Self-Controllable Secure Location Sharing for Trajectory-Based Message Delivery on Cloud-Assisted VANETs

In vehicular ad hoc networks, trajectory-based message delivery is a message forwarding strategy that utilizes the vehicle’s preferred driving routes information to deliver messages to the moving vehicles with the help of roadside units. For the purpose of supporting trajectory-based message delivery to a moving vehicle, the driving locations of the vehicle need to be shared with message senders. However, from a security perspective, vehicle users do not want their driving locations to be exposed to others except their desired senders for location privacy preservation. Therefore, in this paper, we propose a secure location-sharing system to allow a vehicle user (or driver) to share his/her driving trajectory information with roadside units authorized by the user. To design the proposed system, we put a central service manager which maintains vehicle trajectory data and acts as a broker between vehicles and roadside units to share the trajectory data on the cloud. Nevertheless, we make the trajectory data be hidden from not only unauthorized entities but also the service manager by taking advantage of a proxy re-encryption scheme. Hence, a vehicle can control that only the roadside units designated by the vehicle can access the trajectory data of the vehicle.

[1]  Jin Li,et al.  N-Mobishare: new privacy-preserving location-sharing system for mobile online social networks , 2016, Int. J. Comput. Math..

[2]  Yun-Pang Wang,et al.  Simulation of Urban Mobility , 2013, Lecture Notes in Computer Science.

[3]  Yuanfei Zhang,et al.  Privacy-Preserving Cloud Establishment and Data Dissemination Scheme for Vehicular Cloud , 2020, IEEE Transactions on Dependable and Secure Computing.

[4]  Xiaodong Lin,et al.  SPRING: A Social-based Privacy-preserving Packet Forwarding Protocol for Vehicular Delay Tolerant Networks , 2009, 2010 Proceedings IEEE INFOCOM.

[5]  Panagiotis Papadimitratos,et al.  Efficient and robust pseudonymous authentication in VANET , 2007, VANET '07.

[6]  Josep Domingo-Ferrer,et al.  A Scalable Robust Authentication Protocol for Secure Vehicular Communications , 2010, IEEE Transactions on Vehicular Technology.

[7]  Jing Zhao,et al.  VADD: Vehicle-Assisted Data Delivery in Vehicular Ad Hoc Networks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[8]  Jaehoon Jeong,et al.  Trajectory-Based Data Forwarding for Light-Traffic Vehicular Ad Hoc Networks , 2011, IEEE Transactions on Parallel and Distributed Systems.

[9]  Rong Yu,et al.  Toward cloud-based vehicular networks with efficient resource management , 2013, IEEE Network.

[10]  Paulo S. L. M. Barreto,et al.  Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps , 2005, ASIACRYPT.

[11]  Liviu Iftode,et al.  Location-Aware Services over Vehicular Ad-Hoc Networks using Car-to-Car Communication , 2007, IEEE Journal on Selected Areas in Communications.

[12]  John B. Kenney,et al.  Dedicated Short-Range Communications (DSRC) Standards in the United States , 2011, Proceedings of the IEEE.

[13]  Naranker Dulay,et al.  Longitude: A Privacy-Preserving Location Sharing Protocol for Mobile Applications , 2011, IFIPTM.

[14]  Ahmed Helmy,et al.  IMPORTANT: a framework to systematically analyze the Impact of Mobility on Performance of Routing Protocols for Adhoc Networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[15]  Youngho Park,et al.  Pseudonymous authentication for secure V2I services in cloud-based vehicular networks , 2016, J. Ambient Intell. Humaniz. Comput..

[16]  Jaehoon Jeong,et al.  Trajectory-Based Statistical Forwarding for Multihop Infrastructure-to-Vehicle Data Delivery , 2012, IEEE Transactions on Mobile Computing.

[17]  Jie Li,et al.  Privacy-preserving authentication schemes for vehicular ad hoc networks: a survey , 2016, Wirel. Commun. Mob. Comput..

[18]  Jin Li,et al.  Location-Sharing Systems With Enhanced Privacy in Mobile Online Social Networks , 2017, IEEE Systems Journal.

[19]  Josep Domingo-Ferrer,et al.  Distributed Aggregate Privacy-Preserving Authentication in VANETs , 2017, IEEE Transactions on Intelligent Transportation Systems.

[20]  Jin Li,et al.  MobiShare+: Security Improved System for Location Sharing in Mobile Online Social Networks , 2014, J. Internet Serv. Inf. Secur..

[21]  Xiaohui Liang,et al.  STAP: A social-tier-assisted packet forwarding protocol for achieving receiver-location privacy preservation in VANETs , 2011, 2011 Proceedings IEEE INFOCOM.

[22]  Jin Li,et al.  New Privacy-Preserving Location Sharing System for Mobile Online Social Networks , 2013, 2013 Eighth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing.

[23]  Kyung-Hyune Rhee,et al.  Secure vehicle location-sharing for trajectory-based message delivery on VANETs , 2017, 2017 IEEE 26th International Symposium on Industrial Electronics (ISIE).

[24]  Jörg Ott,et al.  Adaptive routing in mobile opportunistic networks , 2010, MSWIM '10.

[25]  Gongjun Yan,et al.  The Next Paradigm Shift: From Vehicular Networks to Vehicular Clouds , 2013, Mobile Ad Hoc Networking.

[26]  Pin-Han Ho,et al.  ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[27]  Fengyuan Xu,et al.  MobiShare: Flexible privacy-preserving location sharing in mobile online social networks , 2012, 2012 Proceedings IEEE INFOCOM.

[28]  Youngho Park,et al.  An Efficient Anonymous Authentication Protocol for Secure Vehicular Communications , 2010, J. Inf. Sci. Eng..

[29]  Julien Freudiger,et al.  Private Sharing of User Location over Online Social Networks , 2010 .

[30]  Zhiyi Fang,et al.  Securing Vehicular Ad Hoc Networks , 2007, 2007 2nd International Conference on Pervasive Computing and Applications.

[31]  Youngho Park,et al.  A robust and efficient anonymous authentication protocol in VANETs , 2009, Journal of Communications and Networks.

[32]  Josep Domingo-Ferrer,et al.  Privacy-Preserving Vehicular Communication Authentication with Hierarchical Aggregation and Fast Response , 2015, IEEE Transactions on Computers.

[33]  Youngho Park,et al.  Chosen-Ciphertext Secure Certificateless Proxy Re-Encryption , 2010, Communications and Multimedia Security.