SEMD: Secure and efficient message dissemination with policy enforcement in VANET☆
TLDR
A secure and efficient message dissemination scheme (SEMD) with policy enforcement in VANET is proposed, and an outsourcing decryption of ciphertext-policy attribute-based encryption (CP-ABE) to provide differentiated access control services, which makes the vehicles delegate most of the decryption computation to nearest roadside unit (RSU).About:
This article is published in Journal of Computer and System Sciences.The article was published on 2016-12-01 and is currently open access. It has received 39 citations till now. The article focuses on the topics: Encryption & Vehicular ad hoc network.read more
Citations
More filters
Journal ArticleDOI
A comparative classification of information dissemination approaches in vehicular ad hoc networks from distinctive viewpoints: A survey
TL;DR: A comprehensive survey on information dissemination in vehicular networks by focusing on some critical issues such as security and privacy, adaptability, scalability and so on, and classify the existing information dissemination solutions into eight new classes based on their design and optimization objectives.
Journal ArticleDOI
Adaptive Multimedia Data Forwarding for Privacy Preservation in Vehicular Ad-Hoc Networks
TL;DR: Experimental results thoroughly demonstrate that the proposed CP-ABE delegation scheme is effective and efficient for multimedia data forwarding in vehicular ad-hoc networks with privacy preservation.
Journal ArticleDOI
A Privacy-Preserving and Verifiable Querying Scheme in Vehicular Fog Data Dissemination
TL;DR: A secure querying scheme in vehicular fog data dissemination, in which the roadside units act as fog storage devices to cache data at network edge and disseminate data upon querying, can achieve the security goals of unlinkability, confidentiality, and verifiability.
Journal ArticleDOI
Computation Offloading and Retrieval for Vehicular Edge Computing: Algorithms, Models, and Classification
Azzedine Boukerche,Victor Soto +1 more
TL;DR: By reviewing and analyzing literature, it is found that vehicular edge computing is feasible and a viable option to address the increasing volume of data traffic and the open challenges and future directions that must be addressed towards efficient and effective computation offloading and retrieval from mobile users to vehicle edge computing.
Journal ArticleDOI
Resource Allocation for SVC Streaming Over Cooperative Vehicular Networks
TL;DR: This paper forms a joint optimization problem to answer questions about the number of video layers that should be transmitted for each vehicle, the selection of relay vehicles to assist destination vehicles, and the assignment of radio resources to direct and cooperative communications.
References
More filters
Proceedings ArticleDOI
Ciphertext-Policy Attribute-Based Encryption
TL;DR: A system for realizing complex access control on encrypted data that is conceptually closer to traditional access control methods such as role-based access control (RBAC) and secure against collusion attacks is presented.
Book ChapterDOI
Fuzzy identity-based encryption
Amit Sahai,Brent Waters +1 more
TL;DR: In this article, a new type of identity-based encryption called Fuzzy Identity-Based Encryption (IBE) was introduced, where an identity is viewed as set of descriptive attributes, and a private key for an identity can decrypt a ciphertext encrypted with an identity if and only if the identities are close to each other as measured by the set overlap distance metric.
Posted Content
Fuzzy Identity Based Encryption.
Amit Sahai,Brent Waters +1 more
TL;DR: In this paper, a new type of identity-based encryption called Fuzzy Identity-Based Encryption (IBE) was introduced, where an identity is viewed as set of descriptive attributes, and a private key for an identity can decrypt a ciphertext encrypted with an identity if and only if the identities are close to each other as measured by the set overlap distance metric.
Book ChapterDOI
Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization
TL;DR: A new methodology for realizing Ciphertext-Policy Attribute Encryption (CP-ABE) under concrete and noninteractive cryptographic assumptions in the standard model is presented.
Posted Content
Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization.
TL;DR: In this article, the authors present a new methodology for realizing Ciphertext-Policy Attribute Encryption (CP-ABE) under concrete and noninteractive cryptographic assumptions in the standard model.
Related Papers (5)
ASPE: attribute-based secure policy enforcement in vehicular ad hoc networks
Dijiang Huang,Mayank Verma +1 more