{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,5,6]],"date-time":"2024-05-06T23:37:05Z","timestamp":1715038625225},"reference-count":67,"publisher":"PeerJ","license":[{"start":{"date-parts":[[2022,12,15]],"date-time":"2022-12-15T00:00:00Z","timestamp":1671062400000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"European Union\u2019s Horizon 2020 research and innovation program","award":["830892"]},{"name":"The Ministry of the Interior of the Czech Republic","award":["VJ01030002"]},{"name":"The project VIADUCT under reference 7982 funded by Service Public de Wallonie (SPW), Belgium"},{"name":"A scientific interest group hosted by Inria and including CNRS, RENATER and several Universities as well as other organizations"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"abstract":"Today, many modern cities adopt online smart parking services as best practices. Citizens can easily access these services using their smartphones or the infotainment panels in their cars. These services\u2019 primary objective is to give drivers the ability to quickly identify free parking slots, which should reduce parking time, save fuel, and relieve traffic in urban areas. However, the privacy offered by these services should be comparable to that of the standard paper-based parking solutions offered by parking ticket machines. On the other hand, a privacy-preserving smart parking service\u2019s design may raise a number of issues, including how to prevent double or multiple uses of parking tickets, how to prevent user tracking and profiling, how to revoke malicious users, how to handle data statistics without violating users\u2019 privacy, and how to comply with regulations like the General Data Protection Regulation (GDPR). In this article, we present multidisciplinary research on a comprehensive vehicle parking system that protects users\u2019 privacy. The research includes a range of topics, from the examination of regulatory compliance to the design of privacy-preserving parking registration and vehicle parking services to the implementation of privacy-preserving parking data processing features for data analysts. We provide a security analysis of our concept as well as several experimental results.<\/jats:p>","DOI":"10.7717\/peerj-cs.1165","type":"journal-article","created":{"date-parts":[[2022,12,15]],"date-time":"2022-12-15T10:14:09Z","timestamp":1671099249000},"page":"e1165","source":"Crossref","is-referenced-by-count":2,"title":["Privacy-preserving solution for vehicle parking services complying with EU legislation"],"prefix":"10.7717","volume":"8","author":[{"given":"Petr","family":"Dzurenda","sequence":"first","affiliation":[{"name":"Department of Telecommunications, Brno University of Technology, Brno, Czech Republic"}]},{"given":"Florian","family":"Jacques","sequence":"additional","affiliation":[{"name":"University of Namur, Namur, Belgium"}]},{"given":"Manon","family":"Knockaert","sequence":"additional","affiliation":[{"name":"University of Namur, Namur, Belgium"}]},{"given":"Maryline","family":"Laurent","sequence":"additional","affiliation":[{"name":"Samovar, T\u00e9l\u00e9com SudParis, Institut Polytechnique de Paris, Paris, France"}]},{"given":"Lukas","family":"Malina","sequence":"additional","affiliation":[{"name":"Department of Telecommunications, Brno University of Technology, Brno, Czech Republic"}]},{"given":"Raimundas","family":"Matulevicius","sequence":"additional","affiliation":[{"name":"Institute of Computer Science, University of Tartu, Tartu, Estonia"}]},{"given":"Qiang","family":"Tang","sequence":"additional","affiliation":[{"name":"IT for Innovative Services Department, Luxembourg Institute of Science and Technology, Luxembourg"}]},{"given":"Aimilia","family":"Tasidou","sequence":"additional","affiliation":[{"name":"Samovar, T\u00e9l\u00e9com SudParis, Institut Polytechnique de Paris, Paris, France"}]}],"member":"4443","published-online":{"date-parts":[[2022,12,15]]},"reference":[{"key":"10.7717\/peerj-cs.1165\/ref-1","first-page":"271","article-title":"Provably secure partially blind signatures","author":"Abe","year":"2000"},{"key":"10.7717\/peerj-cs.1165\/ref-2","first-page":"1","article-title":"Privacy-preserving smart parking system using blockchain and private information retrieval","author":"Al\u00a0Amiri","year":"2019"},{"key":"10.7717\/peerj-cs.1165\/ref-3","doi-asserted-by":"publisher","first-page":"101608","DOI":"10.1016\/j.scs.2019.101608","article-title":"Smart parking in IoT-enabled cities: a survey","volume":"49","author":"Al-Turjman","year":"2019"},{"issue":"3","key":"10.7717\/peerj-cs.1165\/ref-4","doi-asserted-by":"crossref","first-page":"e3677","DOI":"10.1002\/ett.3677","article-title":"An overview of security and privacy in smart cities\u2019 IoT communications","volume":"33","author":"Al-Turjman","year":"2019","journal-title":"Transactions on Emerging Telecommunications Technologies"},{"key":"10.7717\/peerj-cs.1165\/ref-5","first-page":"901","article-title":"Geo-indistinguishability: differential privacy for location-based systems","author":"Andr\u00e9s","year":"2013"},{"key":"10.7717\/peerj-cs.1165\/ref-6","first-page":"60","author":"Batura","year":"2021","journal-title":"Artificial intelligence in road transport: annex to cost of non-Europe report"},{"key":"10.7717\/peerj-cs.1165\/ref-7","first-page":"96","article-title":"Digital content directive and rules for contracts on continuous supply","volume":"12","author":"Beale","year":"2021","journal-title":"Journal of Intellectual Property, Information Technology and Electronic Commerce Law"},{"key":"10.7717\/peerj-cs.1165\/ref-8","first-page":"108","article-title":"Randomizable proofs and delegatable anonymous credentials","author":"Belenkiy","year":"2009"},{"key":"10.7717\/peerj-cs.1165\/ref-9","doi-asserted-by":"publisher","first-page":"101030","DOI":"10.1016\/j.pmcj.2019.101030","article-title":"Security and privacy of mobile wallet users in Bitcoin, Dash, Monero, and Zcash","volume":"59","author":"Biryukov","year":"2019","journal-title":"Pervasive and Mobile Computing"},{"key":"10.7717\/peerj-cs.1165\/ref-10","article-title":"The forgotten threat of voltage glitching: a case study on Nvidia Tegra X2 SoCs","author":"Bittner","year":"2021","journal-title":"Fault Diagnosis and Tolerance in Cryptography"},{"issue":"2","key":"10.7717\/peerj-cs.1165\/ref-11","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/s00145-007-9005-7","article-title":"Short signatures without random oracles and the SDH assumption in bilinear groups","volume":"21","author":"Boneh","year":"2008"},{"key":"10.7717\/peerj-cs.1165\/ref-12","first-page":"130","article-title":"Parking tickets for privacy-preserving pay-by-phone parking","author":"Borges","year":"2019"},{"issue":"5","key":"10.7717\/peerj-cs.1165\/ref-13","doi-asserted-by":"publisher","first-page":"715","DOI":"10.1007\/s10207-020-00527-2","article-title":"An efficient privacy-preserving pay-by-phone system for regulated parking areas","volume":"20","author":"Borges","year":"2021"},{"key":"10.7717\/peerj-cs.1165\/ref-14","first-page":"123","article-title":"Scalable revocation scheme for anonymous credentials based on n-times unlinkable proofs","author":"Camenisch","year":"2016"},{"key":"10.7717\/peerj-cs.1165\/ref-15","first-page":"410","article-title":"Efficient group signature schemes for large groups","author":"Camenisch","year":"1997"},{"issue":"5","key":"10.7717\/peerj-cs.1165\/ref-16","first-page":"194","article-title":"Sale of goods and supply of digital content and digital services \u2013overview of directives 2019\/770 and 2019\/771","volume":"8","author":"Carvalho","year":"2019","journal-title":"Journal of European Consumer and Market Law"},{"key":"10.7717\/peerj-cs.1165\/ref-17","doi-asserted-by":"publisher","first-page":"108712","DOI":"10.1016\/j.comnet.2021.108712","article-title":"A survey on Bluetooth Low Energy security and privacy","volume":"205","author":"C\u00e4sar","year":"2022"},{"key":"10.7717\/peerj-cs.1165\/ref-18","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1016\/j.comcom.2016.03.014","article-title":"A privacy-preserving smart parking system using an IoT elliptic curve based security platform","volume":"89","author":"Chatzigiannakis","year":"2016","journal-title":"Computer Communications"},{"key":"10.7717\/peerj-cs.1165\/ref-19","first-page":"199","article-title":"Blind signatures for untraceable payments","author":"Chaum","year":"1983"},{"key":"10.7717\/peerj-cs.1165\/ref-20","article-title":"Tor: the second-generation onion router","author":"Dingledine","year":"2004","journal-title":"Technical report"},{"key":"10.7717\/peerj-cs.1165\/ref-21","article-title":"Dash: a privacycentric cryptocurrency","author":"Duffield","year":"2015"},{"key":"10.7717\/peerj-cs.1165\/ref-22","first-page":"234","article-title":"La s\u00e9curit\u00e9 des traitements de donn\u00e9es, les analyses d\u2019impact et les violations de donn\u00e9es","volume-title":"Le r\u00e8glement g\u00e9n\u00e9ral sur la protection des donn\u00e9es (RGPD\/GDPR) Analyse approfondie","author":"Dumortier","year":"2018"},{"key":"10.7717\/peerj-cs.1165\/ref-23","first-page":"1","article-title":"Privacy-preserving online parking based on smart contracts","author":"Dzurenda","year":"2021"},{"key":"10.7717\/peerj-cs.1165\/ref-24","article-title":"General safety regulation \u2013secondary legislation","author":"EC","year":"2021"},{"key":"10.7717\/peerj-cs.1165\/ref-25","article-title":"Guidelines 01\/2020 on processing personal data in the context of connected vehicles and mobility related applications","author":"EDPB","year":"2020"},{"key":"10.7717\/peerj-cs.1165\/ref-26","article-title":"Guidelines 4\/2019 on Article 25 data protection by design and by default","author":"EDPD","year":"2019"},{"key":"10.7717\/peerj-cs.1165\/ref-27","article-title":"Guidelines 1\/2020 on processing personal data in the context of connected vehicles and mobility related applications)","author":"EDPD","year":"2020"},{"key":"10.7717\/peerj-cs.1165\/ref-28","article-title":"Cyber security and resilience of smart cars","author":"ENISA","year":"2016"},{"key":"10.7717\/peerj-cs.1165\/ref-29","article-title":"Recommendations for the security of connected and automated mobility","author":"ENISA","year":"2021"},{"key":"10.7717\/peerj-cs.1165\/ref-30","article-title":"Directive 2010\/40\/EU of the European Parliament and of the Council of 7 July 2010 on the framework for the deployment of Intelligent Transport Systems in the field of road transport and for interfaces with other modes of transport","author":"EU","year":"2010"},{"key":"10.7717\/peerj-cs.1165\/ref-31","article-title":"Regulation (EU) 2016\/679 of the European Parlament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46\/EC (General Data Protection Regulation)","author":"EU","year":"2016"},{"key":"10.7717\/peerj-cs.1165\/ref-32","article-title":"Directive 2019\/770 of the European Parliament and of the Council of 20 May 2019 on certain aspects concerning contracts for the supply of digital content and digital services","author":"EU","year":"2019"},{"key":"10.7717\/peerj-cs.1165\/ref-33","article-title":"Directive (EU) 2019\/771 of the European Parliament and of the Council of 20 May 2019 on certain aspects concerning contracts for the sale of goods, amending Regulation (EU) 2017\/2394 and Directive 2009\/22\/EC, and repealing Directive 1999\/44\/EC","author":"EU","year":"2019"},{"key":"10.7717\/peerj-cs.1165\/ref-34","article-title":"Regulation (EU) 2019\/2144 of the European Parliament and of the Council of 27 November 2019 on type-approval requirements for motor vehicles and their trailers, and systems, components and separate technical units intended for such vehicles, as regards their general safety and the protection of vehicle occupants and vulnerable road users, amending Regulation (EU) 2018\/858 of the European Parliament and of the Council and repealing Regulations (EC) No 78\/2009, (EC) No 79\/2009 and (EC) No 661\/2009 of the European Parliament and of the Council and Commission Regulations (EC) No 631\/2009, (EU) No 406\/2010, (EU) No 672\/2010, (EU) No 1003\/2010, (EU) No 1005\/2010, (EU) No 1008\/2010, (EU) No 1009\/2010, (EU) No 19\/2011, (EU) No 109\/2011, (EU) No 458\/2011, (EU) No 65\/2012, (EU) No 130\/2012, (EU) No 347\/2012, (EU) No 351\/2012, (EU) No 1230\/2012 and (EU) 2015\/166 (Text with EEA relevance)","author":"EU","year":"2019"},{"issue":"4","key":"10.7717\/peerj-cs.1165\/ref-35","first-page":"e4239","article-title":"Blockchain-based privacy-preserving valet parking for self-driving vehicles","volume":"32","author":"Fang","year":"2021"},{"key":"10.7717\/peerj-cs.1165\/ref-36","first-page":"186","article-title":"How to prove yourself: practical solutions to identification and signature problems","author":"Fiat","year":"1986"},{"key":"10.7717\/peerj-cs.1165\/ref-37","first-page":"37","article-title":"Dynamic searchable symmetric encryption with forward and backward privacy: a survey","author":"Gan","year":"2019"},{"issue":"7","key":"10.7717\/peerj-cs.1165\/ref-38","first-page":"5697","article-title":"A privacy-preserving pay-by-phone parking system","volume":"66","author":"Garra","year":"2016"},{"key":"10.7717\/peerj-cs.1165\/ref-39","article-title":"Understanding the UNECE WP.29 Cybersecurity Regulation (CSMS)","author":"Goldstein","year":"2020"},{"key":"10.7717\/peerj-cs.1165\/ref-40","first-page":"366","article-title":"Anonymous data collection scheme from short group signatures","author":"Hajny","year":"2018"},{"key":"10.7717\/peerj-cs.1165\/ref-41","first-page":"686","article-title":"Privacy ABCs: now ready for your wallets!","author":"Hajn","year":"2021"},{"issue":"11","key":"10.7717\/peerj-cs.1165\/ref-42","doi-asserted-by":"publisher","first-page":"11169","DOI":"10.1109\/TVT.2018.2870167","article-title":"Secure automated valet parking: a privacy-preserving reservation scheme for autonomous vehicles","volume":"67","author":"Huang","year":"2018"},{"issue":"3","key":"10.7717\/peerj-cs.1165\/ref-43","doi-asserted-by":"publisher","first-page":"3034","DOI":"10.1145\/2730908","article-title":"Encrypted Search","volume":"21","author":"Kamara","year":"2015"},{"key":"10.7717\/peerj-cs.1165\/ref-44","first-page":"94","article-title":"Boolean searchable symmetric encryption with worst-case sub-linear complexity","author":"Kamara","year":"2017"},{"key":"10.7717\/peerj-cs.1165\/ref-45","first-page":"463","article-title":"An empirical analysis of anonymity in zcash","author":"Kappos","year":"2018"},{"key":"10.7717\/peerj-cs.1165\/ref-46","doi-asserted-by":"publisher","first-page":"102935","DOI":"10.1016\/j.jnca.2020.102935","article-title":"From smart parking towards autonomous valet parking: a survey, challenges and future Works","volume":"175","author":"Khalid","year":"2021","journal-title":"Journal of Network and Computer Applications"},{"key":"10.7717\/peerj-cs.1165\/ref-47","first-page":"309","article-title":"Privacy-by-design in intelligent infrastructures","author":"Knockaert","year":"2021"},{"issue":"5","key":"10.7717\/peerj-cs.1165\/ref-48","doi-asserted-by":"publisher","first-page":"4037","DOI":"10.1109\/TVT.2021.3074820","article-title":"PriParkRec: privacy-preserving decentralized parking recommendation service","volume":"70","author":"Li","year":"2021","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"10.7717\/peerj-cs.1165\/ref-49","first-page":"511","article-title":"Multi-use unidirectional proxy re-signatures","author":"Libert","year":"2008"},{"issue":"3","key":"10.7717\/peerj-cs.1165\/ref-50","doi-asserted-by":"publisher","first-page":"e23","DOI":"10.1002\/spy2.23","article-title":"The internet of things and the smart city: legal challenges with digital forensics, privacy, and security","volume":"1","author":"Losavio","year":"2018","journal-title":"Security and Privacy"},{"issue":"6","key":"10.7717\/peerj-cs.1165\/ref-51","first-page":"136","article-title":"The pursuit of citizens\u2019 privacy: a privacy-aware smart city is possible","volume":"51","author":"Mart\u00ednez-Ballest\u00e9","year":"2013"},{"key":"10.7717\/peerj-cs.1165\/ref-52","doi-asserted-by":"crossref","first-page":"1484","DOI":"10.4018\/978-1-7998-5351-0.ch082","article-title":"Smart parking in smart cities using secure IoT","volume-title":"Research anthology on blockchain technology in business, healthcare, education, and government","author":"Navaroj","year":"2021"},{"key":"10.7717\/peerj-cs.1165\/ref-53","first-page":"1098","article-title":"Ring signature confidential transactions for Monero","volume":"2015","author":"Noether","year":"2015"},{"key":"10.7717\/peerj-cs.1165\/ref-54","first-page":"223","article-title":"Public-key cryptosystems based on composite degree residuosity classes","author":"Paillier","year":"1999"},{"key":"10.7717\/peerj-cs.1165\/ref-55","first-page":"305","article-title":"An e-payment architecture ensuring a high level of privacy protection","author":"Plateaux","year":"2013"},{"key":"10.7717\/peerj-cs.1165\/ref-56","first-page":"111","article-title":"Short randomizable signatures","author":"Pointcheval","year":"2016"},{"key":"10.7717\/peerj-cs.1165\/ref-57","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1080\/17579961.2018.1452176","article-title":"The law of everything. Broad concept of personal data and future of EU data protection law","author":"Purtova","year":"2018","journal-title":"Law, Innovation and Technology"},{"key":"10.7717\/peerj-cs.1165\/ref-58","doi-asserted-by":"publisher","first-page":"136529","DOI":"10.1109\/ACCESS.2021.3117452","article-title":"Privacy-enhancing group signcryption scheme","volume":"9","author":"Ricci","year":"2021"},{"key":"10.7717\/peerj-cs.1165\/ref-59","doi-asserted-by":"crossref","DOI":"10.2139\/ssrn.3600137","article-title":"\u201cGoods With Digital Elements\u201d and the Interplay With Directive 2019\/771 on the Sale of Goods","author":"Sein","year":"2020"},{"key":"10.7717\/peerj-cs.1165\/ref-60","article-title":"Mcl library","author":"Shigeo","year":"2018"},{"issue":"2","key":"10.7717\/peerj-cs.1165\/ref-61","first-page":"1","article-title":"Another look at privacy-preserving automated contact tracing","volume":"8","author":"Tang","year":"2022"},{"key":"10.7717\/peerj-cs.1165\/ref-62","article-title":"UN Regulation No 155 \u2013Uniform provisions concerning the approval of vehicles with regards to cybersecurity and cybersecurity management system","author":"UNECE","year":"2020"},{"key":"10.7717\/peerj-cs.1165\/ref-63","article-title":"Proposals for interpretation documents for UN regulation No. 155 (Cyber security and cyber security management system)","author":"UNECE","year":"2021"},{"key":"10.7717\/peerj-cs.1165\/ref-64","first-page":"47","article-title":"Global automative cybersecurity report, research into cyber attack trends in light of cybersecurity standards and regulations","author":"Upstream","year":"2021"},{"key":"10.7717\/peerj-cs.1165\/ref-65","first-page":"51","article-title":"Global automative cybersecurity report - automotive cyber threat landscape in light of new regulations","author":"Upstream","year":"2022"},{"issue":"2","key":"10.7717\/peerj-cs.1165\/ref-66","doi-asserted-by":"publisher","first-page":"415","DOI":"10.3390\/s19020415","article-title":"A regulatory view on smart city services","volume":"19","author":"Weber","year":"2019"},{"issue":"4","key":"10.7717\/peerj-cs.1165\/ref-67","doi-asserted-by":"crossref","first-page":"703","DOI":"10.1109\/TDSC.2018.2850780","article-title":"ASAP: an anonymous smart-parking and payment scheme in vehicular networks","volume":"17","author":"Zhu","year":"2018","journal-title":"IEEE Transactions on Dependable and Secure Computing"}],"container-title":["PeerJ Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/peerj.com\/articles\/cs-1165.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/peerj.com\/articles\/cs-1165.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/peerj.com\/articles\/cs-1165.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/peerj.com\/articles\/cs-1165.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,3]],"date-time":"2023-12-03T02:08:20Z","timestamp":1701569300000},"score":1,"resource":{"primary":{"URL":"https:\/\/peerj.com\/articles\/cs-1165"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,15]]},"references-count":67,"alternative-id":["10.7717\/peerj-cs.1165"],"URL":"https:\/\/doi.org\/10.7717\/peerj-cs.1165","archive":["CLOCKSS","LOCKSS","Portico"],"relation":{"has-review":[{"id-type":"doi","id":"10.7287\/peerj-cs.1165v0.1\/reviews\/1","asserted-by":"object"},{"id-type":"doi","id":"10.7287\/peerj-cs.1165v0.1\/reviews\/2","asserted-by":"object"}]},"ISSN":["2376-5992"],"issn-type":[{"value":"2376-5992","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,12,15]]},"article-number":"e1165"}}