Privacy Protection Scheme for the Internet of Vehicles Based on Private Set Intersection

被引:6
|
作者
Zhou, Quan [1 ]
Zeng, Zhikang [1 ]
Wang, Kemeng [2 ]
Chen, Menglong [2 ]
机构
[1] Guangzhou Univ, Sch Math & Informat Sci, Guangzhou 510006, Peoples R China
[2] Guangzhou Univ, Sch Comp Sci & Cyber Engn, Guangzhou 510006, Peoples R China
基金
中国国家自然科学基金;
关键词
Internet of Vehicles; privacy security; service recommendation; dual authentication; private set intersection; AUTHENTICATION PROTOCOL; K-ANONYMITY; EFFICIENT; LIGHTWEIGHT; BLOCKCHAIN;
D O I
10.3390/cryptography6040064
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Performing location-based services in a secure and efficient manner that remains a huge challenge for the Internet of Vehicles with numerous privacy and security risks. However, most of the existing privacy protection schemes are based on centralized location servers, which makes them all have a common drawback of a single point of failure and leaking user privacy. The employment of anonymity and cryptography is a well-known solution to the above problem, but its expensive resource consumption and complex cryptographic operations are difficult problems to solve. Based on this, designing a distributed and privacy-secure privacy protection scheme for the Internet of Vehicles is an urgent issue for the smart city. In this paper, we propose a privacy protection scheme for the Internet of Vehicles based on privacy set intersection. Specially, using privacy set intersection and blockchain techniques, we propose two protocols, that is, a dual authentication protocol and a service recommendation protocol. The double authentication protocol not only ensures that both communicating parties are trusted users, but also ensures the reliability of their session keys; while the service recommendation protocol based on pseudorandom function and one-way hash function can well protect the location privacy of users from being leaked. Finally, we theoretically analyze the security that this scheme has, i.e., privacy security, non-repudiation, and anti-man-in-the-middle attack.
引用
收藏
页数:16
相关论文
共 50 条
  • [31] A Privacy-Preserving Scheme for Location-Based Services in the Internet of Vehicles
    Huang J.
    Qian Y.
    Hu R.Q.
    1600, Posts and Telecom Press Co Ltd (06): : 385 - 395
  • [32] A blockchain based privacy-preserving federated learning scheme for Internet of Vehicles
    Wang, Naiyu
    Yang, Wenti
    Wang, Xiaodong
    Wu, Longfei
    Guan, Zhitao
    Du, Xiaojiang
    Guizani, Mohsen
    DIGITAL COMMUNICATIONS AND NETWORKS, 2024, 10 (01) : 126 - 134
  • [33] Clustering and deep learning based trajectory privacy protection mechanism for Internet of vehicles
    Shen Z.
    Tang Y.
    Wang H.
    Liu P.
    Liu K.
    Zhejiang Daxue Xuebao (Gongxue Ban)/Journal of Zhejiang University (Engineering Science), 2024, 58 (01): : 20 - 28
  • [34] Zero-Trust-Based Protection Scheme for Users in Internet of Vehicles
    Fang, Letian
    Wu, Chunshang
    Kang, Yukun
    Ou, Wei
    Zhou, Donghao
    Ye, Jun
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [35] Location Entropy-Based Privacy Protection Algorithm for Social Internet of Vehicles
    Xing, Ling
    Huang, Yuanhao
    Gao, Jianping
    Jia, Xiaofan
    Wu, Honghai
    Ma, Huahong
    WIRELESS PERSONAL COMMUNICATIONS, 2023, 130 (04) : 3009 - 3025
  • [36] Location Entropy-Based Privacy Protection Algorithm for Social Internet of Vehicles
    Ling Xing
    Yuanhao Huang
    Jianping Gao
    Xiaofan Jia
    Honghai Wu
    Huahong Ma
    Wireless Personal Communications, 2023, 130 : 3009 - 3025
  • [37] Research on Privacy Protection of Internet of Vehicles Based on Elliptic Curve Ring Signature
    Mao, Weiqi
    Mi, Bo
    Huang, Darong
    Ma, Haoyu
    2023 IEEE 12TH DATA DRIVEN CONTROL AND LEARNING SYSTEMS CONFERENCE, DDCLS, 2023, : 161 - 166
  • [38] Design of Secure and Privacy-Preserving Data Sharing Scheme Based on Key Aggregation and Private Set Intersection in Medical Information System
    Oh, Jihyeon
    Son, Seunghwan
    Kwon, DeokKyu
    Kim, Myeonghyun
    Park, Yohan
    Park, Youngho
    MATHEMATICS, 2024, 12 (11)
  • [39] Profile Matching for IoMT: A Verifiable Private Set Intersection Scheme
    Qian, Yalian
    Shen, Jian
    Vijayakumar, Pandi
    Sharma, Pradip Kumar
    IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, 2021, 25 (10) : 3794 - 3803
  • [40] Privacy-preserving statistical computing protocols for private set intersection
    Niu, Ziyu
    Wang, Hao
    Li, Zhi
    Song, Xiangfu
    INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2022, 37 (12) : 10118 - 10139