Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3479243.3487310acmconferencesArticle/Chapter ViewAbstractPublication PagesmswimConference Proceedingsconference-collections
research-article

A Dual Mode Privacy-Preserving Scheme Enabled Secure and Anonymous for Edge Computing Assisted Internet of Vehicle Networks

Published: 22 November 2021 Publication History

Abstract

This paper adopts Named Data Network technology for data delivery/forwarding over the Internet of Vehicles (IoVs) and proposes an NDN-based architecture for IoVs based on mobile edge computing(MEC). Advanced research has demonstrated the considerable benefits of introducing MEC into IoVs, but comes with issues such as insufficient security and privacy protection problems. To address these issues, we propose a dual-mode privacy-preserving framework for the security layer of the proposed network architecture. Specifically, we construct a privacy protection identity-based broadcast proxy re-encryption scheme to provide privacy to a set of vehicles with data requests. Furthermore, we use a federated learning scheme based on local differential privacy in the proposed NDN-based architecture for MEC-empowered IoV to achieve high-speed response and decision making. Simulation results demonstrate that our proposed scheme performs effectively.

References

[1]
Yoshinori Aono, Takuya Hayashi, Lihua Wang, Shiho Moriai, et al. 2017. Privacy-preserving deep learning via additively homomorphic encryption. IEEE Transactions on Information Forensics and Security, Vol. 13, 5 (2017), 1333--1345.
[2]
Matt Blaze, Gerrit Bleumer, and M Strauss. 1998. Divertible protocols and atomic proxy cryptography., Vol. 1403 (1998), 127--144.
[3]
Soumya Kanti Datta, Jerome Haerri, Christian Bonnet, and Rui Pedro Ferreira Da Costa. 2017. Vehicles as Connected Resources: Opportunities and Challenges for the Future. IEEE Vehicular Technology Magazine, Vol. 12, 2 (2017), 26--35.
[4]
Matthew Green and Giuseppe Ateniese. 2007. Identity-Based Proxy Re-encryption. (2007), 288--306.
[5]
Juan Antonio Guerreroibanez, Sherali Zeadally, and Juan Contrerascastillo. 2015. Integration challenges of intelligent transportation systems with connected vehicle, cloud computing, and internet of things technologies. IEEE Wireless Communications, Vol. 22, 6 (2015), 122--128.
[6]
S. Jiang, J. Liu, L. Wang, Y. Zhou, and Y. Fang. 2020. ESAC: An Efficient and Secure Access Control Scheme in Vehicular Named Data Networking. IEEE Transactions on Vehicular Technology, Vol. 69, 9 (2020), 10252--10263. https://doi.org/10.1109/TVT.2020.3004459
[7]
Hakima Khelifi, Senlin Luo, Boubakr Nour, Hassine Moungla, Yasir Faheem, Rasheed Hussain, and Adlen Ksentini. 2020. Named Data Networking in Vehicular Ad Hoc Networks: State-of-the-Art and Challenges. IEEE Communications Surveys and Tutorials, Vol. 22, 1 (2020), 320--351.
[8]
S. Li, I. Doh, and K. Chae. 2016. A Group Authentication Scheme Based on Lagrange Interpolation Polynomial. In 2016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS). 386--391.
[9]
Z. H. Mahmood and M. K. Ibrahem. 2018. New Fully Homomorphic Encryption Scheme Based on Multistage Partial Homomorphic Encryption Applied in Cloud Computing. In 2018 1st Annual International Conference on Information and Sciences (AiCIS). 182--186.
[10]
G. Mauri, M. Gerla, F. Bruno, M. Cesana, and G. Verticale. 2017. Optimal Content Prefetching in NDN Vehicle-to-Infrastructure Scenario. IEEE Transactions on Vehicular Technology, Vol. 66, 3 (2017), 2513--2525.
[11]
Le Trieu Phong, Yoshinori Aono, Takuya Hayashi, Lihua Wang, and Shiho Moriai. 2018. Privacy-Preserving Deep Learning via Additively Homomorphic Encryption. IEEE Transactions on Information Forensics and Security, Vol. 13, 5 (2018), 1333--1345.
[12]
Kyungah Shim. 2012. A round-optimal three-party ID-based authenticated key agreement protocol. Information Sciences, Vol. 186, 1 (2012), 239--248.
[13]
Xiaofei Wang, Yiwen Han, Chenyang Wang, Qiyang Zhao, Xu Chen, and Min Chen. 2019. In-Edge AI: Intelligentizing Mobile Edge Computing, Caching and Communication by Federated Learning. IEEE Network, Vol. 33, 5 (2019), 156--165.
[14]
Peng Xu, Tengfei Jiao, Qianhong Wu, Wei Wang, and Hai Jin. 2016. Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email. IEEE Trans. Comput., Vol. 65, 1 (2016), 66--79.
[15]
Lixia Zhang, Alexander Afanasyev, Jeff Burke, Van Jacobson, Kc Claffy, Patrick Crowley, Christos Papadopoulos, Lan Wang, and Beichuan Zhang. 2014. Named data networking., Vol. 44, 3 (2014), 66--73.

Cited By

View all
  • (2024)Methods and Challenges of Cryptography-Based Privacy-Protection Algorithms for Vehicular NetworksElectronics10.3390/electronics1312237213:12(2372)Online publication date: 17-Jun-2024

Index Terms

  1. A Dual Mode Privacy-Preserving Scheme Enabled Secure and Anonymous for Edge Computing Assisted Internet of Vehicle Networks

        Recommendations

        Comments

        Please enable JavaScript to view thecomments powered by Disqus.

        Information & Contributors

        Information

        Published In

        cover image ACM Conferences
        DIVANet '21: Proceedings of the 11th ACM Symposium on Design and Analysis of Intelligent Vehicular Networks and Applications
        November 2021
        82 pages
        ISBN:9781450390811
        DOI:10.1145/3479243
        • General Chair:
        • Mirela Notare,
        • Program Chair:
        • Peng Sun
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Sponsors

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 22 November 2021

        Permissions

        Request permissions for this article.

        Check for updates

        Author Tags

        1. named data network
        2. privacy awareness
        3. proxy re-encryption
        4. security
        5. vehicular network

        Qualifiers

        • Research-article

        Funding Sources

        • National Natural Science Foundation of China
        • Royal society Kan Tong Po International Fellowship
        • Beijing Municipal Natural Science Foundation

        Conference

        MSWiM '21
        Sponsor:

        Acceptance Rates

        Overall Acceptance Rate 70 of 308 submissions, 23%

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)24
        • Downloads (Last 6 weeks)3
        Reflects downloads up to 22 Nov 2024

        Other Metrics

        Citations

        Cited By

        View all
        • (2024)Methods and Challenges of Cryptography-Based Privacy-Protection Algorithms for Vehicular NetworksElectronics10.3390/electronics1312237213:12(2372)Online publication date: 17-Jun-2024

        View Options

        Login options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media