A real-time parking service with proxy re-encryption in vehicular cloud computing

被引:5
|
作者
Lin, Iuon-Chang [1 ,2 ]
Cheng, Chen-Yang [3 ]
Chen, Hsiang-Yu [1 ]
机构
[1] Natl Chung Hsing Univ, Dept Management Informat Syst, Taichung, Taiwan
[2] Asia Univ, Dept Photon & Commun Engn, Taichung, Taiwan
[3] Natl Taipei Univ Technol, Dept Ind Engn & Management, Taipei, Taiwan
关键词
Vehicular cloud computing; Re-encryption; Mutual authentication;
D O I
10.1016/j.engappai.2019.05.013
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Find parking space is a big problem in almost every metro city in the world. It always leads to driver frustration, traffic congestion and air pollution. As a result, drivers highly desire real-time parking service. In this paper, we proposed a new real-time parking service in vehicular cloud computing. When drivers send parking service request to vehicular cloud, vehicular cloud will compute the suitable parking lot for drivers. Our proposed scheme not only provides real-time parking lot information for drivers, but also integrates proxy re-encryption into the scheme in protecting service provider's benefit. We also show that our scheme achieves many security requirements such as mutual authentication, user anonymity, data confidentiality, traceability and revocability.
引用
收藏
页码:208 / 213
页数:6
相关论文
共 50 条
  • [41] Efficient Unidirectional Proxy Re-Encryption
    Chow, Sherman S. M.
    Weng, Jian
    Yang, Yanjiang
    Deng, Robert H.
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2010, 2010, 6055 : 316 - +
  • [42] Verifiable Auditing Protocol with Proxy Re-Encryption for Outsourced Databases in Cloud
    GAO Ziyuan
    WANG Baocang
    LIU Hequn
    LU Ke
    ZHAN Yu
    Wuhan University Journal of Natural Sciences, 2018, 23 (02) : 120 - 128
  • [43] Proxy Re-encryption from Lattices
    Kirshanova, Elena
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2014, 2014, 8383 : 77 - 94
  • [44] On the Security of a Conditional Proxy Re-Encryption
    Zhang, Xi
    Chen, Min-Rong
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2009, E92A (10) : 2644 - 2647
  • [45] Time-based proxy re-encryption scheme for secure data sharing in a cloud environment
    Liu, Qin
    Wang, Guojun
    Wu, Jie
    INFORMATION SCIENCES, 2014, 258 : 355 - 370
  • [46] Hierarchical conditional proxy re-encryption
    Fang, Liming
    Susilo, Willy
    Ge, Chunpeng
    Wang, Jiandong
    COMPUTER STANDARDS & INTERFACES, 2012, 34 (04) : 380 - 389
  • [47] Fuzzy conditional proxy re-encryption
    FANG LiMing
    WANG JianDong
    GE ChunPeng
    REN YongJun
    ScienceChina(InformationSciences), 2013, 56 (05) : 211 - 223
  • [48] Proxy re-encryption with keyword search
    Shao, Jun
    Cao, Zhenfu
    Liang, Xiaohui
    Lin, Huang
    INFORMATION SCIENCES, 2010, 180 (13) : 2576 - 2587
  • [49] Conditional Proxy Broadcast Re-Encryption
    Chu, Cheng-Kang
    Weng, Jian
    Chow, Sherman S. M.
    Zhou, Jianying
    Deng, Robert H.
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2009, 5594 : 327 - +
  • [50] On the security model for proxy re-encryption
    Wang, Xu'an
    Yang, Xiaoyuan
    Zhang, Minqing
    Du, Xiaoni
    Journal of Information and Computational Science, 2010, 7 (09): : 1951 - 1958