scispace - formally typeset
Journal ArticleDOI

Privacy-Preserving Cloud-Based Road Condition Monitoring With Source Authentication in VANETs

Reads0
Chats0
TLDR
This paper investigates the cloud-based road condition monitoring (RCoM) scenario, where the authority needs to monitor real-time road conditions with the help of a cloud server so that it could make sound responses to emergency cases timely.
Abstract
The connected vehicular ad hoc network (VANET) and cloud computing technology allows entities in VANET to enjoy the advantageous storage and computing services offered by some cloud service provider. However, the advantages do not come free, since their combination brings many new security and privacy requirements for VANET applications. In this paper, we investigate the cloud-based road condition monitoring (RCoM) scenario, where the authority needs to monitor real-time road conditions with the help of a cloud server so that it could make sound responses to emergency cases timely. When some bad road condition is detected, e.g., some geologic hazard or accident happens, vehicles on site are able to report such information to a cloud server engaged by the authority. We focus on addressing three key issues in RCoM. First, the vehicles have to be authorized by some roadside unit before generating a road condition report in the domain and uploading it to the cloud server. Second, to guarantee the privacy against the cloud server, the road condition information should be reported in ciphertext format, which requires that the cloud server should be able to distinguish the reported data from different vehicles in ciphertext format for the same place without compromising their confidentiality. Third, the cloud server and authority should be able to validate the report source, i.e., to check whether the road conditions are reported by legitimate vehicles. To address these issues, we present an efficient RCoM scheme, analyze its efficiency theoretically, and demonstrate the practicality through experiments.

read more

Citations
More filters
Posted Content

PORs: Proofs of Retrievability for Large Files

TL;DR: This paper defines and explores proofs of retrievability (PORs), a POR scheme that enables an archive or back-up service to produce a concise proof that a user can retrieve a target file F, that is, that the archive retains and reliably transmits file data sufficient for the user to recover F in its entirety.
Journal ArticleDOI

Evolutionary V2X Technologies Toward the Internet of Vehicles: Challenges and Opportunities

TL;DR: A thorough survey on the historical process and status quo of V2X technologies, as well as demonstration of emerging technology developing directions toward IoV can provide beneficial insights and inspirations for both academia and the IoV industry.
Journal ArticleDOI

B-TSCA: Blockchain Assisted Trustworthiness Scalable Computation for V2I Authentication in VANETs

TL;DR: The proposed blockchain assisted trustworthiness scalable computation based V2I authentication (B-TSCA) scheme achieves rapid re-authentication of vehicles through secure ownership transfer between infrastructures through the use of blockchian technology.
Journal ArticleDOI

Secure Data Sharing and Customized Services for Intelligent Transportation Based on a Consortium Blockchain

TL;DR: Security analysis and performance evaluation demonstrate that the ciphertext-policy attribute-based proxy re-encryption algorithm has the function of keyword searching by dividing the key into an attribute key and a search key, which not only solves the problem that proxyReEncryption algorithm cannot retrieve data, but also realizes data sharing and data forwarding.
Journal ArticleDOI

CPPA-D: Efficient Conditional Privacy-Preserving Authentication Scheme With Double-Insurance in VANETs

TL;DR: A conditional privacy-preserving authentication scheme with double-insurance supporting batch verification (CPPA-D) for VANETs, which is constructed in cyclic groups on elliptic curves, which can resist traditional attacks and solve the security problems caused by private key stolen in the TPD under side channel attack.
References
More filters
Journal ArticleDOI

A view of cloud computing

TL;DR: The clouds are clearing the clouds away from the true potential and obstacles posed by this computing capability.
Proceedings ArticleDOI

Fully homomorphic encryption using ideal lattices

TL;DR: This work proposes a fully homomorphic encryption scheme that allows one to evaluate circuits over encrypted data without being able to decrypt, and describes a public key encryption scheme using ideal lattices that is almost bootstrappable.
Proceedings ArticleDOI

Provable data possession at untrusted stores

TL;DR: The provable data possession (PDP) model as discussed by the authors allows a client that has stored data at an untrusted server to verify that the server possesses the original data without retrieving it.
Posted Content

Provable Data Possession at Untrusted Stores.

TL;DR: Ateniese et al. as discussed by the authors introduced the provable data possession (PDP) model, which allows a client that has stored data at an untrusted server to verify that the server possesses the original data without retrieving it.
Posted Content

PORs: Proofs of Retrievability for Large Files

TL;DR: This paper defines and explores proofs of retrievability (PORs), a POR scheme that enables an archive or back-up service to produce a concise proof that a user can retrieve a target file F, that is, that the archive retains and reliably transmits file data sufficient for the user to recover F in its entirety.
Related Papers (5)