PRECIOSA - Privacy Enabled Capability In CO-operative systems and Safety Applications
Overview
Background & policy context:
Research and development in the field of Intelligent Transport Systems (ITS) currently focuses on the next generation of technology in transportation. Co-operative Systems is one of the key terms which includes a new way to collaborate between individual travellers, the operators of transport systems, and service providers, all equipped with state-of-the-art technology.
By introducing Vehicle to Vehicle (V2V), Vehicle to Infrastructure (V2I), and Vehicle to X (V2X) communication, new potential is opened up to improve safe and green mobility. PRECIOSA contributes to ICT research in co-operative systems by focusing on privacy aware V2V and V2I communication for new functionalities.
Objectives:
The goal of PRECIOSA was to demonstrate that co-operative systems can comply with future privacy regulations by demonstrating that an example application can be endowed with technologies for suitable privacy protection of location related data.
Objectives
The objectives were the following:
- Define an approach for evaluation of co-operative systems, in terms of communication privacy and data storage privacy
- Define a privacy aware architecture for co-operative systems, involving suitable trust models and ontologies, a V2V privacy verifiable architecture and a V2I privacy verifiable architecture. The architecture includes components for protection, infringement detection and auditing
- Define and validate guidelines for privacy aware co-operative systems
- Investigate specific challenges for privacy
Expected impacts
PRECIOSA set out to contribute to a common pan-European architecture with these objectives:
- Trust models and ontologies for privacy
- Communication verifiable architecture
- Data storage privacy and verifiable architecture
- Validated guidelines for privacy verifiable co-operative systems.
Methodology:
The approach is to investigate a number of use cases, collect application and privacy protection requirements, to select a non-privacy aware application, to integrate selected mechanisms for protection, infringement detection and auditing, and to assess the resulting privacy aware application. This assessment carried out in liaison with industry stakeholders (e.g. C2C-CC), public authorities (e.g. data protection, article 29) should enable the validation of guidelines for privacy awareness that will submitted to the eSafety community.
Share this page