Anonymous and Traceable Authentication for Securing Data Sharing in Parking Edge Computing

被引:1
|
作者
Li, Chunhai [1 ]
Li, Xiaohuan [1 ,2 ]
Wang, Yujue [3 ]
Ding, Yong [3 ,4 ]
Zhao, Feng [1 ]
机构
[1] Guilin Univ Elect Technol, Sch Informat & Commun, Guilin 541004, Peoples R China
[2] Guangxi Res Inst Comprehens Transportat Big Data, Nanning 530000, Peoples R China
[3] Guilin Univ Elect Technol, Sch Comp Sci & Informat Secur, Guangxi Key Lab Cryptog & Informat Secur, Guilin 541004, Peoples R China
[4] Peng Cheng Lab, Cyberspace Secur Res Ctr, Shenzhen 518000, Peoples R China
基金
中国国家自然科学基金;
关键词
Parking edge computing; Vehicle authentication; Anonymous authentication; Vehicle traceability;
D O I
10.1007/s12083-021-01104-7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In parking edge computing, the service providers can engage the parking vehicles to provide computing services. The requesting vehicles can enjoy the advantages of the parking computing services with no need to build expensive equipment locally, whereas the parking vehicles can sell the computing resources to gain benefits. However, in an open parking computing system, the identity of each entity is easy to be counterfeited by other malicious entities, which may cause the leakage of privacy data of honest entities and the waste of parking computing resources. To address this issue, we propose an efficient authentication protocol between vehicle and roadside unit near the parking lot, which also allows two verified entities to generate a common key to enjoy the parking computing service confidentially. The protocol is extended to allow anonymous authentication so that the true identity would not be leaked to RSU during the authentication process, and malicious vehicle tracing if some forged or illegal authentication message is submitted to cheat the service provider or roadside unit. The security and efficiency analysis demonstrate that the proposed authentication protocols are secure and practical in applications.
引用
收藏
页码:2099 / 2114
页数:16
相关论文
共 50 条
  • [41] An New Anonymous Authentication Scheme for Cloud Computing
    Zhang Zhi-hua
    Li Jian-jun
    Wei, Jiang
    Yong, Zhao
    Bei, Gong
    PROCEEDINGS OF 2012 7TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION, VOLS I-VI, 2012, : 896 - 898
  • [42] A Provably Secure and Efficient Identity-Based Anonymous Authentication Scheme for Mobile Edge Computing
    Jia, Xiaoying
    He, Debiao
    Kumar, Neeraj
    Choo, Kim-Kwang Raymond
    IEEE SYSTEMS JOURNAL, 2020, 14 (01): : 560 - 571
  • [43] A blockchain-based provably secure anonymous authentication for edge computing-enabled IoT
    Zhang, Shiqiang
    Cao, Dongzhi
    JOURNAL OF SUPERCOMPUTING, 2024, 80 (05): : 6778 - 6808
  • [44] Smart Applications in Edge Computing: Overview on Authentication and Data Security
    Li, Xinghua
    Chen, Ting
    Cheng, Qingfeng
    Ma, Siqi
    Ma, Jianfeng
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (06) : 4063 - 4080
  • [45] A Cloud-based IoMT Data Sharing Scheme with Conditional Anonymous Source Authentication
    Wang, Yan-Ping
    Wang, Xiao-Fen
    Dai, Hong-Ning
    Zhang, Xiao-Song
    Su, Yu
    Imran, Muhammad
    Nasser, Nidal
    2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, : 2915 - 2920
  • [46] A Traceable and Anonymous Authentication Scheme Based on Elliptic Curve for Wireless Sensor Network
    Chang F.
    Cui J.
    Wang L.
    Cui, Jie (cuijie@mail.ustc.edu.cn), 2011, Science Press (54): : 2011 - 2020
  • [47] Publicly Traceable Attribute-Based Anonymous Authentication and Its Application to Voting
    Li, Peng
    Lai, Junzuo
    Wu, Yongdong
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [48] Practical Preserving Identity-Privacy Anonymous Data Sharing in Cloud Computing
    Zhang, Jianhong
    Zhen, Weina
    2014 IEEE 17TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE), 2014, : 1629 - 1636
  • [49] Blacklisting Based Anonymous Authentication Scheme for Sharing Economy
    Ozbay, Cavit
    Levi, Albert
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (02) : 828 - 846
  • [50] Event-oriented linkable and traceable anonymous authentication and its application to voting
    Li, Peng
    Lai, Junzuo
    Wu, Yongdong
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 60