Efficient and Secure Access Control Scheme in the Standard Model for Vehicular Cloud Computing

Vehicular networking involves the storage, compute, and analysis of massive vehicular data. Vehicular cloud computing, as a special cloud computing platform, seamlessly combines vehicular ad hoc networks and conventional cloud computing. However, in the vehicular cloud computing, there is still the problem of unauthorized users accessing and stealing data. In the traditional ciphertext-policy attribute-based encryption (CP-ABE) scheme, a trusted central authority is employed to manage attributes and distribute keys. Based on multi-authority (MA) CP-ABE, we propose a secure and revocable access control scheme for vehicular cloud computing in this paper, in which the requester can decrypt the ciphertext with only a small amount of computation. We show that our MA-CP-ABE scheme can prevent static corruption of authorities in the standard model under the decisional q-parallel bilinear Diffie–Hellman exponent assumption. Theoretical analysis and experimental simulation results show that our scheme has lower communication cost and lower computational complexity than other schemes.

[1]  Rajkumar Buyya,et al.  A survey on vehicular cloud computing , 2014, J. Netw. Comput. Appl..

[2]  Sherali Zeadally,et al.  Vehicular ad hoc networks (VANETS): status, results, and challenges , 2010, Telecommunication Systems.

[3]  Ivan Stojmenovic,et al.  Improved Access Control Mechanism in Vehicular Ad Hoc Networks , 2011, ADHOC-NOW.

[4]  Stephan Olariu,et al.  Taking VANET to the clouds , 2010, Int. J. Pervasive Comput. Commun..

[5]  Xiaohua Jia,et al.  DAC-MACS: Effective Data Access Control for Multiauthority Cloud Storage Systems , 2013, IEEE Transactions on Information Forensics and Security.

[6]  Gongjun Yan,et al.  Security challenges in vehicular cloud computing , 2013, IEEE Transactions on Intelligent Transportation Systems.

[7]  Hannes Hartenstein,et al.  A tutorial survey on vehicular ad hoc networks , 2008, IEEE Communications Magazine.

[8]  Robert H. Deng,et al.  Security and Privacy in Smart Health: Efficient Policy-Hiding Attribute-Based Access Control , 2018, IEEE Internet of Things Journal.

[9]  Ivan Stojmenovic,et al.  DACC: Distributed Access Control in Clouds , 2011, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.

[10]  Sherali Zeadally,et al.  VANET-cloud: a generic cloud computing model for vehicular Ad Hoc networks , 2015, IEEE Wireless Communications.

[11]  Mario Gerla,et al.  Vehicular Cloud Computing , 2012, 2012 The 11th Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net).

[12]  Luming Zhang,et al.  An efficient message access quality model in vehicular communication networks , 2016, Signal Process..

[13]  Maher Ben Jemaa,et al.  Vehicular cloud networks: Challenges, architectures, and future directions , 2017, Veh. Commun..

[14]  Brent Waters,et al.  Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.

[15]  Mario Gerla,et al.  Vehicular cloud networking: architecture and design principles , 2014, IEEE Communications Magazine.

[16]  Maxim Raya,et al.  Securing vehicular ad hoc networks , 2007, J. Comput. Secur..

[17]  S. Yousefi,et al.  Vehicular Ad Hoc Networks (VANETs): Challenges and Perspectives , 2006, 2006 6th International Conference on ITS Telecommunications.

[18]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization , 2011, Public Key Cryptography.

[19]  Jin Li,et al.  Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing , 2017, Inf. Sci..

[20]  Allison Bishop,et al.  Decentralizing Attribute-Based Encryption , 2011, IACR Cryptol. ePrint Arch..

[21]  Yu Wang,et al.  Vehicular Ad Hoc Networks , 2009, Guide to Wireless Ad Hoc Networks.

[22]  Dijiang Huang,et al.  ASPE: attribute-based secure policy enforcement in vehicular ad hoc networks , 2009, Ad Hoc Networks.

[23]  Dong Kun Noh,et al.  Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems , 2011, IEEE Transactions on Parallel and Distributed Systems.

[24]  Melissa Chase,et al.  Multi-authority Attribute Based Encryption , 2007, TCC.

[25]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[26]  Yixian Yang,et al.  SmartVeh: Secure and Efficient Message Access Control and Authentication for Vehicular Cloud Computing , 2018, Sensors.

[27]  Xuelong Li,et al.  Adaptive Multimedia Data Forwarding for Privacy Preservation in Vehicular Ad-Hoc Networks , 2017, IEEE Transactions on Intelligent Transportation Systems.

[28]  Yen-Cheng Chen,et al.  ABACS: An Attribute-Based Access Control System for Emergency Services over Vehicular Ad Hoc Networks , 2011, IEEE Journal on Selected Areas in Communications.

[29]  Xiaohua Jia,et al.  Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage , 2014, IEEE Transactions on Parallel and Distributed Systems.

[30]  Sherman S. M. Chow,et al.  Improving privacy and security in multi-authority attribute-based encryption , 2009, CCS.

[31]  Tsz Hon Yuen,et al.  Fully Secure Multi-authority Ciphertext-Policy Attribute-Based Encryption without Random Oracles , 2011, ESORICS.

[32]  Chai-Keong Toh,et al.  Ad Hoc Mobile Wireless Networks , 2002 .