A real-time parking service with proxy re-encryption in vehicular cloud computing

被引:5
|
作者
Lin, Iuon-Chang [1 ,2 ]
Cheng, Chen-Yang [3 ]
Chen, Hsiang-Yu [1 ]
机构
[1] Natl Chung Hsing Univ, Dept Management Informat Syst, Taichung, Taiwan
[2] Asia Univ, Dept Photon & Commun Engn, Taichung, Taiwan
[3] Natl Taipei Univ Technol, Dept Ind Engn & Management, Taipei, Taiwan
关键词
Vehicular cloud computing; Re-encryption; Mutual authentication;
D O I
10.1016/j.engappai.2019.05.013
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Find parking space is a big problem in almost every metro city in the world. It always leads to driver frustration, traffic congestion and air pollution. As a result, drivers highly desire real-time parking service. In this paper, we proposed a new real-time parking service in vehicular cloud computing. When drivers send parking service request to vehicular cloud, vehicular cloud will compute the suitable parking lot for drivers. Our proposed scheme not only provides real-time parking lot information for drivers, but also integrates proxy re-encryption into the scheme in protecting service provider's benefit. We also show that our scheme achieves many security requirements such as mutual authentication, user anonymity, data confidentiality, traceability and revocability.
引用
收藏
页码:208 / 213
页数:6
相关论文
共 50 条
  • [21] Proxy re-encryption architect for storing and sharing of cloud contents
    Rawal, Bharat S.
    INTERNATIONAL JOURNAL OF PARALLEL EMERGENT AND DISTRIBUTED SYSTEMS, 2020, 35 (03) : 219 - 235
  • [22] Anonymous proxy re-encryption
    Shao, Jun
    Liu, Peng
    Wei, Guiyi
    Ling, Yun
    SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (05) : 439 - 449
  • [23] Secure bidirectional proxy re-encryption for cryptographic cloud storage
    Shao, Jun
    Lu, Rongxing
    Lin, Xiaodong
    Liang, Kaitai
    PERVASIVE AND MOBILE COMPUTING, 2016, 28 : 113 - 121
  • [24] Parallel Proxy Re-Encryption Workload Distribution for Efficient Big Data Sharing in Cloud Computing
    Khashan, Osama A.
    2021 IEEE 11TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2021, : 554 - 559
  • [25] A CP-ABE Scheme with Cloud Proxy Re-Encryption
    Zhao K.-Q.
    Kang P.
    Liu B.
    Guo Z.
    Feng C.-S.
    Qing Y.
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2023, 51 (03): : 728 - 735
  • [26] Proxy Re-Encryption Based on Homomorphic Encryption
    Bellafqira, Reda
    Coatrieux, Gouenou
    Bouslimi, Dalel
    Quellec, Gwenole
    Cozic, Michel
    33RD ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2017), 2017, : 154 - 161
  • [27] Puncturable Proxy Re-Encryption Supporting to Group Messaging Service
    Tran Viet Xuan Phuong
    Susilo, Willy
    Kim, Jongkil
    Yang, Guomin
    Liu, Dongxi
    COMPUTER SECURITY - ESORICS 2019, PT I, 2019, 11735 : 215 - 233
  • [28] Unforgeability of Re-Encryption Keys against Collusion Attack in Proxy Re-Encryption
    Hayashi, Ryotaro
    Matsushita, Tatsuyuki
    Yoshida, Takuya
    Fujii, Yoshihiro
    Okada, Koji
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, 2011, 7038 : 210 - +
  • [29] A New Kind of Conditional Proxy Re-Encryption for Secure Cloud Storage
    Zeng, Peng
    Choo, Kim-Kwang Raymond
    IEEE ACCESS, 2018, 6 : 70017 - 70024
  • [30] Attribute-Based Keyword Search with Proxy Re-Encryption in the Cloud
    Chen, Yanli
    Hu, Yuanyuan
    Zhu, Minhui
    Yang, Geng
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2018, E101B (08) : 1798 - 1808