A real-time parking service with proxy re-encryption in vehicular cloud computing

被引:5
|
作者
Lin, Iuon-Chang [1 ,2 ]
Cheng, Chen-Yang [3 ]
Chen, Hsiang-Yu [1 ]
机构
[1] Natl Chung Hsing Univ, Dept Management Informat Syst, Taichung, Taiwan
[2] Asia Univ, Dept Photon & Commun Engn, Taichung, Taiwan
[3] Natl Taipei Univ Technol, Dept Ind Engn & Management, Taipei, Taiwan
关键词
Vehicular cloud computing; Re-encryption; Mutual authentication;
D O I
10.1016/j.engappai.2019.05.013
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Find parking space is a big problem in almost every metro city in the world. It always leads to driver frustration, traffic congestion and air pollution. As a result, drivers highly desire real-time parking service. In this paper, we proposed a new real-time parking service in vehicular cloud computing. When drivers send parking service request to vehicular cloud, vehicular cloud will compute the suitable parking lot for drivers. Our proposed scheme not only provides real-time parking lot information for drivers, but also integrates proxy re-encryption into the scheme in protecting service provider's benefit. We also show that our scheme achieves many security requirements such as mutual authentication, user anonymity, data confidentiality, traceability and revocability.
引用
收藏
页码:208 / 213
页数:6
相关论文
共 50 条
  • [31] An identity-based proxy re-encryption for data deduplication in cloud
    Kan, Ge
    Jin, Chunhua
    Zhu, Huihui
    Xu, Yongliang
    Liu, Nian
    JOURNAL OF SYSTEMS ARCHITECTURE, 2021, 121
  • [32] Certificate-Based Proxy Re-Encryption for Public Cloud Storage
    Sur, Chul
    Park, Youngho
    Shin, Sang Uk
    Rhee, Kyung Hyune
    Seo, Changho
    2013 SEVENTH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING (IMIS 2013), 2013, : 159 - 166
  • [33] A Certificateless Proxy Re-encryption Scheme for Cloud-Based Blockchain
    Eltayieb, Nabeil
    Sun, Liang
    Wang, Ke
    Li, Fagen
    FRONTIERS IN CYBER SECURITY, FCS 2019, 2019, 1105 : 293 - 307
  • [34] A cloud data deduplication scheme based on certificateless proxy re-encryption
    Zheng, Xiaoyu
    Zhou, Yuyang
    Ye, Yalan
    Li, Fagen
    JOURNAL OF SYSTEMS ARCHITECTURE, 2020, 102
  • [35] A New Dynamic Conditional Proxy Broadcast Re-Encryption Scheme for Cloud
    Chen, Zhanwen
    Chen, Jiageng
    Meng, Weizhi
    2020 IEEE INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, INTL CONF ON CLOUD AND BIG DATA COMPUTING, INTL CONF ON CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/CBDCOM/CYBERSCITECH), 2020, : 569 - 576
  • [36] Data sharing using proxy re-encryption based on DNA computing
    Ahmed Elhadad
    Soft Computing, 2020, 24 : 2101 - 2108
  • [37] Data sharing using proxy re-encryption based on DNA computing
    Elhadad, Ahmed
    SOFT COMPUTING, 2020, 24 (03) : 2101 - 2108
  • [38] Fuzzy conditional proxy re-encryption
    Fang LiMing
    Wang JianDong
    Ge ChunPeng
    Ren YongJun
    SCIENCE CHINA-INFORMATION SCIENCES, 2013, 56 (05) : 1 - 13
  • [39] Efficient Unidirectional Proxy Re-Encryption
    Chow, Sherman S. M.
    Weng, Jian
    Yang, Yanjiang
    Deng, Robert H.
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2010, 2010, 6055 : 316 - +
  • [40] Verifiable Auditing Protocol with Proxy Re-Encryption for Outsourced Databases in Cloud
    GAO Ziyuan
    WANG Baocang
    LIU Hequn
    LU Ke
    ZHAN Yu
    Wuhan University Journal of Natural Sciences, 2018, 23 (02) : 120 - 128