Abstract
Vehicular cloud computing is a technological paradigm shifting which takes advantage of cloud computing to provide vehicles with useful computing resources and services on the roads. The advancement in smart vehicles and information technologies motivate researchers and industries to pay attention to the combination of vehicular network with cloud computing in recent. In order to make the emerging vehicular cloud computing viable, security issues must be considered. Especially, privacy is one of the critical security issues in vehicular cloud services as well as vehicular communications since a third-party entity may be involved in cloud management and operations. In this paper, we propose an anonymous vehicle-to-infrastructure cloud access management system in which identity and location privacy of service requesting vehicles are prevented from not only a global eavesdropper but also any single system management entity. We devise pseudonymous service access tokens for vehicles and RSU-local revocation mechanism to reduce the size of revocation list containing revoked pseudonyms in the proposed system.
Similar content being viewed by others
Notes
We assume that the selection of RSUs would be possible because modern smart vehicles can equip a navigation system with digital maps.
References
Abid H, Phuong LTT, Wang J, Lee S, Qaisar S (2011) V-cloud: vehicular cyber-physical systems and cloud computing. In: Proc. of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies (ISABEL’11). ACM, Barcelona, Spain, pp 165:1–165:5
Abuelela M, Olariu S (2010) Taking vanet to the clouds. In: Proc. of the 8th International Conference on Advances in Mobile Computing and Multimedia (MoMM’10). ACM, Paris, pp 6–13
Boneh D, Franklin M (2001) Identity-based encryption from the weil pairing. In: Advances in Cryptology–CRYPTO, LNCS, vol. 2139. Springer, pp 213–229
Boneh D, Lynn B, Shacham H (2001) Short signatures from the weil pairing. In: Advances in Cryptology–ASIACRYPT, LNCS, vol. 2248. Springer, pp 514–532
Calandriello G, Papadimitratos P, Hubaux JP, Lioy A (2007) Efficient and robust pseudonymous authentication in vanet. In: Proc. of the 4th ACM International Workshop on Vehicular Ad Hoc Networks (VANET’07). ACM, Montreal, Quebec, pp 19–28
Cha JC, Cheon JH (2003) An identity-based signature from gap diffie-hellman groups. In: International Conference on Theory and Practice in Public Key Cryptography—PKC, LNCS, vol 2567. Springer, pp 18–30
Gentry C, Silverberg A (2002) Hierarchical id-based cryptography. In: Advances in Cryptology—ASIACRYPT, LNCS, vol. 2501. Springer, pp 548–566
Gu L, Zeng D, Guo S, (2013) Vehicular cloud computing: a survey. In: Proc. of 2013 IEEE Globecom Workshops. IEEE, Atlanta, pp 403–407
Kim JY, Choi HK, Copeland JA (2010) An efficient authentication scheme for security and privacy perservation in v2i communications. In: Proc. of the (2010) IEEE vehicular technology conference fall (VTC 2010-fall). IEEE, Ottawa, pp 1–6
Lee E, Lee EK, Gerla M, Oh SY (2013) Vehicular cloud networking: architecture and design principles. IEEE Commun Mag 52(2):148–155
Li J, Zhang F, Wang Y (2006) A new hierarchical id-based cryptosystem and cca-secure pke. Emergind Directions in Embedded and Ubiquitous Computing, LNCS, vol. 4907. Springer, pp 362–371
Li J, Chen X, Li M, Li J, Lee PP, Lou W (2014) Secure deduplication with efficient and reliable convergent key management. IEEE Trans Parallel Distrib Syst 25(6):1615–1625
Libert B, Quisquater JJ (2002) On constructing certificateless cryptosystems from identity based encryption. In: Public key cryptography—PKC, LNCS. vol. 2567. Springer, pp 18–30
Lin X, Sun X, Ho PH, Shen X (2007) Gsis: a secure and privacy preserving protocol for vehicular communications. IEEE Trans Veh Technol 56(6):3442–3456
Lu R, Lin X, Zhu H, Ho PH, Shen X (2008) Ecpp: efficient conditional privacy preservation protocol for secure vehicular communications. In: Proc. of the 28th IEEE International Conference on Computer Communications (INFOCOM’08). IEEE, Phoenix, pp 1229–1237
Lu R, Lin X, Shi Z, Shen XS (2009) A novel anonymous mutual authentication protocol with provable link-layer location privacy. IEEE Trans Veh Technol 58(3):1454–1466
Olariu S, Hristov T, Yan G (2013) The next paradigm shift: From vehicular networks to vehicular clouds. In: The cutting edge directions, mobile ad hoc networking, pp 645–700
Park Y, Sur C, Jung CD, Rhee KH (2010) An efficient anonymous authentication protocol for secure vehicular communications. J Inf Sci Eng 26(3):785–800
Park Y, Sur C, Rhee KH (2014) A privacy preserving v2i service access management system for vehicular clouds. In: Proc. of the 6th International Workshop on Managing Insider Security Threaths (MIST 2014)
Raya M, Hubaux JP (2007) Securing vehicular ad hoc networks. J Comput Secur 15(1):39–68
Sampigethaya K, Li M, Huang L, Poovendran R (2007) Amoeba: robust location privacy scheme for vanet. IEEE J Sel Areas Commun 25(8):1569–1589
Sun Y, Lu R, Lin X, Shen X (2010) An efficient pseudonymous authentication scheme with strong privacy preservation for vehicular communications. IEEE Trans Veh Technol 59(7):3589–3603
Sur C, Park Y, Rhee KH (2014) An efficient and secure navigation protocol based on vehicular cloud. Int J Comput Math. doi:10.1080/00207160.2014.934685
Whaiduzzaman M, Sookhak M, Gani A, Buyya R (2014) A survey on vehicular cloud computing. J Netw Comput Appl 40:325–344
Whyte W, Weimerskirch A, Kumar V, Hehn T (2013) A security credential management system for v2v communications. In: Proc. of the IEEE Vehicular Networking Conference (VNC’13). IEEE, Boston, pp 1–8
Yu R, Zhang Y, Gjessing S, Xia W, Yang K (2013) Toward cloud-based vehicular networks with efficient resource management. IEEE Netw 27(5):48–55
Zhang C, Lu R, Ho PH, Chen A (2008) A location privacy preserving authentication scheme in vehicular networks. In: Proc. of the IEEE Wireless Communications and Networking Conference (WCNC’08). IEEE, Las Vegas, pp 2543–2548
Zhu X, Jiang S, Wang L, Li H (2014) Efficient privacy-preserving authentication for vehicular ad hoc networks. IEEE Trans Veh Technol 63(2):907–919
Acknowledgments
This research was supported by the National Research Foundation of Korea (NRF) funded by the Ministry of Science, ICT and Future Planning (MSIP) (No. NRF-2014R1A2A1A11052981), and partially supported by Next-Generation Information Computing Development Program funded by the MSIP (No. 2011-0029927).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Park, Y., Sur, C. & Rhee, KH. Pseudonymous authentication for secure V2I services in cloud-based vehicular networks. J Ambient Intell Human Comput 7, 661–671 (2016). https://doi.org/10.1007/s12652-015-0309-4
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12652-015-0309-4