SE-VFC: Secure and Efficient Outsourcing Computing in Vehicular Fog Computing

被引:22
作者
Liu, Xuejiao [1 ]
Chen, Wei [1 ,2 ]
Xia, Yingjie [3 ,4 ]
Yang, Chenghan [1 ]
机构
[1] Hangzhou Normal Univ, Sch Informat Sci & Engn, Hangzhou 311121, Peoples R China
[2] Hundsun Technol Inc, Hangzhou 310053, Peoples R China
[3] Zhejiang Univ, Coll Comp Sci & Technol, Hangzhou 310058, Peoples R China
[4] Hangzhou Yuantiao Technol Co, Hangzhou 311100, Peoples R China
来源
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT | 2021年 / 18卷 / 03期
基金
中国国家自然科学基金;
关键词
Outsourcing; Security; Task analysis; Edge computing; Encryption; Resource management; Servers; Outsourcing computing; vehicular fog computing; Boneh-Lynn-Shacham (BLS) signature; attribute-based encryption (ABE); RESOURCE; DISSEMINATION; ARCHITECTURE; DEPLOYMENT; MODEL;
D O I
10.1109/TNSM.2021.3080138
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Fog-aided computing is an emerging computing paradigm developed for providing various computation services to end users in vehicular fog computing. However, fog vehicles may be untrusted, and results from malicious operations may cause serious accidents. Therefore, we propose a secure and efficient outsourcing computing scheme in vehicular fog computing (SE-VFC), which performs outsourcing computing through fog vehicles with computing resources, and combines lightweight Boneh-Lynn-Shacham (BLS) signature and group signature to achieve batch anonymous authentication of fog vehicles while protecting their privacy in multiple outsourcing tasks. We also verify the correctness of the outsourcing computing results. Security analysis shows that our scheme can authenticate the fog vehicles in the outsourcing computation and preserve their privacy, it can also trace the malicious ones if necessary. Compared with the existing schemes, our scheme has relatively low communication and computation overhead, thus it is quite efficient for batch authentication especially in multiple computing tasks. Extensive simulation results verify the effectiveness and practicality of our proposed scheme in vehicular fog computing.
引用
收藏
页码:3389 / 3399
页数:11
相关论文
共 43 条
[1]   Efficient data dissemination in cooperative multi-RSU Vehicular Ad Hoc Networks (VANETs) [J].
Alia, G. G. Md. Nawaz ;
Chong, Peter Han Joo ;
Samantha, Syeda Khairunnesa ;
Chan, Edward .
JOURNAL OF SYSTEMS AND SOFTWARE, 2016, 117 :508-527
[2]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[3]   Short signatures from the Weil pairing [J].
Boneh, D ;
Lynn, B ;
Shacham, H .
JOURNAL OF CRYPTOLOGY, 2004, 17 (04) :297-319
[4]  
Bouabdellah M, 2016, 2016 INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION SYSTEMS AND INFORMATION SECURITY (ACOSIS), P175
[5]   A New Vehicular Fog Computing Architecture for Cooperative Sensing of Autonomous Driving [J].
Du, Hao ;
Leng, Supeng ;
Wu, Fan ;
Chen, Xiaosha ;
Mao, Sun .
IEEE ACCESS, 2020, 8 :10997-11006
[6]  
Green Matthew., 2011, USENIX SECURITY S, V2011
[7]  
Hoque M. A., 2019, P IEEE SOUTHEASTCON, P105
[8]   Vehicular Fog Computing: A Viewpoint of Vehicles as the Infrastructures [J].
Hou, Xueshi ;
Li, Yong ;
Chen, Min ;
Wu, Di ;
Jin, Depeng ;
Chen, Sheng .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2016, 65 (06) :3860-3873
[9]   Vehicular Fog Computing: Architecture, Use Case, and Security and Forensic Challenges [J].
Huang, Cheng ;
Lu, Rongxing ;
Choo, Kim-Kwang Raymond .
IEEE COMMUNICATIONS MAGAZINE, 2017, 55 (11) :105-111
[10]   ASPE: attribute-based secure policy enforcement in vehicular ad hoc networks [J].
Huang, Dijiang ;
Verma, Mayank .
AD HOC NETWORKS, 2009, 7 (08) :1526-1535