Location-based data access control scheme for Internet of Vehicles

Abstract Internet of Vehicles (IoV) is a typical representative of the Internet of Things in the area of transportation systems. Due to the mobility of vehicles, most applications for IoV are based on the location information. How to provide location-based access control is especially important for the IoV environment. Based on the multi-authority attribute-based encryption, we propose a novel location-based encryption scheme that enables both attribute-based and location-based access control for cloud storage. In this scene, vehicles can access data only if they arrive at a designated location and their attributes satisfy the access policy simultaneously. In the deployment of our scheme, we introduce fog computing and blockchain technologies. We deploy the fog nodes in the data access area to issue location-based keys and aid decrypting for vehicles, while we deploy the blockchain system to publish public parameters. The experiment shows that our scheme is feasible in practical applications.

[1]  Hao Wang,et al.  Efficient Attribute-Based Encryption with Privacy-Preserving Key Generation and Its Application in Industrial Cloud , 2019, Secur. Commun. Networks.

[2]  Sherman S. M. Chow,et al.  Improving privacy and security in multi-authority attribute-based encryption , 2009, CCS.

[3]  Robert H. Deng,et al.  Attribute-Based Encryption With Verifiable Outsourced Decryption , 2013, IEEE Transactions on Information Forensics and Security.

[4]  Brent Waters,et al.  Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.

[5]  Zhenfu Cao,et al.  Positioning-Protocol-Based Digital Signature , 2014, WICON.

[6]  Jin Li,et al.  Anonymous attribute-based proxy re-encryption for access control in cloud computing , 2016, Secur. Commun. Networks.

[7]  Matthew Green,et al.  Outsourcing the Decryption of ABE Ciphertexts , 2011, USENIX Security Symposium.

[8]  Amit Sahai,et al.  Bounded Ciphertext Policy Attribute Based Encryption , 2008, ICALP.

[9]  Hao Wang,et al.  Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing , 2016, Soft Computing.

[10]  Robert H. Deng,et al.  Attribute-Based Encryption With Efficient Verifiable Outsourced Decryption , 2015, IEEE Transactions on Information Forensics and Security.

[11]  Brent Waters,et al.  Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption , 2015, Financial Cryptography.

[12]  Yi Mu,et al.  Improving Privacy and Security in Decentralized Ciphertext-Policy Attribute-Based Encryption , 2015, IEEE Transactions on Information Forensics and Security.

[13]  Jin Li,et al.  Efficient attribute-based data sharing in mobile clouds , 2016, Pervasive Mob. Comput..

[14]  Hao Wang,et al.  New directly revocable attribute-based encryption scheme and its application in cloud storage environment , 2016, Cluster Computing.

[15]  Hao Wang,et al.  Secure Cloud-Based EHR System Using Attribute-Based Cryptosystem and Blockchain , 2018, Journal of Medical Systems.

[16]  Allison Bishop,et al.  Decentralizing Attribute-Based Encryption , 2011, IACR Cryptol. ePrint Arch..

[17]  Xiaohui Liang,et al.  Secure Threshold Multi Authority Attribute Based Encryption without a Central Authority , 2008, INDOCRYPT.

[18]  Yacine Ghamri-Doudane,et al.  Software defined networking-based vehicular Adhoc Network with Fog Computing , 2015, 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM).

[19]  Jin Li,et al.  Securely Outsourcing Attribute-Based Encryption with Checkability , 2014, IEEE Transactions on Parallel and Distributed Systems.