Privacy-preserving and verifiable data aggregation for Internet of Vehicles

被引:2
作者
Zhou, Fucai [1 ]
Wu, Qiyu [1 ]
Wu, Pengfei [2 ]
Xu, Jian [1 ]
Feng, Da [1 ]
机构
[1] Northeastern Univ, Software Coll, Shenyang 110169, Peoples R China
[2] Natl Univ Singapore, Sch Comp, Singapore 117417, Singapore
基金
中国国家自然科学基金;
关键词
Data aggregation; Privacy-preserving; Verifiable computation; Internet of Vehicles; Inner product; COMPUTATION;
D O I
10.1016/j.comcom.2024.02.022
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of Internet of Vehicles (IoV), organizations or institutions are increasingly interested in aggregating vehicle perception data to perform data analysis. Nevertheless, the existing solutions are difficult to meet the comprehensive requirements of IoV scenario, such as low latency, privacy preservation and rich functions. Additionally, it is more challenging that the aggregation node may return tampered or forged aggregation results for vulnerabilities or ulterior motives. To this end, we propose a Privacy -Preserving and Verifiable Data Aggregation Scheme for IoV (PPVDA), which allows the efficient aggregation for inner product over multi -dimensional data, and the data requester can verify the correctness and integrity of the aggregation results. By exploiting homomorphic MAC and secret sharing techniques, we construct a lightweight and verifiable mechanism for results as well as data privacy protection. We also conduct a comprehensive security analysis of PPVDA under the malicious security model. Moreover, extensive theoretical analyses and experimental evaluations demonstrate that PPVDA performs efficiently while retaining more desired properties. When dealing with 4 x 104 VNs, 3000 RSUs and 500 -dimensional vectors, each EN side only takes about 74.5 ms and the DR side only takes about 3.8 ms, is therefore suitable for practical IoV scenarios.
引用
收藏
页码:198 / 208
页数:11
相关论文
共 50 条
[1]   DQN Algorithm for network resource management in vehicular communication network [J].
Agarwal V. ;
Sharma S. .
International Journal of Information Technology, 2023, 15 (6) :3371-3379
[2]  
Agarwal V., 2023, Int. J. Veh. Inf. Commun. Syst., V8, P16
[3]  
Agarwal V., 2022, Intelligent CyberPhysical Systems Security for Industry 4.0., P239
[4]  
Agarwal V, 2022, New Trends and Applications in Internet of Things (IoT) and Big Data Analytics, P123
[5]  
[Anonymous], 2011, P NETWORK DISTRIBUTE
[6]  
Bogdanov D, 2008, LECT NOTES COMPUT SC, V5283, P192
[7]  
Boneh D, 2011, LECT NOTES COMPUT SC, V6597, P253, DOI 10.1007/978-3-642-19571-6_16
[8]   Non-interactive, Secure Verifiable Aggregation for Decentralized, Privacy-Preserving Learning [J].
Brunetta, Carlo ;
Tsaloli, Georgia ;
Liang, Bei ;
Banegas, Gustavo ;
Mitrokotsa, Aikaterini .
INFORMATION SECURITY AND PRIVACY, ACISP 2021, 2021, 13083 :510-528
[9]  
Chan T. H. H., 2012, Financial Cryptography and Data Security, P200, DOI DOI 10.1007/978-3-642-32946-315
[10]  
Chang EC, 2008, LECT NOTES COMPUT SC, V5283, P223