Visible to the public Secure and Privacy-Preserving Warning Message Dissemination in Cloud-Assisted Internet of Vehicles

TitleSecure and Privacy-Preserving Warning Message Dissemination in Cloud-Assisted Internet of Vehicles
Publication TypeConference Paper
Year of Publication2019
AuthorsHuang, Qinlong, Li, Nan, Zhang, Zhicheng, Yang, Yixian
Conference Name2019 IEEE Conference on Communications and Network Security (CNS)
Date PublishedJune 2019
ISBN Number978-1-5386-7117-7
KeywordsAccess Control, anonymous identity-based signature technique, anonymous messaging, anonymous vehicle authentication, attribute-based encryption, attribute-based message encryption schemes, cloud computing, cloud-assisted Internet, cloud-assisted IoV, computer network security, conditional privacy preservation, conditional privacy preservation mechanism, cryptography, cyber physical systems, data dissemination, driver privacy issues, Human Behavior, human factors, Internet, Internet of Things, Internet of Vehicles, lightweight vehicles, message authentication, message integrity, Metrics, privacy-preserving warning message dissemination, pubcrawl, resilience, Resiliency, Scalability, secure privacy-preserving dissemination scheme, vehicular ad hoc networks, verifiable encryption

Cloud-assisted Internet of Vehicles (IoV)which merges the advantages of both cloud computing and Internet of Things that can provide numerous online services, and bring lots of benefits and conveniences to the connected vehicles. However, the security and privacy issues such as confidentiality, access control and driver privacy may prevent it from being widely utilized for message dissemination. Existing attribute-based message encryption schemes still bring high computational cost to the lightweight vehicles. In this paper, we introduce a secure and privacy-preserving dissemination scheme for warning message in cloud-assisted IoV. Firstly, we adopt attribute-based encryption to protect the disseminated warning message, and present a verifiable encryption and decryption outsourcing construction to reduce the computational overhead on vehicles. Secondly, we present a conditional privacy preservation mechanism which utilizes anonymous identity-based signature technique to ensure anonymous vehicle authentication and message integrity checking, and also allows the trusted authority to trace the real identity of malicious vehicle. We further achieve batch verification to improve the authentication efficiency. The analysis indicate that our scheme gains more security properties and reduces the computational overhead on the vehicles.

Citation Keyhuang_secure_2019