SDSS: Secure Data Sharing Scheme for Edge Enabled IoV Networks

被引:14
作者
Liu, Jingwei [1 ]
Li, Yating [2 ]
Sun, Rong [1 ]
Liu, Lei [3 ,4 ]
Zhang, Ning [5 ]
Yu, F. Richard [6 ]
Leung, Victor C. M. [7 ,8 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
[2] Xidian Univ, Shaanxi Key Lab Blockchain & Secure Comp, Xian 710071, Peoples R China
[3] Xidian Univ, Guangzhou Inst Technol, Guangzhou 510555, Peoples R China
[4] Tongji Univ, Key Lab Embedded Syst & Serv Comp, Minist Educ, Shanghai 201804, Peoples R China
[5] Univ Windsor, Dept Elect & Comp Engn, Windsor, ON N9B 3P4, Canada
[6] Carleton Univ, Dept Syst & Comp Engn, Ottawa, ON K1S 5B6, Canada
[7] Shenzhen Univ, Coll Comp Sci & Software Engn, Shenzhen 518060, Peoples R China
[8] Univ British Columbia, Dept Elect & Comp Engn, Vancouver, BC V6T 1Z4, Canada
关键词
Data sharing; access control; multi-authority attribute-based proxy re-encryption; IoV; edge computing; ATTRIBUTE-BASED ENCRYPTION; PROXY RE-ENCRYPTION; ACCESS-CONTROL;
D O I
10.1109/TITS.2023.3287643
中图分类号
TU [建筑科学];
学科分类号
0813 ;
摘要
With the large-scale deployment of the Internet of Vehicles (IoV) and 5G technologies, it is inevitable to share data frequently for superior in-vehicle services. However, due to the dynamically changing and widely distributed Vehicular Ad-hoc Networks (VANETs), data sharing still faces challenges in security, efficiency, and reliability. In this paper, we propose a secure and reliable data-sharing scheme (SDSS) for edge-enabled IoV networks. It assigns multiple attribute authorities to alleviate the management burden and support a large attribute universe catering to the various services in IoV. To enhance efficiency and flexibility, edge computing is introduced for quickly responding to vehicles' requests and assisting resource-constrained vehicle computation. And an online/offline mechanism is designed to further alleviate the computational pressure of sharing data online. In addition, we put forward a cooperative key generation approach to guarantee the security of users' private keys. The security analysis proves that SDSS ensures resistance to collusion attacks and indistinguishability under chosen-ciphertext attacks (IND-CCA). Moreover, it can avoid the single point of failure and resist denial of service (DoS) attacks with the help of multiple distributed edge nodes. The experiment demonstrates SDSS is practicable for IoV data sharing.
引用
收藏
页码:12038 / 12049
页数:12
相关论文
共 34 条
[1]   A general framework for secure sharing of personal health records in cloud system [J].
Au, Man Ho ;
Yuen, Tsz Hon ;
Liu, Joseph K. ;
Susilo, Willy ;
Huang, Xinyi ;
Xiang, Yang ;
Jiang, Zoe L. .
JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2017, 90 :46-62
[2]   Fine-Grained Data Sharing With Enhanced Privacy Protection and Dynamic Users Group Service for the IoV [J].
Bao, Yangyang ;
Qiu, Weidong ;
Cheng, Xiaochun ;
Sun, Jianfei .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2023, 24 (11) :13035-13049
[3]   Enhancing the robustness of object detection via 6G vehicular edge computing [J].
Chen, Chen ;
Yao, Guorun ;
Wang, Chenyu ;
Goudos, Sotirios ;
Wan, Shaohua .
DIGITAL COMMUNICATIONS AND NETWORKS, 2022, 8 (06) :923-931
[4]   An Intelligent Caching Strategy Considering Time-Space Characteristics in Vehicular Named Data Networks [J].
Chen, Chen ;
Jiang, Jiange ;
Fu, Rufei ;
Chen, Lanlan ;
Li, Cong ;
Wan, Shaohua .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2022, 23 (10) :19655-19667
[5]  
Chen JW, 2014, IEEE ICC, P3782, DOI 10.1109/ICC.2014.6883910
[6]   Efficient Decentralized Attribute Based Access Control for Mobile Clouds [J].
De, Sourya Joyee ;
Ruj, Sushmita .
IEEE TRANSACTIONS ON CLOUD COMPUTING, 2020, 8 (01) :124-137
[7]   Flexible attribute-based proxy re-encryption for efficient data sharing [J].
Deng, Hua ;
Qin, Zheng ;
Wu, Qianhong ;
Guan, Zhenyu ;
Zhou, Yunya .
INFORMATION SCIENCES, 2020, 511 :94-113
[8]   Attribute-Based Encryption With Parallel Outsourced Decryption for Edge Intelligent IoV [J].
Feng, Chaosheng ;
Yu, Keping ;
Aloqaily, Moayad ;
Alazab, Mamoun ;
Lv, Zhihan ;
Mumtaz, Shahid .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (11) :13784-13795
[9]   Blockchain-Based Digital Rights Management Scheme via Multiauthority Ciphertext-Policy Attribute-Based Encryption and Proxy Re-Encryption [J].
Gao, Juntao ;
Yu, Haiyong ;
Zhu, Xiuqin ;
Li, Xuelian .
IEEE SYSTEMS JOURNAL, 2021, 15 (04) :5233-5244
[10]   A Verifiable and Fair Attribute-Based Proxy Re-Encryption Scheme for Data Sharing in Clouds [J].
Ge, Chunpeng ;
Susilo, Willy ;
Baek, Joonsang ;
Liu, Zhe ;
Xia, Jinyue ;
Fang, Liming .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (05) :2907-2919