SDSS: Secure Data Sharing Scheme for Edge Enabled IoV Networks

被引:14
作者
Liu, Jingwei [1 ]
Li, Yating [2 ]
Sun, Rong [1 ]
Liu, Lei [3 ,4 ]
Zhang, Ning [5 ]
Yu, F. Richard [6 ]
Leung, Victor C. M. [7 ,8 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
[2] Xidian Univ, Shaanxi Key Lab Blockchain & Secure Comp, Xian 710071, Peoples R China
[3] Xidian Univ, Guangzhou Inst Technol, Guangzhou 510555, Peoples R China
[4] Tongji Univ, Key Lab Embedded Syst & Serv Comp, Minist Educ, Shanghai 201804, Peoples R China
[5] Univ Windsor, Dept Elect & Comp Engn, Windsor, ON N9B 3P4, Canada
[6] Carleton Univ, Dept Syst & Comp Engn, Ottawa, ON K1S 5B6, Canada
[7] Shenzhen Univ, Coll Comp Sci & Software Engn, Shenzhen 518060, Peoples R China
[8] Univ British Columbia, Dept Elect & Comp Engn, Vancouver, BC V6T 1Z4, Canada
关键词
Data sharing; access control; multi-authority attribute-based proxy re-encryption; IoV; edge computing; ATTRIBUTE-BASED ENCRYPTION; PROXY RE-ENCRYPTION; ACCESS-CONTROL;
D O I
10.1109/TITS.2023.3287643
中图分类号
TU [建筑科学];
学科分类号
0813 ;
摘要
With the large-scale deployment of the Internet of Vehicles (IoV) and 5G technologies, it is inevitable to share data frequently for superior in-vehicle services. However, due to the dynamically changing and widely distributed Vehicular Ad-hoc Networks (VANETs), data sharing still faces challenges in security, efficiency, and reliability. In this paper, we propose a secure and reliable data-sharing scheme (SDSS) for edge-enabled IoV networks. It assigns multiple attribute authorities to alleviate the management burden and support a large attribute universe catering to the various services in IoV. To enhance efficiency and flexibility, edge computing is introduced for quickly responding to vehicles' requests and assisting resource-constrained vehicle computation. And an online/offline mechanism is designed to further alleviate the computational pressure of sharing data online. In addition, we put forward a cooperative key generation approach to guarantee the security of users' private keys. The security analysis proves that SDSS ensures resistance to collusion attacks and indistinguishability under chosen-ciphertext attacks (IND-CCA). Moreover, it can avoid the single point of failure and resist denial of service (DoS) attacks with the help of multiple distributed edge nodes. The experiment demonstrates SDSS is practicable for IoV data sharing.
引用
收藏
页码:12038 / 12049
页数:12
相关论文
共 34 条
[21]   FedCPF: An Efficient-Communication Federated Learning Approach for Vehicular Edge Computing in 6G Communication Networks [J].
Liu, Su ;
Yu, Jiong ;
Deng, Xiaoheng ;
Wan, Shaohua .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2022, 23 (02) :1616-1629
[22]   Security-Aware Information Dissemination With Fine-Grained Access Control in Cooperative Multi-RSU of VANETs [J].
Liu, Xuejiao ;
Chen, Wei ;
Xia, Yingjie .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2022, 23 (03) :2170-2179
[23]   Practical attribute-based encryption: Outsourcing decryption, attribute revocation and policy updating [J].
Liu, Zechao ;
Jiang, Zoe L. ;
Wang, Xuan ;
Yiu, S. M. .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 108 :112-123
[24]  
Luo S, 2010, LECT NOTES COMPUT SC, V6476, P401, DOI 10.1007/978-3-642-17650-0_28
[25]   ON MULTI-AUTHORITY CIPHERTEXT-POLICY ATTRIBUTE-BASED ENCRYPTION [J].
Mueller, Sascha ;
Katzenbeisser, Stefan ;
Eckert, Claudia .
BULLETIN OF THE KOREAN MATHEMATICAL SOCIETY, 2009, 46 (04) :803-819
[26]   CryptCloud+: Secure and Expressive Data Access Control for Cloud Storage [J].
Ning, Jianting ;
Cao, Zhenfu ;
Dong, Xiaolei ;
Liang, Kaitai ;
Wei, Lifei ;
Choo, Kim-Kwang Raymond .
IEEE TRANSACTIONS ON SERVICES COMPUTING, 2021, 14 (01) :111-124
[27]   Auditable σ-Time Outsourced Attribute-Based Encryption for Access Control in Cloud Computing [J].
Ning, Jianting ;
Cao, Zhenfu ;
Dong, Xiaolei ;
Liang, Kaitai ;
Ma, Hui ;
Wei, Lifei .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (01) :94-105
[28]   Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption [J].
Rouselakis, Yannis ;
Waters, Brent .
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY (FC 2015), 2015, 8975 :315-332
[29]  
Vohra K, 2018, PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), P307, DOI 10.1109/ICICCT.2018.8473045
[30]   Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization [J].
Waters, Brent .
PUBLIC KEY CRYPTOGRAPHY - PKC 2011, 2011, 6571 :53-70