Secure, efficient and revocable data sharing scheme for vehicular fogs

被引:23
作者
Fan, Kai [1 ]
Wang, Junxiong [1 ]
Wang, Xin [1 ]
Li, Hui [1 ]
Yang, Yintang [2 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Shaanxi, Peoples R China
[2] Xidian Univ, Minist Educ Wide Band Gap Semicon Mat & Devices, Key Lab, Xian 710071, Shaanxi, Peoples R China
基金
国家高技术研究发展计划(863计划); 中国国家自然科学基金;
关键词
Vehicular fogs; Attribute-based encryption; Revocation; Security; Efficiency;
D O I
10.1007/s12083-017-0562-8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid development of vehicular networks, the problem of data sharing in vehicular networks has attached much attention. However, existing data access control schemes in cloud computing cannot be applied to the scenario of vehicular networks, because cloud computing paradigm cannot satisfy the rigorous requirement posed by latency-sensitive mobile application. Fog Computing is a paradigm that extends Cloud computing and services to the edge of the network. The vehicular fog is the ideal platform to achieve data sharing in vehicular networks. In this paper, we propose a revocable data sharing scheme for vehicular fogs. We construct a new multi-authority ciphertext policy attribute-based encryption (CP-ABE) scheme with efficient decryption to realize data access control in vehicular network system, and design an efficient user and attribute revocation method for it. The analysis and the simulation results show that our scheme is secure and highly efficient.
引用
收藏
页码:766 / 777
页数:12
相关论文
共 32 条
[1]  
Aazam M, 2015, 2015 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATION WORKSHOPS (PERCOM WORKSHOPS), P518, DOI 10.1109/PERCOMW.2015.7134091
[2]   Fog Computing and Smart Gateway Based Communication for Cloud of Things [J].
Aazam, Mohammad ;
Huh, Eui-Nam .
2014 INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD (FICLOUD), 2014, :464-470
[3]   Charm: a framework for rapidly prototyping cryptosystems [J].
Akinyele, Joseph A. ;
Garman, Christina ;
Miers, Ian ;
Pagano, Matthew W. ;
Rushanan, Michael ;
Green, Matthew ;
Rubin, Aviel D. .
JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2013, 3 (02) :111-128
[4]  
[Anonymous], 2013, Proceedings of the Second ACM SIGCOMM Workshop on Mobile Cloud Computing, MCC '13, DOI [10.1145/2491266.2491270, DOI 10.1145/2491266.2491270]
[5]  
Anupriya T., 2013, NEXT GEN INF TECHN S, P496
[6]  
Beimel A., 1996, SECURE SCHEMES SECRE, P22
[7]  
Bonomi F., 2012, P MCCWORKSHOP MOB CL, P13, DOI 10.1145/2342509.2342513
[8]  
Bonomi Flavio., 2011, 8 ACM INT WORKSHOP V, P13
[9]  
Boyen X, 2007, LECT NOTES COMPUT SC, V4450, P1
[10]   Footprint: Detecting Sybil Attacks in Urban Vehicular Networks [J].
Chang, Shan ;
Qi, Yong ;
Zhu, Hongzi ;
Zhao, Jizhong ;
Shen, Xuemin .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2012, 23 (06) :1103-1114