Skip to main content

Research on Internet of Vehicles’ Privacy Protection Based on Tamper-Proof with Ciphertext

  • Conference paper
  • First Online:
Security, Privacy, and Anonymity in Computation, Communication, and Storage (SpaCCS 2017)

Abstract

With the development of the internet of vehicles, the safety of the wireless network communication in the internet of vehicles and the privacy protection of users are in need of an immediate solution. In order to address the interception and tampering by an attacker of the contents among the vehicle mobile terminals, and their consequence of the privacy leakage of the location, and the user’s activity tracks and also the consequence of the user’s receiving the wrong information due to the tampering of the message, this essay comes up with a solution of tamper-proof ciphertext of the revised ciphertext policy attribute-based encryption, which to some degree has reduced the risk of the leakage of the user’s information. This solution realize the encryption protection of the contents of the vehicle mobile terminals by destroying the structure extension of the ciphertext, achieves the goal of non-extensibility security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Chang, W., Zheng, H., Wu, J.: On the RSU-based secure distinguishability among vehicular flows. In: IEEE/ACM 25th International Symposium on Quality of Service (IWQoS), pp. 1–6. IEEE (2017)

    Google Scholar 

  2. Peng, X., Shen, Q., Li, W., et al.: Data dissemination based on trajectory for sparse VANETs. J. Softw. 27(Suppl.(1)), 59–70 (2016)

    Google Scholar 

  3. Wang, D., Li, D., Li, X., et al.: An analysis of anonymity on capacity finite social spots based pseudonym changing for location privacy in VANETs. In: 2015 12th International Conference on Fuzzy Systems and Knowledge Discovery, Zhangjiajie, pp. 763–767 (2015)

    Google Scholar 

  4. Bttner, C., Bartels, F., Huss, S.A.: Real-world evaluation of an anonymous authenticated key agreement protocol for vehicular ad-hoc networks. In: IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications, Abu Dhabi, pp. 651–658 (2015)

    Google Scholar 

  5. Rajput, U., Abbas, F., Oh, H.A.: A hierarchical privacy preserving pseudonymous authentication protocol for VANET. IEEE Access PP(99), 1 (2016)

    Google Scholar 

  6. Tyagi, A.K., Sreenath, N.: Location privacy preserving techniques for location based services over road networks. In: International Conference on Communications and Signal Processing, Melmaruvathur, pp. 1319–1326 (2015)

    Google Scholar 

  7. Emara, K.: Location privacy in vehicular networks. In: 2013 IEEE 14th International Symposium on A World of Wireless, Mobile and Multimedia Networks, Madrid, pp. 1–2 (2013)

    Google Scholar 

  8. Li, J., Lu, H., Guizani, M.: ACPN: a novel authentication framework with conditional privacy-preservation and non-repudiation for VANETs. IEEE Trans. Parallel Distrib. Syst. 26(4), pp. 938–948 (2015)

    Google Scholar 

  9. Xie, Y., Wu, L., Zhang, Y., et al.: Anonymous mutual authentication and key agreement protocol in multi-server architecture for VANETs. J. Comput. Res. Dev. 10, 2323–2333 (2016)

    Google Scholar 

  10. Yeh, L.Y., Huang, J.L.: PBS: a portable billing scheme with fine-grained access control for service-oriented vehicular networks. IEEE Trans. Mob. Comput. 13(11), 2606–2619 (2014)

    Article  Google Scholar 

  11. Wang, S., Liang, K., Liu, J.K., et al.: Attribute-based data sharing scheme revisited in cloud computing. IEEE Trans. Inform. Forensics Secur. 11(8), 1 (2016)

    Google Scholar 

  12. Luo, E., Liu, Q., Wang, G.: Hierarchical multi-authority and attribute-based encryption friend discovery scheme in mobile social networks. IEEE Commun. Lett. 20(9), 1772–1775 (2016)

    Article  Google Scholar 

  13. Yadav, U.C., Ali, S.T.: Ciphertext policy-hiding attribute-based encryption. In: International Conference on Advances in Computing, Communications and Informatics (ICACCI), Kochi, pp. 2067–2071 (2015)

    Google Scholar 

  14. Ning, J., Dong, X., Cao, Z., et al.: White-box traceable ciphertext-policy attribute-based encryption supporting flexible attributes. IEEE Trans. Inform. Forensics Secur. 10(6), 1 (2015)

    Article  Google Scholar 

  15. Zhou, Z., Huang, D., Wang, Z.: Efficient privacy-preserving ciphertext-policy attribute-based encryption and broadcast encryption. IEEE Trans. Comput. 64(1), 126–138 (2013)

    Article  MathSciNet  MATH  Google Scholar 

  16. Wei, J., Liu, W., Hu, X.: Provable secure attribute based authenticated key exchange protocols in the standard model. J. Softw. 25(10), 2397–2408 (2014)

    MathSciNet  Google Scholar 

  17. Zhang, S., Wang, G., Liu, Q., et al.: A trajectory privacy-preserving scheme based on query exchange in mobile social networks. Soft. Comput. (2017). https://doi.org/10.1007/s00500-017-2676-6

  18. Phuong, T.V.X., Yang, G., Susilo, W.: Hidden ciphertext policy attribute-based encryption under standard assumptions. IEEE Trans. Inform. Forensics Secur. 11(1), 1 (2015)

    Google Scholar 

  19. Luo, E., Liu, Q., Abawajy, J.H., et al.: Privacy-preserving multi-hop profile-matching protocol for proximity mobile social networks. Future Gener. Comput. Syst. 68, 222–233 (2017)

    Article  Google Scholar 

  20. Zhang, S., Choo Raymond, K.W., Liu, Q., et al.: Enhancing privacy through uniform grid and caching in location-based services. In: Future Generation Computer Systems (2017). https://doi.org/10.1016/j.future.2017.06.022

  21. Xu, J., Wen, Q., Li, W., et al.: Circuit ciphertext-policy attribute-based hybrid encryption with verifiable delegation in cloud computing. IEEE Trans. Parallel Distrib. Syst. 27(1), 119–129 (2016)

    Article  Google Scholar 

  22. Choi, H., Kim, I., Yoo, J.: Secure and efficient protocol for vehicular ad hoc network with privacy preservation. EURASIP J. Wirel. Commun. Netw. 2011(1), 1–15 (2011)

    Article  Google Scholar 

Download references

Acknowledgments

This work is supported in part by the National Natural Science Foundation of China under Grants 61632009, 61472451 and 61772194, in part by the Guangdong Provincial Natural Science Foundation under Grant 2017A030308006 and High-Level Talents Program of Higher Education in Guangdong Province under Grant 2016ZJ01.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Guojun Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wang, Q., Duan, G., Luo, E., Wang, G. (2017). Research on Internet of Vehicles’ Privacy Protection Based on Tamper-Proof with Ciphertext. In: Wang, G., Atiquzzaman, M., Yan, Z., Choo, KK. (eds) Security, Privacy, and Anonymity in Computation, Communication, and Storage. SpaCCS 2017. Lecture Notes in Computer Science(), vol 10656. Springer, Cham. https://doi.org/10.1007/978-3-319-72389-1_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-72389-1_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-72388-4

  • Online ISBN: 978-3-319-72389-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics