Skip to main content

Secure Data Sharing for Vehicular Ad-hoc Networks Using Cloud Computing

  • Conference paper
  • First Online:
Ad Hoc Networks

Abstract

During the last decade, researchers and developers have been attracted to Vehicular Ad-hoc Network (VANET) research area due to its significant applications, including efficient traffic management, road safety, and entertainment. Several resources such as communication, on-board unit, storage, computing, and endless battery are embedded in the vehicles, which are used for enhancing Intelligent Transportation Systems (ITSs). One of the crucial challenges for VANETs is to securely share an important information among vehicles. In some cases, the data owner is also not available and unable to control the data sharing process, i.e., sharing data with a new user or revoking the existing user. In this paper, we present a new method to address the data sharing problem and delegate the management of data to a Trusted Third Party (TPA) based on bilinear pairing technique. To achieve this goal, we use a cloud computing, as the mainstream platform of utility computing paradigm, to store the huge amount of data and perform the re-encryption process securely.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Hartenstein, H., Laberteaux, K.P.: A tutorial survey on vehicular ad hoc networks. IEEE Commun. Mag. 46(6), 164–171 (2008)

    Article  Google Scholar 

  2. Al-Sultan, S., Al-Doori, M.M., Al-Bayatti, A.H., Zedan, H.: A comprehensive survey on vehicular ad hoc network. J. Netw. Comput. App. 37, 380–392 (2014)

    Article  Google Scholar 

  3. Toor, Y., Muhlethaler, P., Laouiti, A., Fortelle, A.D.L.: Vehicle ad hoc networks: applications and related technical issues. IEEE Commun. Surv. Tut. 10, 74–88 (2008)

    Article  Google Scholar 

  4. Dimitrakopoulos, G., Demestichas, P.: Intelligent transportation systems. IEEE Veh. Tech. Mag. 5, 77–84 (2010)

    Article  Google Scholar 

  5. Olariu, S., Hristov, T., Yan, G.: The Next Paradigm Shift: From Vehicular Networks to Vehicular Clouds Mobile Ad Hoc Networking. Wiley, Hoboken (2013)

    Google Scholar 

  6. Whaiduzzaman, M., Sookhak, M., Gani, A., Buyya, R.: A survey on vehicular cloud computing. J. Netw. Comput. App. 40, 325–344 (2014)

    Article  Google Scholar 

  7. Abuelela, M., Olariu, S.: Taking VANET to the clouds. In: Proceedings of the 8th International ACM Conference on Advances in Mobile Computing and Multimedia, pp. 6–13, New York (2010)

    Google Scholar 

  8. Yan, G., Wen, D., Olariu, S., Weigle, M.C.: Security challenges in vehicular cloud computing. IEEE Trans. Intel. Transp. Syst. 14, 284–294 (2013)

    Article  Google Scholar 

  9. Faouzi, N.-E.E., Leung, H., Kurian, A.: Data fusion in intelligent transportation systems: progress and challenges a survey. Inf. Fusion. 12, 4–10 (2011)

    Article  Google Scholar 

  10. Zeadally, S., Hunt, R., Chen, Y.-S., Irwin, A., Hassan, A.: Vehicular ad hoc networks (VANETS): status, results, andchallenges. Tele Commun. Syst. 50, 217–241 (2012)

    Article  Google Scholar 

  11. Harri, J., Filali, F., Bonnet, C.: Mobility models for vehicular ad hoc networks: a survey and taxonomy. IEEE Commun. Surv. Tut. 11, 19–41 (2009)

    Article  Google Scholar 

  12. Bitam, S., Mellouk, A., Zeadally, S.: Bio-inspired routing algorithms survey for vehicular ad hoc networks. IEEE Commun. Surv. Tut. 17, 843–867 (2015)

    Article  Google Scholar 

  13. Sookhak, M., Talebian, H., Ahmed, E., Gani, A., Khan, M.K.: A review on remote data auditing in single cloud server: taxonomy and open issues. J. Netw. Comput. App. 43, 121–141 (2014)

    Article  Google Scholar 

  14. Sookhak, M., Gani, A., Talebian, H., Akhunzada, A., Khan, S.U., Buyya, R., Zomaya, A.Y.: Remote data auditing in cloud computing environments: a survey, taxonomy, and open issues. ACM Comput. Surv. 47, 65:1–65:34 (2015)

    Google Scholar 

  15. Sookhak, M., Akhunzada, A., Gani, A., Khan, M.K., Anuar, N.B.: Towards dynamic remote data auditing in computational clouds. Sci. World J., 1–12 (2014)

    Google Scholar 

  16. Sookhak, M., Gani, A., Khan, M.K., Buyya, R.: Dynamic remote data auditing for securing big data storage in cloud computing. Inf. Sci. (2015, in Press)

    Google Scholar 

  17. Yousafzai, A., Gani, A., Noor, R.M., Sookhak, M., Talebian, H., Shiraz, M., Khan, M.K.: Cloud resource allocation schemes: review, taxonomy, and opportunities. Knowl. Inf. Syst, 1–35 (2016)

    Google Scholar 

  18. Shiraz, M., Sookhak, M., Gani, A., Shah, S.A.A.: A study on the critical analysis of computational offloading frameworks for mobile cloud computing. J. Netw. Comput. App. 47, 47–60 (2015)

    Article  Google Scholar 

  19. Hussain, R., Abbas, F., Son, J., Oh, H.: TIaaS: secure cloud-assisted traffic information dissemination in vehicular ad hoc networks cluster. In: 13th IEEE/ACM International Symposium on Cloud and Grid Computing (CCGrid), pp. 178–179, Delft (2013)

    Google Scholar 

  20. Arif, S., Olariu, S., Wang, J., Yan, G., Yang, W., Khalil, I.: Datacenter at the airport: reasoning about time-dependent parking lot occupancy. IEEE Trans. Parallel Distrib. Syst. 23, 2067–2080 (2012)

    Article  Google Scholar 

  21. Blaze, M., Bleumer, G., Strauss, M.: Divertible protocols and atomic proxy cryptography. In: International Conference on the Theory and Application of Cryptographic Techniques, pp. 127–144 (1998)

    Google Scholar 

  22. Ivan, A., Dodis, Y.: Proxy cryptography revisited. In: Proceedings of 10th Annual the Network and Distributed System Security Symposium (NDSS), pp. 1–20, California (2003)

    Google Scholar 

  23. Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. 9, 1–30 (2006)

    Article  MATH  Google Scholar 

  24. ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. In: Blakley, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 10–18. Springer, Heidelberg (1985). doi:10.1007/3-540-39568-7_2

    Chapter  Google Scholar 

  25. Tysowski, P.K., Hasan, M.A.: Re-encryption-based key management towards secure and scalable mobile applications in clouds. In: IACR Cryptology ePrint Archive, pp. 1–10 (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to F. Richard Yu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Sookhak, M., Yu, F.R., Tang, H. (2017). Secure Data Sharing for Vehicular Ad-hoc Networks Using Cloud Computing. In: Zhou, Y., Kunz, T. (eds) Ad Hoc Networks. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 184. Springer, Cham. https://doi.org/10.1007/978-3-319-51204-4_25

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-51204-4_25

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-51203-7

  • Online ISBN: 978-3-319-51204-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics