A Dual Mode Privacy-Preserving Scheme Enabled Secure and Anonymous for Edge Computing Assisted Internet of Vehicle Networks

This paper adopts Named Data Network technology for data delivery/forwarding over the Internet of Vehicles (IoVs) and proposes an NDN-based architecture for IoVs based on mobile edge computing(MEC). Advanced research has demonstrated the considerable benefits of introducing MEC into IoVs, but comes with issues such as insufficient security and privacy protection problems. To address these issues, we propose a dual-mode privacy-preserving framework for the security layer of the proposed network architecture. Specifically, we construct a privacy protection identity-based broadcast proxy re-encryption scheme to provide privacy to a set of vehicles with data requests. Furthermore, we use a federated learning scheme based on local differential privacy in the proposed NDN-based architecture for MEC-empowered IoV to achieve high-speed response and decision making. Simulation results demonstrate that our proposed scheme performs effectively.

[1]  Kyung-Ah Shim A round-optimal three-party ID-based authenticated key agreement protocol , 2012, Inf. Sci..

[2]  Yuguang Fang,et al.  ESAC: An Efficient and Secure Access Control Scheme in Vehicular Named Data Networking , 2020, IEEE Transactions on Vehicular Technology.

[3]  Christian Bonnet,et al.  Vehicles as Connected Resources: Opportunities and Challenges for the Future , 2017, IEEE Vehicular Technology Magazine.

[4]  Shiho Moriai,et al.  Privacy-Preserving Deep Learning via Additively Homomorphic Encryption , 2018, IEEE Transactions on Information Forensics and Security.

[5]  Kijoon Chae,et al.  A Group Authentication Scheme Based on Lagrange Interpolation Polynomial , 2016, 2016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS).

[6]  Sherali Zeadally,et al.  Integration challenges of intelligent transportation systems with connected vehicle, cloud computing, and internet of things technologies , 2015, IEEE Wireless Communications.

[7]  Peng Xu,et al.  Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email , 2016, IEEE Transactions on Computers.

[8]  Xu Chen,et al.  In-Edge AI: Intelligentizing Mobile Edge Computing, Caching and Communication by Federated Learning , 2018, IEEE Network.

[9]  Matt Blaze,et al.  Divertible Protocols and Atomic Proxy Cryptography , 1998, EUROCRYPT.

[10]  Patrick Crowley,et al.  Named data networking , 2014, CCRV.

[11]  Senlin Luo,et al.  Named Data Networking in Vehicular Ad Hoc Networks: State-of-the-Art and Challenges , 2020, IEEE Communications Surveys & Tutorials.

[12]  Giacomo Verticale,et al.  Optimal Content Prefetching in NDN Vehicle-to-Infrastructure Scenario , 2017, IEEE Transactions on Vehicular Technology.

[13]  Zainab Hikmat Mahmood,et al.  New Fully Homomorphic Encryption Scheme Based on Multistage Partial Homomorphic Encryption Applied in Cloud Computing , 2018, 2018 1st Annual International Conference on Information and Sciences (AiCIS).

[14]  Matthew Green,et al.  Identity-Based Proxy Re-encryption , 2007, ACNS.