Secure outsourced attribute-based signcryption for cloud-based Internet of Vehicles in a smart city.

Citation metadata

From: Annales des Telecommunications(Vol. 76, Issue 9-10)
Publisher: Springer
Document Type: Report; Brief article
Length: 352 words

Document controls

Main content

Abstract :

Keywords: Attribute-based signcryption; Signcryption; Unsigncryption; Cloud; Internet of Vehicles (IoV) Abstract The rapid growth of wireless communication and sensing technology will lead to an Internet of Vehicles (IoV) that builds a large network with interactions among the vehicles, roadside infrastructure, and the surrounding environment. This will allow a large amount of data to be gathered from vehicles through IoV nodes. On the other hand, the cloud provides on-demand computing resources and self-service. Therefore, the vast amounts of data collected by the IoV can be deployed to the cloud, and an authorized user can access it anytime from anywhere via the Internet. However, privacy and authorized access of data are the main issues for the data stored in the cloud. To deal with the security issues in a cloud environment, an attribute-based signcryption (ABSC) was presented that provides confidentiality, authenticity, and sender secrecy of the data stored in the cloud. However, an extensive amount of modular exponential operations and pairing incur an unfavorable computational overhead during the signcryption and key-distributing process in ABSC. To deal with the above challenges, we present a novel secure outsourced attribute-based signcryption for a cloud-based Internet of Vehicles in a smart city (SOABSC-IoV). The proposed scheme provides data confidentiality, data authentication, and key issuing and decreases the signcryption computational load in ABSC. Furthermore, this work reduces the computational load at the IoV node and the authorized user's side by outsourcing the signcryption and unsigncryption algorithms. Finally, the experimental results demonstrate that our scheme is highly appropriate for cloud and IoV environments and has a lower computational complexity than the existing schemes. Author Affiliation: (1) School of Information and Software Engineering, University of Electronic Science and Technology of China, 610054, Chengdu, China (2) Department of Computer Science, National University of Computer and Emerging Sciences, Islamabad, Chiniot-Faisalabad Campus, 35400, Chiniot, Pakistan (3) School of Information Communication Engineering, University of Electronic Science and Technology of China, 610054, Chengdu, China (4) Department of Computer Science and Engineering, Ajay Kumar Garg Engineering College, 201009, Ghaziabad, India (a) nigaccna21@gmail.com Article History: Registration Date: 01/18/2021 Received Date: 06/24/2020 Accepted Date: 01/18/2021 Online Date: 02/12/2021 Byline:

Source Citation

Source Citation   

Gale Document Number: GALE|A679580252