Safeguarding Passenger Data Privacy in Self-Navigating Vehicles

Abstract

As the automotive industry undergoes a transformative shift towards autonomous vehicles (AVs), the integration of advanced self-driving technologies presents new opportunities and challenges. [1] AVs, defined as systems capable of dynamic driving tasks with limited human intervention, are poised to revolutionize transportation. With governments, private firms, and research centers investing heavily in AV development, the realization of fully autonomous vehicles in everyday life appears imminent. The advent of self-driving cars brings forth novel prospects for passenger-centric services, including sophisticated information systems facilitating Passenger-AV interaction. [2] This interaction empowers passengers to supervise vehicle behavior, control destinations, and engage in high-level dialogue with AVs. However, as AV information systems collect and process sensitive passenger data, ensuring data privacy and security becomes paramount. To instill trust in self-driving technology and safeguard passenger privacy, stringent privacy and security measures must be implemented. Adhering to legislative mandates and organizational responsibilities is crucial to mitigate risks associated with data misuse and system compromise. [4, 5] Moreover, as AVs transition from Human-Computer Interaction (HCI) to Human-Robot Interaction (HRI), it is imperative to reassess information systems security risk management (ISSRM) procedures in the context of Passenger-AV interaction. This research focuses on investigating the applicability of ISSRM methods in HCI to ensure data privacy and security in Human-AV interaction scenarios, particularly Passenger-AV interaction. By scrutinizing the processing of sensitive personal data within AV information systems, the study aims to address emerging privacy and security challenges. [6] Emphasizing the legal imperative for information security and data privacy, this endeavor seeks to establish robust frameworks for protecting passenger data in the era of autonomous vehicles.

Country : India

1 Awadh Sao2 Ashish Deharkar3 Pushpa Tandekar

  1. Student, Department of CSE, Shri Sai College of Engineering and Technology, Chandrapur, Maharashtra, India
  2. Assistant Professor, Department of CSE, Shri Sai College of Engineering and Technology, Chandrapur, Maharashtra, India
  3. Assistant Professor, Department of CSE, Shri Sai College of Engineering and Technology, Chandrapur, Maharashtra, India

IRJIET, Volume 8, Issue 4, April 2024 pp. 236-240

doi.org/10.47001/IRJIET/2024.804034

References

  1. OneTrustDataGuidance, “Comparing privacy laws: GDPR/CCPA.”https://www.dataguidance.com/sites /default/files/ccpa_v_gdpr_latest_edition.pdf,Dece mber2019.
  2. “Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation).” http://data.europa.eu/eli/reg/2016/679/2016-05-04, 2016.
  3. “Driverless public bus route now open in Tallinn.” https://e-estonia.com/driverless-public-bus-tallinn/.
  4. F. Jahan, W. Sun, Q. Niyaz, and M. Alam, “Security modeling of autonomous systems: A survey,” ACM Comput. Surv., vol. 52, Sept. 2019.
  5. European Union Agency for Cybersecurity, “ENISA good practices for security of Smart Cars.” https://www.enisa.europa.eu/publications/smart-cars, November 2019.
  6. “Personal Data Protection Act 2012 (No. 26 of 2012).” https://sso.agc.gov.sg/Act/
  7. European Union Agency for Cybersecurity, “ENISA: Guidelines for SMEs on the security of personal data processing.” https://op.europa.eu/s/ou6H, January 2017. Last accessed 4-Dec-2020.
  8. The MITRE Corporation, “Common Weakness Enumeration (CWE).”https://cwe.mitre.org/.
  9. P. Pullonen, J. Tom, R. Matulevicius, and A. Toots, “Privacy-enhanced BPMN: enabling data privacy analysis in business processes models,” Software and Systems Modeling, vol. 18, pp. 3235–3264, Dec 2019.
  10. “ISO/IEC 27001:2013: Information technology — Security techniques — Information security management systems — Requirements.” https://www.iso.org/standard/54534.html.
  11. Lowlesh Yadav and Asha Ambhaikar, “IOHT based Tele-Healthcare Support System for Feasibility and perfor-mance analysis,” Journal of Electrical Systems, vol. 20, no. 3s, pp. 844–850, Apr. 2024, doi: 10.52783/jes.1382.
  12. L. Yadav and A. Ambhaikar, "Feasibility and Deployment Challenges of Data Analysis in Tele-Healthcare System," 2023 International Conference on Artificial Intelligence for Innovations in Healthcare Industries (ICAIIHI), Raipur, India, 2023, pp. 1-5, doi: 10.1109/ICAIIHI57871.2023.10489389.
  13. L. Yadav and A. Ambhaikar, "Approach Towards Development of Portable Multi-Model Tele-Healthcare System," 2023 International Conference on Artificial Intelligence for Innovations in Healthcare Industries (ICAIIHI), Raipur, India, 2023, pp. 1-6, doi: 10.1109/ICAIIHI57871.2023.10489468.
  14. Lowlesh Yadav and Asha Ambhaikar, Exploring Portable Multi-Modal Telehealth Solutions: A Development Approach. International Journal on Recent and Innovation Trends in Computing and Communication (IJRITCC), vol. 11, no. 10, pp. 873–879, Mar. 2024.11(10), 873–879, DOI: 10.13140/RG.2.2.15400.99846. 
  15. Lowlesh Yadav, Predictive Acknowledgement using TRE System to reduce cost and Bandwidth, March 2019. International Journal of Research in Electronics and Computer Engineering (IJRECE), VOL. 7 ISSUE 1 (JANUARY- MARCH 2019) ISSN: 2393-9028 (PRINT) | ISSN: 2348-2281 (ONLINE).