Loading [MathJax]/extensions/MathMenu.js
Privacy-Preserving and Secure Distributed Data Sharing Scheme for VANETs | IEEE Journals & Magazine | IEEE Xplore

Privacy-Preserving and Secure Distributed Data Sharing Scheme for VANETs


Abstract:

Data sharing is one of the essential services of vehicular ad hoc networks (VANETs), which primarily requires data security and access control, and ciphertext-policy attr...Show More

Abstract:

Data sharing is one of the essential services of vehicular ad hoc networks (VANETs), which primarily requires data security and access control, and ciphertext-policy attribute-based encryption (CP-ABE) is a promising tool. However, data sharing schemes of distributed CP-ABE have concerns about the single-point performance bottleneck and privacy leakage. The factor for the former is that the authority manages a disjoint attribute set. The latter is because the user's identity and attributes are required to submit to authorities, which targets to bind this information to decryption keys for collusion-resistant. We propose a privacy-preserving distributed data sharing scheme for VANETs. This scheme introduces asymmetric group key agreement to distributed CP-ABE, which realizes that multiple authorities manage an attribute, and the user can obtain the attribute key bound with his identity from any authority in the group. To match up to the requirement of privacy-preserving, a key extract protocol provided user anonymity is proposed, which implements that attribute keys can be obtained without revealing the user's identity and attributes. Moreover, partial policy hiding is satisfied. Finally, we analyze and evaluate the proposed scheme, and the results indicate that our scheme is secure and efficient.
Published in: IEEE Transactions on Mobile Computing ( Volume: 23, Issue: 12, December 2024)
Page(s): 13882 - 13897
Date of Publication: 12 August 2024

ISSN Information:

Funding Agency:

References is not available for this document.

I. Introduction

With wireless communication protocols, vehicles in vehicular ad hoc networks (VANETs) can communicate with other entities to obtain continuous and stable network service, and further, various smart services and applications can be obtained [1]. Data sharing is one of the essential and practical services in VANETs, including sharing of traffic conditions, weather variables, driving assistance, navigation support, entertainment content, etc [1], [2], which can effectively improve traffic conditions and user experience. It is worth noting that large-scale data sharing in VANETs requires vehicles to have certain computing power and a platform to support sharing data. Fortunately, hardware devices and embedded systems installed in vehicles give the opportunity to pool resources [3]. Moreover, cloud storage and computing technologies provide a platform and computing resource for vehicles to access data [2].

Select All
1.
Y. Xia, W. Chen, X. Liu, L. Zhang, X. Li and Y. Xiang, "Adaptive multimedia data forwarding for privacy preservation in vehicular ad-hoc networks", IEEE Trans. Intell. Transp. Syst., vol. 18, no. 10, pp. 2629-2641, Oct. 2017.
2.
S.-J. Horng, C.-C. Lu and W. Zhou, "An identity-based and revocable data-sharing scheme in VANETs", IEEE Trans. Veh. Technol., vol. 69, no. 12, pp. 15933-15946, Dec. 2020.
3.
J. Cui, L. Wei, H. Zhong, J. Zhang, Y. Xu and L. Liu, "Edge computing in VANETs–An efficient and privacy-preserving cooperative downloading scheme", IEEE J. Sel. Areas Commun., vol. 38, no. 6, pp. 1191-1204, Jun. 2020.
4.
L.-Y. Yeh, Y.-C. Chen and J.-L. Huang, "ABACS: An attribute-based access control system for emergency services over vehicular ad hoc networks", IEEE J. Sel. Areas Commun., vol. 29, no. 3, pp. 630-643, Mar. 2011.
5.
J. Pan, J. Cui, L. Wei, Y. Xu and H. Zhong, "Secure data sharing scheme for VANETs based on edge computing", EURASIP J. Wireless Commun. Netw., vol. 2019, no. 1, pp. 1-11, 2019.
6.
J. Bethencourt, A. Sahai and B. Waters, "Ciphertext-policy attribute-based encryption", Proc. IEEE Symp. Secur. Privacy, pp. 321-334, 2007.
7.
M. Chase, "Multi-authority attribute based encryption", Proc. 4th Theory Cryptogr. Conf., pp. 515-534, 2007.
8.
M. Chase and S. S. Chow, "Improving privacy and security in multi-authority attribute-based encryption", Proc. 16th ACM Conf. Comput. Commun. Secur., pp. 121-130, 2009.
9.
A. Lewko, T. Okamoto, A. Sahai, K. Takashima and B. Waters, "Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption", Proc. 29th Annu. Int. Conf. Theory Appl. Cryptographic Techn., pp. 62-91, 2010.
10.
H. Lin, Z. Cao, X. Liang and J. Shao, "Secure threshold multi authority attribute based encryption without a central authority", Inf. Sci., vol. 180, no. 13, pp. 2618-2632, 2010.
11.
K. Yang, X. Jia, K. Ren, B. Zhang and R. Xie, "DAC-MACS: Effective data access control for multiauthority cloud storage systems", IEEE Trans. Inf. Forensics Secur., vol. 8, no. 11, pp. 1790-1801, Nov. 2013.
12.
D. Liu, H. Li, Y. Yang and H. Yang, "Achieving multi-authority access control with efficient attribute revocation in smart grid", Proc. IEEE Int. Conf. Commun., pp. 634-639, 2014.
13.
W. Li, K. Xue, Y. Xue and J. Hong, "TMACS: A robust and verifiable threshold multi-authority access control system in public cloud storage", IEEE Trans. Parallel Distrib. Syst., vol. 27, no. 5, pp. 1484-1496, May 2016.
14.
K. Xue et al., "RAAC: Robust and auditable access control with multiple attribute authorities for public cloud storage", IEEE Trans. Inf. Forensics Secur., vol. 12, no. 4, pp. 953-967, Apr. 2017.
15.
H. Qian, J. Li and Y. Zhang, "Privacy-preserving decentralized ciphertext-policy attribute-based encryption with fully hidden access structure", Proc. 15th Int. Conf. Inf. Commun. Secur., pp. 363-372, 2013.
16.
M. Lyu, X. Li and H. Li, "Efficient verifiable and privacy preserving decentralized attribute-based encryption for mobile cloud computing", Proc. IEEE 2nd Int. Conf. Data Sci. Cyberspace, pp. 195-204, 2017.
17.
J. Han, W. Susilo, Y. Mu, J. Zhou and M. H. A. Au, "Improving privacy and security in decentralized ciphertext-policy attribute-based encryption", IEEE Trans. Inf. Forensics Secur., vol. 10, no. 3, pp. 665-678, Mar. 2015.
18.
H. Nasiraee and M. Ashouri-Talouki, "Privacy-preserving distributed data access control for CloudIoT", IEEE Trans. Dependable Secure Comput., vol. 19, no. 4, pp. 2476-2487, Jul./Aug. 2022.
19.
T. Nishide, K. Yoneyama and K. Ohta, "Attribute-based encryption with partially hidden encryptor-specified access structures", Proc. 6th Int. Conf. Appl. Cryptogr. Netw. Secur., pp. 111-129, 2008.
20.
J. Katz, A. Sahai and B. Waters, "Predicate encryption supporting disjunctions polynomial equations and inner products", Proc. 27th Annu. Int. Conf. Theory Appl. Cryptographic Techn., pp. 146-162, 2008.
21.
J. Lai, R. H. Deng and Y. Li, "Expressive CP-ABE with partially hidden access structures", Proc. 7th ACM Symp. Inf. Comput. Commun. Secur., pp. 18-19, 2012.
22.
H. Cui, R. H. Deng, G. Wu and J. Lai, "An efficient and expressive ciphertext-policy attribute-based encryption scheme with partially hidden access structures", Proc. 10th Int. Conf. Provable Secur., pp. 19-38, 2016.
23.
C. Zhao, L. Xu, J. Li, H. Fang and Y. Zhang, "Toward secure and privacy-preserving cloud data sharing: Online/offline multiauthority CP-ABE with hidden policy", IEEE Syst. J., vol. 16, no. 3, pp. 4804-4815, Sep. 2022.
24.
J. Lai, R. H. Deng and Y. Li, "Fully secure cipertext-policy hiding CP-ABE", Proc. 7th Int. Conf. Inf. Secur. Pract. Exp., pp. 24-39, 2011.
25.
H. Wang, D. He and J. Han, "VOD-ADAC: Anonymous distributed fine-grained access control protocol with verifiable outsourced decryption in public cloud", IEEE Trans. Serv. Comput., vol. 13, no. 3, pp. 572-583, Jun. 2020.
26.
S. Belguith, N. Kaaniche, M. Laurent, A. Jemai and R. Attia, "Accountable privacy preserving attribute based framework for authenticated encrypted access in clouds", J. Parallel Distrib. Comput., vol. 135, pp. 1-20, 2020.
27.
J. Camenisch, R. Chaabouni and A. Shelat, "Efficient protocols for set membership and range proofs", Proc. 14th Int. Conf. Theory Appl. Cryptol. Inf. Secur., pp. 234-252, 2008.
28.
L. Nguyen, "Accumulators from bilinear pairings and applications", Proc. Cryptographers’ Track RSA Conf., pp. 275-292, 2005.
29.
Z. Zhou, D. Huang and Z. Wang, "Efficient privacy-preserving ciphertext-policy attribute based-encryption and broadcast encryption", IEEE Trans. Comput., vol. 64, no. 1, pp. 126-138, Jan. 2015.
30.
T. V. X. Phuong, G. Yang and W. Susilo, "Hidden ciphertext policy attribute-based encryption under standard assumptions", IEEE Trans. Inf. Forensics Secur., vol. 11, no. 1, pp. 35-45, Jan. 2016.

Contact IEEE to Subscribe

References

References is not available for this document.