Toward Achieving Fine-Grained Access Control of Data in Connected and Autonomous Vehicles

被引:21
作者
Cui, Jie [1 ,2 ]
Chen, Xuelian [1 ,2 ]
Zhang, Jing [1 ,2 ]
Zhang, Qingyang [1 ,2 ]
Zhong, Hong [1 ,2 ]
机构
[1] Anhui Univ, Key Lab Intelligent Comp & Signal Proc, Minist Educ, Sch Comp Sci & Technol,Anhui Engn Lab IoT Secur T, Hefei 230039, Peoples R China
[2] Anhui Univ, Inst Phys Sci & Informat Technol, Hefei 230039, Peoples R China
基金
中国国家自然科学基金;
关键词
Autonomous vehicles; Encryption; Privacy; Access control; Videos; Roads; Internet of Things; attribute-based encryption (ABE); connected and autonomous vehicles (CAVs); security and privacy; ATTRIBUTE-BASED ENCRYPTION; SECURITY; SERVICE; SCHEME; SYSTEM;
D O I
10.1109/JIOT.2020.3041860
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A connected and autonomous vehicle (CAV) is often fitted with a large number of onboard sensors and applications to support autonomous driving functions. Based on the current research, little work on applications' access to in-vehicle data has been done. Furthermore, most existing autonomous driving operating systems lack authentication and encryption units. As such, applications can excessively obtain confidential information, such as vehicle location and owner preferences and even upload it to the cloud, threatening the security of the vehicle and the privacy of the owner. In this study, we propose a fine-grained access control scheme to restrict applications' access to data in CAVs (FGAC-inCAVs). First, we present a system model composed of the following elements: a trusted third party (TTP), which is a fully trusted authority; perception components like sensors, which can capture the road information (pictures, videos, etc.); and multiple applications. Then, a fast attribute-based encryption (ABE) is presented, and security analysis also shows it is secure against selective and chosen-plaintext attacks. Furthermore, we propose a key update scheme based on the Chinese remainder theorem (CRT). Finally, the theoretical analysis and simulation experiments demonstrate its feasibility and efficiency.
引用
收藏
页码:7925 / 7937
页数:13
相关论文
共 49 条
[1]   FAME: Fast Attribute-based Message Encryption [J].
Agrawal, Shashank ;
Chase, Melissa .
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, :665-682
[2]   Charm: a framework for rapidly prototyping cryptosystems [J].
Akinyele, Joseph A. ;
Garman, Christina ;
Miers, Ian ;
Pagano, Matthew W. ;
Rushanan, Michael ;
Green, Matthew ;
Rubin, Aviel D. .
JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2013, 3 (02) :111-128
[3]  
Alazzawi Murtadha A., 2019, 2019 IEEE 21st International Conference on High Performance Computing and Communications
[4]  
IEEE 17th International Conference on Smart City
[5]  
IEEE 5th International Conference on Data Science and Systems (HPCC/SmartCity/DSS). Proceedings, P1541, DOI 10.1109/HPCC/SmartCity/DSS.2019.00212
[6]  
Beimel A., 1996, SECURE SCHEMES SECRE
[7]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[8]  
Boneh D, 2005, LECT NOTES COMPUT SC, V3621, P258
[9]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P223
[10]   Extensible Conditional Privacy Protection Authentication Scheme for Secure Vehicular Networks in a Multi-Cloud Environment [J].
Cui, Jie ;
Zhang, Xiaoyu ;
Zhong, Hong ;
Zhang, Jing ;
Liu, Lu .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 :1654-1667