Secure, efficient and revocable data sharing scheme for vehicular fogs

被引:23
作者
Fan, Kai [1 ]
Wang, Junxiong [1 ]
Wang, Xin [1 ]
Li, Hui [1 ]
Yang, Yintang [2 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Shaanxi, Peoples R China
[2] Xidian Univ, Minist Educ Wide Band Gap Semicon Mat & Devices, Key Lab, Xian 710071, Shaanxi, Peoples R China
基金
国家高技术研究发展计划(863计划); 中国国家自然科学基金;
关键词
Vehicular fogs; Attribute-based encryption; Revocation; Security; Efficiency;
D O I
10.1007/s12083-017-0562-8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid development of vehicular networks, the problem of data sharing in vehicular networks has attached much attention. However, existing data access control schemes in cloud computing cannot be applied to the scenario of vehicular networks, because cloud computing paradigm cannot satisfy the rigorous requirement posed by latency-sensitive mobile application. Fog Computing is a paradigm that extends Cloud computing and services to the edge of the network. The vehicular fog is the ideal platform to achieve data sharing in vehicular networks. In this paper, we propose a revocable data sharing scheme for vehicular fogs. We construct a new multi-authority ciphertext policy attribute-based encryption (CP-ABE) scheme with efficient decryption to realize data access control in vehicular network system, and design an efficient user and attribute revocation method for it. The analysis and the simulation results show that our scheme is secure and highly efficient.
引用
收藏
页码:766 / 777
页数:12
相关论文
共 32 条
[11]  
Chase M, 2007, LECT NOTES COMPUT SC, V4392, P515
[12]   QOE-ENSURED PRICE COMPETITION MODEL FOR EMERGING MOBILE NETWORKS [J].
Dong, Mianxiong ;
Liu, Xiao ;
Qian, Zhuzhong ;
Liu, Anfeng ;
Wang, Tao .
IEEE WIRELESS COMMUNICATIONS, 2015, 22 (04) :50-57
[13]   Mobile cloud computing: A survey [J].
Fernando, Niroshinie ;
Loke, Seng W. ;
Rahayu, Wenny .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2013, 29 (01) :84-106
[14]   Vehicular networks and the future of the mobile internet [J].
Gerla, Mario ;
Kleinrock, Leonard .
COMPUTER NETWORKS, 2011, 55 (02) :457-469
[15]   Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems [J].
Hur, Junbeom ;
Noh, Dong Kun .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2011, 22 (07) :1214-1221
[16]   Decentralizing Attribute-Based Encryption [J].
Lewko, Allison ;
Waters, Brent .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2011, 2011, 6632 :568-588
[17]  
Liang Xiaohui., 2010, CIPHERTEXT POLICY AT
[18]  
Luan TH, 2013, IEEE INFOCOM SER, P2562
[19]   A Security Assessment Mechanism for Software-Defined Networking-Based Mobile Networks [J].
Luo, Shibo ;
Dong, Mianxiong ;
Ota, Kaoru ;
Wu, Jun ;
Li, Jianhua .
SENSORS, 2015, 15 (12) :31843-31858
[20]  
Lynn B., Pbc library the pairing-based cryptography library