Abstract
During the last decade, researchers and developers have been attracted to Vehicular Ad-hoc Network (VANET) research area due to its significant applications, including efficient traffic management, road safety, and entertainment. Several resources such as communication, on-board unit, storage, computing, and endless battery are embedded in the vehicles, which are used for enhancing Intelligent Transportation Systems (ITSs). One of the crucial challenges for VANETs is to securely share an important information among vehicles. In some cases, the data owner is also not available and unable to control the data sharing process, i.e., sharing data with a new user or revoking the existing user. In this paper, we present a new method to address the data sharing problem and delegate the management of data to a Trusted Third Party (TPA) based on bilinear pairing technique. To achieve this goal, we use a cloud computing, as the mainstream platform of utility computing paradigm, to store the huge amount of data and perform the re-encryption process securely.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Hartenstein, H., Laberteaux, K.P.: A tutorial survey on vehicular ad hoc networks. IEEE Commun. Mag. 46(6), 164–171 (2008)
Al-Sultan, S., Al-Doori, M.M., Al-Bayatti, A.H., Zedan, H.: A comprehensive survey on vehicular ad hoc network. J. Netw. Comput. App. 37, 380–392 (2014)
Toor, Y., Muhlethaler, P., Laouiti, A., Fortelle, A.D.L.: Vehicle ad hoc networks: applications and related technical issues. IEEE Commun. Surv. Tut. 10, 74–88 (2008)
Dimitrakopoulos, G., Demestichas, P.: Intelligent transportation systems. IEEE Veh. Tech. Mag. 5, 77–84 (2010)
Olariu, S., Hristov, T., Yan, G.: The Next Paradigm Shift: From Vehicular Networks to Vehicular Clouds Mobile Ad Hoc Networking. Wiley, Hoboken (2013)
Whaiduzzaman, M., Sookhak, M., Gani, A., Buyya, R.: A survey on vehicular cloud computing. J. Netw. Comput. App. 40, 325–344 (2014)
Abuelela, M., Olariu, S.: Taking VANET to the clouds. In: Proceedings of the 8th International ACM Conference on Advances in Mobile Computing and Multimedia, pp. 6–13, New York (2010)
Yan, G., Wen, D., Olariu, S., Weigle, M.C.: Security challenges in vehicular cloud computing. IEEE Trans. Intel. Transp. Syst. 14, 284–294 (2013)
Faouzi, N.-E.E., Leung, H., Kurian, A.: Data fusion in intelligent transportation systems: progress and challenges a survey. Inf. Fusion. 12, 4–10 (2011)
Zeadally, S., Hunt, R., Chen, Y.-S., Irwin, A., Hassan, A.: Vehicular ad hoc networks (VANETS): status, results, andchallenges. Tele Commun. Syst. 50, 217–241 (2012)
Harri, J., Filali, F., Bonnet, C.: Mobility models for vehicular ad hoc networks: a survey and taxonomy. IEEE Commun. Surv. Tut. 11, 19–41 (2009)
Bitam, S., Mellouk, A., Zeadally, S.: Bio-inspired routing algorithms survey for vehicular ad hoc networks. IEEE Commun. Surv. Tut. 17, 843–867 (2015)
Sookhak, M., Talebian, H., Ahmed, E., Gani, A., Khan, M.K.: A review on remote data auditing in single cloud server: taxonomy and open issues. J. Netw. Comput. App. 43, 121–141 (2014)
Sookhak, M., Gani, A., Talebian, H., Akhunzada, A., Khan, S.U., Buyya, R., Zomaya, A.Y.: Remote data auditing in cloud computing environments: a survey, taxonomy, and open issues. ACM Comput. Surv. 47, 65:1–65:34 (2015)
Sookhak, M., Akhunzada, A., Gani, A., Khan, M.K., Anuar, N.B.: Towards dynamic remote data auditing in computational clouds. Sci. World J., 1–12 (2014)
Sookhak, M., Gani, A., Khan, M.K., Buyya, R.: Dynamic remote data auditing for securing big data storage in cloud computing. Inf. Sci. (2015, in Press)
Yousafzai, A., Gani, A., Noor, R.M., Sookhak, M., Talebian, H., Shiraz, M., Khan, M.K.: Cloud resource allocation schemes: review, taxonomy, and opportunities. Knowl. Inf. Syst, 1–35 (2016)
Shiraz, M., Sookhak, M., Gani, A., Shah, S.A.A.: A study on the critical analysis of computational offloading frameworks for mobile cloud computing. J. Netw. Comput. App. 47, 47–60 (2015)
Hussain, R., Abbas, F., Son, J., Oh, H.: TIaaS: secure cloud-assisted traffic information dissemination in vehicular ad hoc networks cluster. In: 13th IEEE/ACM International Symposium on Cloud and Grid Computing (CCGrid), pp. 178–179, Delft (2013)
Arif, S., Olariu, S., Wang, J., Yan, G., Yang, W., Khalil, I.: Datacenter at the airport: reasoning about time-dependent parking lot occupancy. IEEE Trans. Parallel Distrib. Syst. 23, 2067–2080 (2012)
Blaze, M., Bleumer, G., Strauss, M.: Divertible protocols and atomic proxy cryptography. In: International Conference on the Theory and Application of Cryptographic Techniques, pp. 127–144 (1998)
Ivan, A., Dodis, Y.: Proxy cryptography revisited. In: Proceedings of 10th Annual the Network and Distributed System Security Symposium (NDSS), pp. 1–20, California (2003)
Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. 9, 1–30 (2006)
ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. In: Blakley, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 10–18. Springer, Heidelberg (1985). doi:10.1007/3-540-39568-7_2
Tysowski, P.K., Hasan, M.A.: Re-encryption-based key management towards secure and scalable mobile applications in clouds. In: IACR Cryptology ePrint Archive, pp. 1–10 (2011)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Sookhak, M., Yu, F.R., Tang, H. (2017). Secure Data Sharing for Vehicular Ad-hoc Networks Using Cloud Computing. In: Zhou, Y., Kunz, T. (eds) Ad Hoc Networks. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 184. Springer, Cham. https://doi.org/10.1007/978-3-319-51204-4_25
Download citation
DOI: https://doi.org/10.1007/978-3-319-51204-4_25
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-51203-7
Online ISBN: 978-3-319-51204-4
eBook Packages: Computer ScienceComputer Science (R0)