SearchCom: Vehicular Cloud-based Secure and Energy-Efficient Communication and Searching System for Smart Transportation

被引:3
作者
Limbasiya, Trupil [1 ]
Das, Debasis [2 ]
机构
[1] BITS Pilani, Goa Campus, Sancoale, Goa, India
[2] Indian Inst Technol IIT, Jodhpur, Rajasthan, India
来源
PROCEEDINGS OF THE 21ST INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING AND NETWORKING (ICDCN 2020) | 2020年
关键词
Communication; Data; Search; Security; Storage; AUTHENTICATION; SCHEME;
D O I
10.1145/3369740.3369772
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The cutting-edge technologies have improved the journey of vehicle users on the road using different vehicular-based structures (vehicular ad-hoc networks (VANETs), vehicular cloud computing (VCC), and Internet of Vehicles (IoV)). Vehicles generally transmit different road-side data (e.g., traffic, details of nearby vehicles, emergency/environment, location, etc.) from/to another end in a public environment. Hence, three key challenges on data are as follows; (1) secure and effective data storage in the vehicular cloud (VC) (2) efficient data extraction from the VC and (3) reliable data transmission between two entities. Some general methods are to search/store data from/in the cloud, but these techniques are only for data storage and extraction. Next, various communication schemes are proposed for VANETs, VCC, and IoV, but they need high computational resources, and these schemes are vulnerable to multiple security attacks. We find that there is no system, which provides all these data operations (storage, searching, and communication) for vehicle users. In this paper, we propose a dependable system (named as SearchCom) for vehicle applicants to overcome above-mentioned challenges and provide operational facility. The SearchCom is analyzed to verify its security strengths against various security attacks and its performance results in execution time, memory requirement, communication overhead, searching, and energy consumption.
引用
收藏
页数:10
相关论文
共 36 条
  • [1] A comprehensive survey on vehicular Ad Hoc network
    Al-Sultan, Saif
    Al-Doori, Moath M.
    Al-Bayatti, Ali H.
    Zedan, Hussien
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2014, 37 : 380 - 392
  • [2] [Anonymous], 2012, P ACM SIGSAC C COMP
  • [3] Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation
    Cash, David
    Jaeger, Joseph
    Jarecki, Stanislaw
    Jutla, Charanjit
    Krawczyk, Hugo
    Rosu, Marcel-Catalin
    Steine, Michael
    [J]. 21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,
  • [4] Searchable symmetric encryption: Improved definitions and efficient constructions
    Curtmola, Reza
    Garay, Juan
    Kamara, Seny
    Ostrovsky, Rafail
    [J]. JOURNAL OF COMPUTER SECURITY, 2011, 19 (05) : 895 - 934
  • [5] Gerla M., 2012, 2012 The 11th Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net), P152, DOI 10.1109/MedHocNet.2012.6257116
  • [6] Mobility Models for Vehicular Ad Hoc Networks: A Survey and Taxonomy
    Haerri, Jerome
    Filali, Fethi
    Bonnet, Christian
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2009, 11 (04) : 19 - 41
  • [7] An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks
    He, Debiao
    Zeadally, Sherali
    Xu, Baowen
    Huang, Xinyi
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (12) : 2681 - 2691
  • [8] Developing Vehicular Data Cloud Services in the IoT Environment
    He, Wu
    Yan, Gongjun
    Xu, Li Da
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2014, 10 (02) : 1587 - 1595
  • [9] The security and privacy of smart vehicles
    Hubaux, JP
    Capkun, S
    Luo, J
    [J]. IEEE SECURITY & PRIVACY, 2004, 2 (03) : 49 - 55
  • [10] Integrated Authentication and Key Agreement Framework for Vehicular Cloud Computing
    Jiang, Qi
    Ni, Jianbing
    Ma, Jianfeng
    Yang, Li
    Shen, Xuemin
    [J]. IEEE NETWORK, 2018, 32 (03): : 28 - 35