An efficient privacy-preserving data query and dissemination scheme in vehicular cloud

被引:5
作者
Hu, Peng [1 ]
Wang, Yongli [1 ]
Xiao, Gang [2 ]
Zhou, Junlong [1 ]
Gong, Bei [3 ]
Wang, Yongjian [4 ]
机构
[1] Nanjing Univ Sci & Technol, Sch Comp Sci & Engn, Nanjing 210094, Peoples R China
[2] Sci & Technol Complex Syst Simulat Lab, Beijing 100101, Peoples R China
[3] Beijing Univ Technol, Coll Comp Sci, Beijing 100124, Peoples R China
[4] Natl Comp Network Emergency Response Tech Team, Coordinat Ctr China, Beijing 100029, Peoples R China
基金
中国国家自然科学基金;
关键词
Vehicular cloud; Data query; Data dissemination; Privacy preserving; DATA AGGREGATION; LIGHTWEIGHT; MANAGEMENT; DESIGN; SECURE;
D O I
10.1016/j.pmcj.2020.101152
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Vehicular Cloud (VC) improves the utilization of idle resources in vehicles by providing data services for other vehicles or entities such as data computing and storage. However, the vehicles in the VC still face privacy and security issues, especially when querying data from the road side unit. To this end, in this paper, we propose an efficient privacy-preserving data query and dissemination scheme, named EPDQD, for VC. More precisely, by using the lightweight homomorphic encryption technique and the Chinese Remainder Theorem, the road side unit can aggregate and recover multiple data query requests without knowing the linkability of the data query request and its origin vehicle. EPDQD also adopts the message authentication code and non-interactive secure session keys to achieve the authentication of data query requests and the integrity of data transmission. Detailed security analysis indicates that EPDQD can resist various security threats. In addition, the performance evaluations demonstrate that EPDQD can significantly reduce computation complexity and communication overhead. (c) 2020 Elsevier B.V. All rights reserved.
引用
收藏
页数:13
相关论文
共 31 条
[1]  
[Anonymous], 2010, IEEE Standard 802.11
[2]   Design and Evaluation of a Collaborative System for Content Diffusion and Retrieval in Vehicular Networks [J].
Barberis, Claudia ;
Malnati, Giovanni .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2011, 57 (01) :105-112
[3]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[4]   Efficient and Provably Secure Aggregation of Encrypted Data in Wireless Sensor Networks [J].
Castelluccia, Claude ;
Chan, Aldar C-F ;
Mykletun, Einar ;
Tsudik, Gene .
ACM TRANSACTIONS ON SENSOR NETWORKS, 2009, 5 (03) :1-36
[5]   VSPN: VANET-Based Secure and Privacy-Preserving Navigation [J].
Chim, T. W. ;
Yiu, S. M. ;
Hui, Lucas C. K. ;
Li, Victor O. K. .
IEEE TRANSACTIONS ON COMPUTERS, 2014, 63 (02) :510-524
[6]  
De Caro A, 2011, IEEE SYMP COMP COMMU
[7]  
Dingyi P., 1996, Chinese remainder theorem: applications in computing, coding, cryptography
[8]  
Dupont R., 2002, IACR CRYPTOL EPRINT, V2002, P136
[9]   NPP: A New Privacy-Aware Public Auditing Scheme for Cloud Data Sharing with Group Users [J].
Fu, Anmin ;
Yu, Shui ;
Zhang, Yuqing ;
Wang, Huaqun ;
Huang, Chanying .
IEEE TRANSACTIONS ON BIG DATA, 2022, 8 (01) :14-24
[10]   Lightweight and Privacy-Friendly Spatial Data Aggregation for Secure Power Supply and Demand Management in Smart Grids [J].
Gope, Prosanta ;
Sikdar, Biplab .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (06) :1554-1566