A real-time parking service with proxy re-encryption in vehicular cloud computing

被引:5
|
作者
Lin, Iuon-Chang [1 ,2 ]
Cheng, Chen-Yang [3 ]
Chen, Hsiang-Yu [1 ]
机构
[1] Natl Chung Hsing Univ, Dept Management Informat Syst, Taichung, Taiwan
[2] Asia Univ, Dept Photon & Commun Engn, Taichung, Taiwan
[3] Natl Taipei Univ Technol, Dept Ind Engn & Management, Taipei, Taiwan
关键词
Vehicular cloud computing; Re-encryption; Mutual authentication;
D O I
10.1016/j.engappai.2019.05.013
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Find parking space is a big problem in almost every metro city in the world. It always leads to driver frustration, traffic congestion and air pollution. As a result, drivers highly desire real-time parking service. In this paper, we proposed a new real-time parking service in vehicular cloud computing. When drivers send parking service request to vehicular cloud, vehicular cloud will compute the suitable parking lot for drivers. Our proposed scheme not only provides real-time parking lot information for drivers, but also integrates proxy re-encryption into the scheme in protecting service provider's benefit. We also show that our scheme achieves many security requirements such as mutual authentication, user anonymity, data confidentiality, traceability and revocability.
引用
收藏
页码:208 / 213
页数:6
相关论文
共 50 条
  • [1] Homomorphic Proxy Re-Encryption and Multiparty Cloud Computing
    Liu, Shu-Guang
    Zhang, Wei
    INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND INFORMATION SECURITY (CNIS 2015), 2015, : 222 - 225
  • [2] A Proxy Re-Encryption with Keyword Search Scheme in Cloud Computing
    Tang, Yongli
    Lian, Huanhuan
    Zhao, Zemao
    Yan, Xixi
    CMC-COMPUTERS MATERIALS & CONTINUA, 2018, 56 (02): : 339 - 352
  • [3] Incremental proxy re-encryption scheme for mobile cloud computing environment
    Khan, Abdul Nasir
    Kiah, M. L. Mat
    Madani, Sajjad A.
    Ali, Mazhar
    Khan, Atta Ur Rehman
    Shamshirband, Shahaboddin
    JOURNAL OF SUPERCOMPUTING, 2014, 68 (02): : 624 - 651
  • [4] Offline privacy preserving proxy re-encryption in mobile cloud computing
    Koe, Arthur Sandor Voundi
    Lin, Yaping
    PERVASIVE AND MOBILE COMPUTING, 2019, 59
  • [5] Incremental proxy re-encryption scheme for mobile cloud computing environment
    Abdul Nasir Khan
    M. L. Mat Kiah
    Sajjad A. Madani
    Mazhar Ali
    Atta ur Rehman Khan
    Shahaboddin Shamshirband
    The Journal of Supercomputing, 2014, 68 : 624 - 651
  • [6] Hierarchical Identity Role based proxy re-encryption scheme for cloud computing
    Nirmala, V
    Shanmugalakshmi, R.
    PROCEEDINGS OF THE 2013 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING & COMMUNICATION SYSTEMS (ICACCS), 2013,
  • [7] Hierarchical Attribute Based Proxy Re-Encryption Access Control in Cloud Computing
    Chandar, P. Praveen
    Muthuraman, D.
    Rathinraj, M.
    2014 IEEE INTERNATIONAL CONFERENCE ON CIRCUIT, POWER AND COMPUTING TECHNOLOGIES (ICCPCT-2014), 2014, : 1565 - 1570
  • [8] Proxy Re-encryption with Unforgeable Re-encryption Keys
    Guo, Hui
    Zhang, Zhenfeng
    Zhang, Jiang
    CRYPTOLOGY AND NETWORK SECURITY, CANS 2014, 2014, 8813 : 20 - 33
  • [9] A proxy broadcast re-encryption for cloud data sharing
    Sun, Maosheng
    Ge, Chunpeng
    Fang, Liming
    Wang, Jiandong
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (09) : 10455 - 10469
  • [10] Identity-Based Proxy Re-encryption over NTRU Lattices for Cloud Computing
    Yue, Na
    Wang, Yang
    Wang, Mingqiang
    2020 INTERNATIONAL CONFERENCE ON IDENTIFICATION, INFORMATION AND KNOWLEDGE IN THE INTERNET OF THINGS (IIKI2020), 2021, 187 : 264 - 269