Key-Based Data Deduplication via Homomorphic NTRU for Internet of Vehicles

被引:9
作者
Huang, Darong [1 ,2 ]
Zhou, Jinfu [2 ]
Mi, Bo [2 ]
Kuang, Fengtian [3 ]
Liu, Yang [2 ]
机构
[1] Anhui Univ, Sch Artificial Intelligence, Hefei 230601, Peoples R China
[2] Chongqing Jiaotong Univ, Sch Informat Sci & Engn, Chongqing 400074, Peoples R China
[3] Chongqing Jiaotong Univ, Coll Math & Stat, Chongqing 400074, Peoples R China
基金
中国国家自然科学基金;
关键词
Cloud computing; Security; Encryption; Privacy; Data privacy; Servers; Transportation; Data duplication; multi-key homomorphic; IoV; privacy security;
D O I
10.1109/TVT.2022.3205627
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In recent years, the gradual improvement of the Internet of Vehicles (IoV) ecosystem has highlighted the commercial potential of IoV. The IoV not only shows excellent performance in terms of road safety and driving comfort but also has great significance in terms of building new models of automobiles and transportation services. In addition, as the foundation of intelligent transportation, IoV has emerged as a research hotspot. However, the IoV has some shortcomings in terms of security, privacy, and storage of massive amounts of data. First, from the viewpoint of security and privacy, the transmission of encrypted data is bound to cause traffic wastage. Second, the massive amount of data stored in the cloud inevitably leads to data redundancy. To address the conflict between semantic security and data redundancy, this study formalizes a secure scheme for duplicated data that can prevent unnecessary storage and traffic on the cloud. This method ensures that an authorized intelligent connected vehicle (ICV) can logically outsource and retrieve data regardless of duplication. Under the premise of semantic security, a two-party deduplication protocol is constructed in terms of the homomorphic number theory research unit (NTRU). Our experimental results show that the proposed scheme is not only secure, but also able to provide complete semantic privacy without any third party. In the context of large-scale real-time IoV, this study not only provides a safe and reliable solution for data deduplication but also optimizes the efficiency of the solution.
引用
收藏
页码:239 / 252
页数:14
相关论文
共 34 条
[21]   The Cognitive Internet of Vehicles for Autonomous Driving [J].
Lu, Huimin ;
Liu, Qiang ;
Tian, Daxin ;
Li, Yujie ;
Kim, Hyoungseop ;
Serikawa, Seiichi .
IEEE NETWORK, 2019, 33 (03) :65-73
[22]   Privacy-preserving federated learning based on multi-key homomorphic encryption [J].
Ma, Jing ;
Naas, Si-Ahmed ;
Sigg, Stephan ;
Lyu, Xixiang .
INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2022, 37 (09) :5880-5901
[23]   Secure multi-server-aided data deduplication in cloud computing [J].
Miao, Meixia ;
Wang, Jianfeng ;
Li, Hui ;
Chen, Xiaofeng .
PERVASIVE AND MOBILE COMPUTING, 2015, 24 :129-137
[24]  
Miguel R, 2015, PROCEEDINGS OF THE 2015 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, ARCHITECTURE AND STORAGE (NAS), P215, DOI 10.1109/NAS.2015.7255226
[25]  
Mihir K., 2013, P EUROCRYPT ATH GREE, P516
[26]   Fully Homomorphic Encryption Using Hidden Ideal Lattice [J].
Plantard, Thomas ;
Susilo, Willy ;
Zhang, Zhenfei .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (12) :2127-2137
[27]   A Survey of Secure Data Deduplication Schemes for Cloud Storage Systems [J].
Shin, Youngjoo ;
Koo, Dongyoung ;
Hur, Junbeom .
ACM COMPUTING SURVEYS, 2017, 49 (04)
[28]   A tutorial survey on vehicular communication state of the art, and future research directions [J].
Singh, Pranav Kumar ;
Nandi, Sunit Kumar ;
Nandi, Sukumar .
VEHICULAR COMMUNICATIONS, 2019, 18
[29]  
Stehlé D, 2011, LECT NOTES COMPUT SC, V6632, P27, DOI 10.1007/978-3-642-20465-4_4
[30]   An Efficient and Secure Deduplication Scheme Based on Rabin Fingerprinting in Cloud Storage [J].
Su, Haonan ;
Zheng, Dong ;
Zhang, Yinghui .
2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 1, 2017, :833-836