Key-Based Data Deduplication via Homomorphic NTRU for Internet of Vehicles

被引:9
作者
Huang, Darong [1 ,2 ]
Zhou, Jinfu [2 ]
Mi, Bo [2 ]
Kuang, Fengtian [3 ]
Liu, Yang [2 ]
机构
[1] Anhui Univ, Sch Artificial Intelligence, Hefei 230601, Peoples R China
[2] Chongqing Jiaotong Univ, Sch Informat Sci & Engn, Chongqing 400074, Peoples R China
[3] Chongqing Jiaotong Univ, Coll Math & Stat, Chongqing 400074, Peoples R China
基金
中国国家自然科学基金;
关键词
Cloud computing; Security; Encryption; Privacy; Data privacy; Servers; Transportation; Data duplication; multi-key homomorphic; IoV; privacy security;
D O I
10.1109/TVT.2022.3205627
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In recent years, the gradual improvement of the Internet of Vehicles (IoV) ecosystem has highlighted the commercial potential of IoV. The IoV not only shows excellent performance in terms of road safety and driving comfort but also has great significance in terms of building new models of automobiles and transportation services. In addition, as the foundation of intelligent transportation, IoV has emerged as a research hotspot. However, the IoV has some shortcomings in terms of security, privacy, and storage of massive amounts of data. First, from the viewpoint of security and privacy, the transmission of encrypted data is bound to cause traffic wastage. Second, the massive amount of data stored in the cloud inevitably leads to data redundancy. To address the conflict between semantic security and data redundancy, this study formalizes a secure scheme for duplicated data that can prevent unnecessary storage and traffic on the cloud. This method ensures that an authorized intelligent connected vehicle (ICV) can logically outsource and retrieve data regardless of duplication. Under the premise of semantic security, a two-party deduplication protocol is constructed in terms of the homomorphic number theory research unit (NTRU). Our experimental results show that the proposed scheme is not only secure, but also able to provide complete semantic privacy without any third party. In the context of large-scale real-time IoV, this study not only provides a safe and reliable solution for data deduplication but also optimizes the efficiency of the solution.
引用
收藏
页码:239 / 252
页数:14
相关论文
共 34 条
[1]  
[Anonymous], 2015, INT J INNOV ADV COMP, V4, P6
[2]  
[Anonymous], 2014, SIAM J COMPUT, V43, P831, DOI [10.1109/FOCS.2011.12.[13]T., DOI 10.1109/FOCS.2011.12.[13]T]
[3]  
Bellare Mihir, 2013, Proceedings of the 22nd USENIX Security Symposium. Security '13, P179
[4]   Intelligent Device-to-Device Communication in the Internet of Things [J].
Bello, Oladayo ;
Zeadally, Sherali .
IEEE SYSTEMS JOURNAL, 2016, 10 (03) :1172-1182
[5]  
CAA J, 2018, IEEE CAA J AUTOM SIN, V5, P19, DOI [10.1109/JAS.2017.7510736.[12]Z., DOI 10.1109/JAS.2017.7510736.[12]Z]
[6]   Cognitive Internet of Vehicles [J].
Chen, Min ;
Tian, Yuanwen ;
Fortino, Giancarlo ;
Zhang, Jing ;
Humar, Iztok .
COMPUTER COMMUNICATIONS, 2018, 120 :58-70
[7]   Faster Fully Homomorphic Encryption: Bootstrapping in Less Than 0.1 Seconds [J].
Chillotti, Ilaria ;
Gama, Nicolas ;
Georgieva, Mariya ;
Izabachene, Malika .
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT I, 2016, 10031 :3-33
[8]   A fuzzy control system for energy-efficient wireless devices in the Internet of vehicles [J].
Collotta, Mario ;
Ferrero, Renato ;
Giusto, Edoardo ;
Ghazi Vakili, Mohammad ;
Grecuccio, Jacopo ;
Kong, Xiangjie ;
You, Ilsun .
INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2021, 36 (04) :1595-1618
[9]   An Assessment Method for Traffic State Vulnerability Based on a Cloud Model for Urban Road Network Traffic Systems [J].
Deng, Zhenping ;
Huang, Darong ;
Liu, Jinyu ;
Mi, Bo ;
Liu, Yang .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2021, 22 (11) :7155-7168
[10]   Fuzzy extractors: How to generate strong keys from biometrics and other noisy data [J].
Dodis, Yevgeniy ;
Ostrovsky, Rafail ;
Reyzin, Leonid ;
Smith, Adam .
SIAM JOURNAL ON COMPUTING, 2008, 38 (01) :97-139