Anonymous and Traceable Authentication for Securing Data Sharing in Parking Edge Computing

被引:1
|
作者
Li, Chunhai [1 ]
Li, Xiaohuan [1 ,2 ]
Wang, Yujue [3 ]
Ding, Yong [3 ,4 ]
Zhao, Feng [1 ]
机构
[1] Guilin Univ Elect Technol, Sch Informat & Commun, Guilin 541004, Peoples R China
[2] Guangxi Res Inst Comprehens Transportat Big Data, Nanning 530000, Peoples R China
[3] Guilin Univ Elect Technol, Sch Comp Sci & Informat Secur, Guangxi Key Lab Cryptog & Informat Secur, Guilin 541004, Peoples R China
[4] Peng Cheng Lab, Cyberspace Secur Res Ctr, Shenzhen 518000, Peoples R China
基金
中国国家自然科学基金;
关键词
Parking edge computing; Vehicle authentication; Anonymous authentication; Vehicle traceability;
D O I
10.1007/s12083-021-01104-7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In parking edge computing, the service providers can engage the parking vehicles to provide computing services. The requesting vehicles can enjoy the advantages of the parking computing services with no need to build expensive equipment locally, whereas the parking vehicles can sell the computing resources to gain benefits. However, in an open parking computing system, the identity of each entity is easy to be counterfeited by other malicious entities, which may cause the leakage of privacy data of honest entities and the waste of parking computing resources. To address this issue, we propose an efficient authentication protocol between vehicle and roadside unit near the parking lot, which also allows two verified entities to generate a common key to enjoy the parking computing service confidentially. The protocol is extended to allow anonymous authentication so that the true identity would not be leaked to RSU during the authentication process, and malicious vehicle tracing if some forged or illegal authentication message is submitted to cheat the service provider or roadside unit. The security and efficiency analysis demonstrate that the proposed authentication protocols are secure and practical in applications.
引用
收藏
页码:2099 / 2114
页数:16
相关论文
共 50 条
  • [21] Blockchain-based Anonymous Authentication Key Management for Mobile Edge Computing
    Deng, Yun
    Tang, Haihua
    PROCEEDINGS OF THE 2024 27 TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, CSCWD 2024, 2024, : 2096 - 2103
  • [22] EECAAP: Efficient Edge-Computing based Anonymous Authentication Protocol for IoV
    Sikarwar, Himani
    Das, Debasis
    2022 IEEE 29TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING, DATA, AND ANALYTICS, HIPC, 2022, : 302 - 307
  • [23] An efficient traceable data sharing scheme in cloud computing for mobile devices
    Wang Z.
    Ye J.
    Wang J.
    Wang, Zhiying (392535641@qq.com), 2018, Inderscience Publishers, 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland (12) : 156 - 165
  • [24] AAnA: Anonymous authentication and authorization based on short traceable signatures
    Sooyeon Shin
    Taekyoung Kwon
    International Journal of Information Security, 2014, 13 : 477 - 495
  • [25] A Traceable and Anonymous Authentication Ring Signature Scheme with Privacy Protection
    Zhao, Xiao
    Cao, Suzhen
    Wang, Zheng
    Xing, Dandan
    Zhou, Dawei
    PROCEEDINGS OF THE 2024 27 TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, CSCWD 2024, 2024, : 570 - 575
  • [26] AAnA: Anonymous authentication and authorization based on short traceable signatures
    Shin, Sooyeon
    Kwon, Taekyoung
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2014, 13 (05) : 477 - 495
  • [27] HIBGE: Monitorable and Traceable Anonymous Encryption in Cloud Computing
    Li, Dawei
    Liu, Jianwei
    Wu, Qianhong
    Guan, Zhenyu
    JOURNAL OF INTERNET TECHNOLOGY, 2019, 20 (02): : 637 - 650
  • [28] PAGS: PUF-based Anonymous Group Signature for Node Authentication in Edge Computing
    Lu, Junqing
    Shen, Jian
    Lai, Chin-Feng
    Gao, Fei
    JOURNAL OF INTERNET TECHNOLOGY, 2021, 22 (06): : 1229 - 1239
  • [29] An anonymous access authentication scheme for vehicular ad hoc networks under edge computing
    Gao, Tianhan
    Li, Yanqiang
    Guo, Nan
    You, Ilsun
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2018, 14 (02):
  • [30] A Redesigned Identity-Based Anonymous Authentication Scheme for Mobile-Edge Computing
    Jia, Xiaoying
    Luo, Min
    Choo, Kim-Kwang Raymond
    Li, Li
    He, Debiao
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (12): : 10108 - 10120