Secure, efficient and revocable data sharing scheme for vehicular fogs

With the rapid development of vehicular networks, the problem of data sharing in vehicular networks has attached much attention. However, existing data access control schemes in cloud computing cannot be applied to the scenario of vehicular networks, because cloud computing paradigm cannot satisfy the rigorous requirement posed by latency-sensitive mobile application. Fog Computing is a paradigm that extends Cloud computing and services to the edge of the network. The vehicular fog is the ideal platform to achieve data sharing in vehicular networks. In this paper, we propose a revocable data sharing scheme for vehicular fogs. We construct a new multi-authority ciphertext policy attribute-based encryption (CP-ABE) scheme with efficient decryption to realize data access control in vehicular network system, and design an efficient user and attribute revocation method for it. The analysis and the simulation results show that our scheme is secure and highly efficient.

[1]  Abhay Bansal,et al.  Exploring challenges in Mobile cloud computing: An overview , 2013 .

[2]  Sateesh Addepalli,et al.  Fog computing and its role in the internet of things , 2012, MCC '12.

[3]  Ivan Stojmenovic,et al.  DACC: Distributed Access Control in Clouds , 2011, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.

[4]  David Lillethun,et al.  Mobile fog: a programming model for large-scale applications on the internet of things , 2013, MCC '13.

[5]  Mario Gerla,et al.  Vehicular networks and the future of the mobile internet , 2011, Comput. Networks.

[6]  Jin Li,et al.  New Ciphertext-Policy Attribute-Based Access Control with Efficient Revocation , 2013, ICT-EurAsia.

[7]  J. Wenny Rahayu,et al.  Mobile cloud computing: A survey , 2013, Future Gener. Comput. Syst..

[8]  Brent Waters,et al.  Full-Domain Subgroup Hiding and Constant-Size Group Signatures , 2007, Public Key Cryptography.

[9]  Jizhong Zhao,et al.  Footprint: Detecting Sybil Attacks in Urban Vehicular Networks , 2012, IEEE Transactions on Parallel and Distributed Systems.

[10]  Jianhua Li,et al.  A Security Assessment Mechanism for Software-Defined Networking-Based Mobile Networks , 2015, Sensors.

[11]  Mianxiong Dong,et al.  CAMF: Context-Aware Message Forwarding in Mobile Social Networks , 2015, IEEE Transactions on Parallel and Distributed Systems.

[12]  David Hutchison,et al.  A survey of key management for secure group communication , 2003, CSUR.

[13]  Takayuki Nishio,et al.  Service-oriented heterogeneous resource sharing for optimizing service latency in mobile cloud , 2013, MobileCloud '13.

[14]  Tao Wang,et al.  QoE-ensured price competition model for emerging mobile networks , 2015, IEEE Wireless Communications.

[15]  Mianxiong Dong,et al.  MMCD: Cooperative Downloading for Highway VANETs , 2015, IEEE Transactions on Emerging Topics in Computing.

[16]  Ivan Stojmenovic,et al.  The Fog computing paradigm: Scenarios and security issues , 2014, 2014 Federated Conference on Computer Science and Information Systems.

[17]  Rafail Ostrovsky,et al.  Attribute-based encryption with non-monotonic access structures , 2007, CCS '07.

[18]  Melissa Chase,et al.  Multi-authority Attribute Based Encryption , 2007, TCC.

[19]  Kurt Rothermel,et al.  MigCEP: operator migration for mobility driven distributed complex event processing , 2013, DEBS.

[20]  Ian Miers,et al.  Charm: a framework for rapidly prototyping cryptosystems , 2013, Journal of Cryptographic Engineering.

[21]  Dong Kun Noh,et al.  Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems , 2011, IEEE Transactions on Parallel and Distributed Systems.

[22]  Wei Zhang,et al.  RUPS: Fixing Relative Distances among Urban Vehicles with Context-Aware Trajectories , 2016, 2016 IEEE International Parallel and Distributed Processing Symposium (IPDPS).

[23]  Xuemin Shen,et al.  Integrity-oriented content transmission in highway vehicular ad hoc networks , 2013, 2013 Proceedings IEEE INFOCOM.

[24]  Sagar Naik,et al.  Exploiting temporal dependency for opportunistic forwarding in urban vehicular networks , 2011, 2011 Proceedings IEEE INFOCOM.

[25]  Eui-nam Huh,et al.  Fog Computing and Smart Gateway Based Communication for Cloud of Things , 2014, 2014 International Conference on Future Internet of Things and Cloud.

[26]  Eui-nam Huh,et al.  E-HAMC: Leveraging Fog computing for emergency alert service , 2015, 2015 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops).

[27]  Long Zheng,et al.  A Trade-Off Approach to Optimal Resource Allocation Algorithm with Cache Technology in Ubiquitous Computing Environment , 2009, 2009 International Conference on Computational Science and Engineering.

[28]  Allison Bishop,et al.  Decentralizing Attribute-Based Encryption , 2011, IACR Cryptol. ePrint Arch..