. And some practical privacy protection technologies have been proposed. In order to ensure the vehicle location not be exposed, the essence of privacy protection technology is to unify the way of cryptography to hide the real identity of the vehicle and confuse one-to-one identity mapping relationship used in the communication. Here we give comparisons among the schemes based on k-anonymity, the schemes based on mix-zone, and the schemes based on signature and certificate.
The schemes based on k-anonymity
K-anonymity was proposed in 2002, 10 which had been widely accepted and extended to a variety of privacy protection models. Most recent researches offer personalized location k-anonymity, followed by appropriate algorithm to implement cloaking. Location privacy is associated with location anonymity. The higher degree of location anonymity means the higher degree of privacy protection, however, increasing the time and space overhead to a certain extent, which leads to the degradation of QoS. AMOEBA 11 provides location privacy by utilizing the group navigation of vehicles. The grouping vehicles mitigate the location tracking of any target vehicle. The group concept also provides robust anonymous access to prevent the profiling of LBS applications accessed by any target vehicle, so as to balance the trade-off between safety/liability and location privacy. However, AMOEBA did not take into account the mobility of the vehicle. Mishra et al. 12 proposed multi-party secure computation, according to the center location of member’s collection to hide the real location of the user, which can effectively resist internal and external attacks. But to obtain such a central location, the value of K is often required to be large. Once the value of K is large, the QoS relatively declines. Simultaneously, it increases the computation and communication overhead. What’s more, when the K value is small, the center point will exist deviation, leading to the result that the QoS is still not preferable.
The schemes based on mix-zone
Mix-zones are areas of the map where users cannot be tracked and change their pseudonym. By carefully placing and dimensioning such mix-zones, it is possible to thwart the adversary from linking two consecutive pseudonyms of the same user. In order to prevent continuous tracking, in the pseudonym scheme based on mix-zones,13,14 vehicles are equipped with unrelated multiple pseudonyms, which can be replaced periodically to achieve privacy protection. A particular location mix-zone presented that vehicles changed their pseudonyms in the mix-zone and chose different paths to get confused. 15 In addition, the mix-zone scheme based on silent periods 16 created its own mix-zone without cooperation with other vehicles and third-party parties (TTP). The basic idea is that the vehicle changed the pseudonym in such a quiet period. When the speed does not drop below the speed threshold (such as 30 km/h), vehicles do not send the message to the server center. Lu et al. 17 presented an effective pseudonym changing at social spots (PCS) strategy to achieve the provable location privacy. However, this threat model primarily only considers that an adversary can track a vehicle in a spatial–temporal way and did not consider the QoS.
In general, there is a certain risk for the completion of the pseudonym exchange at a large number of social points of vehicles. In addition, the coordination of silent periods among cars and the probability of successful replacement of pseudonym are issues that need to be emphatically considered. More importantly, a particular location mix-zone cannot avoid the shortcomings of easy tracking.
The schemes based on signature and certificate
To address security and privacy issues in IoV, Raya and colleagues18,19 designed a conditional privacy-preserving authentication scheme using anonymous certificates, which modified Public Key Infrastructure (PKI) to implement functions of authentication and integrity. Public and private key pairs and corresponding certificates are downloaded into the On-board Unit (OBU) in the process of communication. In order to implement the features of authentication and security, the true identity of the vehicle is hidden by random selection of group of key pairs. Nonetheless, the agreement is also confronted with some challenges: (1) The storage of public and private key pairs and corresponding certificates requires large space of vehicle to hold them. (2) The authority also demands space considerably to store the vehicle certificates. (3) If anonymity is realized, when an attacker sends an error message, the authority is difficult to find his true identity from all certificates. Even if it is to be found, a lot of overhead time is spent. To some degree, it is not worth it.
To figure out the problem that we mentioned in Raya and Hubaux’s scheme, Lu et al. 20 proposed a new scheme whose main idea is anonymous certificates which were obtained from Road-Side Unit (RSU). The certificates here are not the same as above, which are temporary. To prevent attackers from tracking vehicles based on the certificates that are likely to be used for a long time, the vehicle can also be in place of anonymous certificate frequently. However, the frequent connections with RSUs will reduce the whole efficiency. To overcome this drawback, Freudiger et al. 21 used the integration of anonymous certificates and mix-zones generating a new program. Similarly, the storage of mass certificates will also bring out large overhead. As a result, Zhang et al. 22 established a privacy preservation scheme for Vehicular Ad hoc Networks (VANETs) by using the Hash Message Authentication Code (HMAC), where the key for the HMAC is generated through a key agreement protocol executed between the vehicles and the RSU.
To solve the problem of certificate management, Zhang et al.23,24 combines identity-based public key cryptography, where the concept of the system was first proposed by Shamir 25 in 1984. Among the scheme, the identity (such as name, email, and phone number) of the user in the identity-based public key cryptography is his or her public key and private key. Neither the RSU nor the vehicle in Zhang et al.’s scheme needs to store the certificates. Besides, batch verification triggers a lower verification cost. But, as Lee and Lai 8 pointed out, the idea of Zhang et al. is so fragile that it is vulnerable to the replay attack. Besides, it is unable to meet with the property of non-repudiation. Later, Chim et al. 26 found that Zhang et al.’s scheme cannot defend against the impersonation attack. So Chim improved privacy protection mechanisms, and proved that his mechanism was much better than previous researches in communication cost because it has lower cost. However, in recent research, Shim 27 found that Chim’s scheme was easy to suffer from the impersonation attack. Recently, Zhang et al. 28 and Bayat et al. 9 have generated the anonymous identity and digital signature by modification, which greatly improved the computing performance, but it was still challenged by Liu et al. 29
According to the literature reviews, each scheme has its own advantages. However, potential risk exists due to reasons of not taking the QoS and overhead issues into account. Moreover, the previous studies cannot meet with the property of all kinds of attacks. The QBPP keeps both the location privacy protection and QoS. And the QBPP is an attack-resistance scheme. It is worth mentioning that using VM for transmitting the data greatly reduces the overhead.
Definition
The research problems mentioned in this article will be described in detail, including network model, security requirements, and challenges.
Network model
QBPP exploits powerful computation and storage capabilities in the cloud environment with entities including vehicles, LBS providers, Local Cloud, and Central Cloud, as shown in Figure 2. These entities are described as follows.

Network model.
Security requirements proposed for location privacy protection
To highlight the level of location privacy protection, we propose five important security requirements: message authentication, location privacy preservation, un-linkability, attack-resistance, and traceability.
Message authentication: Vehicles can check the validity of messages, which were sent by SP, so as to protect them from not being tampered with.
Location privacy preservation: When requesting services, vehicle submits the pseudonyms instead of real location information. 31
Un-linkability: The identity of a vehicle and other front and rear vehicles’ location information should not be associated with a real information. Hence, the vehicle cannot be tracked by observing the location of front and rear vehicles.
Attack-resistance: The privacy protection scheme could resist many common attacks, such as impersonation attacks, replay attacks, the man-in-the-middle attacks (MIMA), and so on.
Traceability: The cloud manager can analyze the real information of the vehicle if necessary, to extract its original identity and location. For instance, a malicious vehicle attempts to mislead others by sending false information. 32
Challenges
The contradiction: privacy protection and QoS
The level of privacy protection conflicts with QoS. The higher QoS will be provided when we get the more precise location information. However, sensitive location information may be misused or leaked by compromised or malicious providers, resulting in sensitive data leakage.
Real-time processing for the frequently updated object location
It is important to ensure the real-time processing of service requests. 33 The longer response time results in more continuous location information and the information is called user track that should be protected and must be processed in the multidimensional space. 34
Scheme design
Security and privacy issues cannot be neglected when vehicles obtain LBS from third-party SP, who may attack the location of the mobile user directly or sell information to other people or organizations in private for some interests. Therefore, when a user requests services, it is the pseudonym location of the user rather than the user’s true information that the user puts to use. Finally, the user receives the service information sent by SP. In this process, the true location of the user is blocked, which ensures that SP only gets the location set, thus privacy can be protected in this way. In addition, in order to ensure high-quality services, VM filters the best services for users according to the real location of user, which is tracked by VM from anonymous location set. Here, we assume that VM is trustworthy, which is managed by central cloud. Because in the cloud management module, there is a trusted management module for the management of the VM, and the cloud platform can perform behavior monitoring on the running VM, the resource can perform effective trusted management.
When request services are provided for the users, LBS records user’s location by the trace file. Each trace file entry is a triple, like <

System working status.
User → SP
In order to protect the location privacy of users, it is necessary to hide their locations when requesting for some services. The steps are as follows.
VM selects two random number r1, r2 as secret key, and r1 is only aware to user and VM, r2 is only aware to VM and SP. Then integrate vehicle’s id, location set (loc’) and con into message c1.
Vehicle generates a pair of secret key (public key: PUa, private key: PRa), and exposes the public key to other sides. The same as VM and SP generate public and private key {(PUt, PRt), (PUs, PRs)}.
Step 1: User uses PUt to encrypt c1 and r1, as cipher text E1 = PUt(c1||r1); VM decrypts E1 with PRt to get r1 and c1.
Step 2: VM integrates loc’ and con into message c2; VM uses PUs encrypting c2 and r2, as cipher text E2 = PUs(c2||r2); SP decrypts E2 with PRs to get r2 and c2.
SP →user
Since the SP receives the user’s location set where the real location of the user is included in, VM can filter the best services according to the precise location of the user when the SP sends the service content set to the user. Similarly, the best services user will get are encrypted by PUa. Then the user uses its own private key PRa to decrypt the message. Meanwhile, to avoid the attacker intercepting the message and adding own ideas, SP generates a signature to the message.
Ready Work
First, we provide three computation methods in the article, and three corresponding problems are addressed:
Given a prime number p and a primitive element
The effectiveness of the Diffie–Hellman key exchange algorithm relies on the difficulty of computing DLP. Given a prime number
It is symbolically represented as
Given
Given
Given
The notations and descriptions are listed in Table 1.
2. Initialization definitions
Notations and descriptions.
VM generates parameter list and the following steps are executed by the VM.
3. Vehicle location anonymity and SP message signature
Then, vehicle sends {
4. Message authentication
SP sends message
Before that, we must check the freshness of
SP sends a plurality of request messages
Similarly, the verifiers use parameters for authentication.
First, the verifiers check the freshness of
The verifiers randomly choose a vector
Here follows the proof
Security analysis
First, we adopt Asymmetric Cryptographic Algorithm when user requests SP for the service. In this algorithm, vehicle, VM, and SP keep each private key that can uniquely decode the cryptographic message encrypted by public key. The primary feature of Asymmetric Cryptographic Algorithm system lies in using different secret key for encryption and decryption. Its main features also exist in:
Simple secret key allocation
We do not need to elicit decryption key through encryption key and the entities keep the decryption key itself.
Low preservation amount of secret key
A network with
The permission of privacy protection between unacquainted people
Both sides in communication must have adequate trust in symmetric key. Once the secret key is revealed, the confidentiality and integrity of data cannot be guaranteed. But in asymmetrical secret key system, the communication in both sides do not need to transmit the secret key in advance or any other promise and the system can ensure the data transmission of any two sides.
Second, to analyze the service content from SP, we set two characters, the vehicle V and the attacker A. In addition, we propose a Lemma 1:
Ready Work
VM generates system parameters and private key, which will be sent to attacker A. VM chooses a random number
2. Proof of Lemma
We give the hypotheses that A forges the message
When receiving the message, the system randomly chooses number
V keeps
That is,
In this case, we could get
V outputs
Interpretation of security requirements
Based on Lemma 1, it is easy to see that no one can forge an effective message while DLP is too difficult to address. Therefore, the verifier only needs to ensure whether equation (10) holds. Thus, our scheme can provide message authentication.
The real location of vehicle is hidden among
If the attacker wants to obtain location information, he or she must solve Diffie–Hellman Problem (DHP). Thus, this model can provide location privacy preservation according to the hardness of DHP.
The real location
With equations (1), (2), and (3), we give the proof as follows
Due to the randomness of numbers
The scheme could resist the impersonation attack, the modification attack, the replay attack, the MIMA, and the steal authentication table attack.
Impersonation Attack
If the attacker wants to fake legal vehicle so as to obtain the request services sent by the user, he or she must generate information
Modification Attack
According to the previous proof, we can conclude that
Replay Attack
Timestamp is included in
MIMA
According to the analysis of message authentication, this scheme can reject the MIMA as it can provide the authentication between the sender and the receiver.
Stolen Table attack
The entities keep their own secret key so that they do not need to balance the storage overhead and capacity, in which case, attackers are unable to conduct sensitive attack through stealing proof list.
Security performance comparison
According to the security analysis and what Table 2 shows, there is no such a method that can satisfy the five security requirements, while the QBPP can provide this five security requirements.
Security performance comparison.
Simulation
Based on the high popularity, the openness and strong scalability of NS-2 36 and mobile scene generation tool VanetMobiSim, 37 this article expands network simulation for routing layer, a transport layer, and the data link layer. The data packets are sent among the moving vehicles, VM, and SP. The basic parameters used in the simulation experiment are as follows: 802.11p protocol, bandwidth 10 Mbps, and the maximum transmission distance 1 km. In the simulation experiment, the number of vehicles is set to a maximum of 100, and a total of 20 rounds of simulations are performed. The experimental values are the average of 20 rounds of simulation. In this section, the program we designed gives a discussion in terms of the computation cost, average delay, transmission cost, and verification delay.
Analysis of computation cost
Next, we give three effective definitions of
Comparison of computation cost.
Based on the results shown in Table 3, we can see that the QBPP for location privacy protection in IoV is equipped with lower computation cost compared with the other four schemes proposed by the previous researchers.
Analysis of average delay
The average delay is affected by many parameters. Here, we analyze the impact of the average delay relative to the speed and the number of vehicles. The formula used is as follows
Among them,
Figure 4 describes the influence of vehicles’ number versus delay, along with the increase of vehicles’ number, the delay of our scheme is the lowest.

Impact of vehicles’ number versus delay.
Figure 5 describes the influence of vehicles’ speed versus delay. As can be seen in the figure, when the vehicle speed increases from 10 to 50 km/h, the number of interactions between vehicles increases per unit time. Excessive network traffic makes the vehicle data exchange delay increase. However, our scheme still bears the minimum transmission delay. For Raya, Shim, Zhang, Bayat’s scheme, the delay is significantly increased due to the impact of the vehicle speed and packet loss.

Impact of vehicles’ speed versus delay.
Analysis of transmission cost
Transmission cost is the main indicator to measure the performance. Here, we use sending a single message or
Comparison of transmission cost.
Analysis of verification delay
To reflect the efficient performance by using HMAC in batch authentication, as described in Figure 6, we can observe that with the increasing number of requests, the verification delay gets longer while our scheme has the best performance.

Impact of request number versus verification delay.
Conclusion
Recently, in wireless communication service market, IoV is considered as an important domain. LBS is featured with a supporting technology in vehicular networks. As privacy protection is a crucial problem, we have proposed a QBPP method for LBS in cloud-enabled IoV. Moreover, the conditional anonymity is proposed to balance the trade-off between location privacy and QoS. Furthermore, to achieve better performance, the function of batch verification of multiple messages is included in our scheme. The security analysis demonstrates that the proposed scheme can overcome the weakness of previous schemes. Our scheme yields a better performance by lowering computation and transmission cost and reducing average delay due to no bilinear pairings and the use of VM.
As future research, we plan to address the continuous challenges related to LBS along with the development of IoV. There are several interesting problems that are worthy of further study, such as secure frameworks of live VM migration for LBS.
