location: Current position: Home >> Scientific Research >> Paper Publications

Dynamic Data Integrity Auditing Method Supporting Privacy Protection in Vehicular Cloud Environment

Hits:

Indexed by:期刊论文

First Author:Shao, Bilin

Co-author:Bian, Genqing,Wang, Yue,Su, Shenghao,Guo, Cheng

Date of Publication:2018-01-01

Journal:IEEE ACCESS

Included Journals:SCIE

Volume:6

Page Number:43785-43797

ISSN No.:2169-3536

Key Words:Cloud storage; VANETs; data integrity auditing; dynamic updating; privacy protection

Abstract:The advantages of cloud storage make more and more tenants outsource their data to the cloud. In the vehicular ad hoc networks, the sensors on the vehicle can collect road information being available for analyzing traffic conditions and their integrity must be guaranteed. Due to the limited storage capability, the vehicles tend to store the valid information have been collected on the cloud servers. However, unlike using local storage devices, the vehicles no longer have absolute control over the cloud data. Clearly, as the tenants of the cloud storage, the vehicles are most concerned about the data integrity. It is a pity that many existing integrity auditing schemes have some shortcomings, such as low efficiency in data dynamic updating, leakage of data privacy, and high auditing cost. To solve these problems, this paper proposes a dynamic data integrity auditing scheme supporting data privacy protection. First, build the hierarchical multiple branches tree data authentication structure in the initialization phase. Second, design a data integrity auditing scheme based on the bilinear pairing mapping technology and the Boneh-Lynn-Shacham digital signature mechanism, and describe the process of data dynamic updating in detail. Finally, security analysis and performance analysis are carried out in the evaluation of the scheme. The security analysis shows that the scheme can satisfy auditing correctness, support data privacy protection, resist forgery attack, and replay attack. The performance analysis shows that, compared with the existing scheme, the scheme reduces the time cost of data integrity auditing and dynamic updating.

Pre One:A secure and effcient mutual authentication and key agreement protocol with smart cards for wireless communications

Next One:Dynamic Defense Strategy Against DoS Attacks Over Vehicular Ad Hoc Networks Based on Port Hopping