Secure crowd-sensing protocol for fog-based vehicular cloud

Future Generation Computer Systems - Tập 120 - Trang 61-75 - 2021
Lewis Nkenyereye1, S. M. Riazul Islam2, Muhammad Bilal3, M. Abdullah‐Al‐Wadud4, Atif Alamri5, Anand Nayyar6
1Department of Computer and Information Security, Sejong University, Seoul, Republic of Korea
2Department of Computer Science and Engineering, Sejong University, Seoul, Republic of Korea
3Department of Computer Engineering, Hankuk University of Foreign Studies, Republic of Korea
4Department of Software Engineering, College of Computer and Information Sciences, King Saud University, Riyadh 11543, Saudi Arabia
5Research Chair of Pervasive and Mobile Computing, King Saud University, Riyadh 11543, Saudi Arabia
6Faculty of Information Technology, Duy Tan University, Da Nang, Viet Nam

Tóm tắt

Từ khóa


Tài liệu tham khảo

Y. Wang, Huge data for connected vehicles (white paper).

Ding, 2018, Smart cities on wheels: A newly emerging vehicular cognitive capability harvesting network for data transportation, IEEE Wirel. Commun., 25, 160, 10.1109/MWC.2017.1700151

Ni, 2017, Security, privacy, and fairness in fog-based vehicular crowdsensing, IEEE Commun. Mag., 55, 146, 10.1109/MCOM.2017.1600679

Gong, 2016, Optimal task recommendation for mobile crowdsourcing with privacy control, IEEE Internet Things J., 3, 745, 10.1109/JIOT.2015.2512282

Olariu, 2013, The next paradigm shift: from vehicular networks to vehicular clouds, Mob. Ad Hoc Netw. Cut. Edge Dir., 56, 645, 10.1002/9781118511305.ch19

Nkenyereye, 2019, Towards secure and privacy preserving collision avoidance system in 5g fog based internet of vehicles, Future Gener. Comput. Syst., 95, 488, 10.1016/j.future.2018.12.031

Bonomi, 2012, Fog computing and its role in the internet of things, 13

Pereira, 2019, Assessing the reliability of fog computing for smart mobility applications in vanets, Future Gener. Comput. Syst., 94, 317, 10.1016/j.future.2018.11.043

Sarkar, 2016, Theoretical modelling of fog computing: A green computing paradigm to support iot applications, Iet Netw., 5, 23, 10.1049/iet-net.2015.0034

Zhang, 2018, Security and trust issues in fog computing: A survey, Future Gener. Comput. Syst., 88, 16, 10.1016/j.future.2018.05.008

Xiao, 2018, Mobile crowdsensing games in vehicular networks, IEEE Trans. Veh. Technol., 67, 1535, 10.1109/TVT.2016.2647624

Khelifi, 2019, Named data networking in vehicular ad hoc networks: State-of-the-art and challenges, IEEE Commun. Surv. Tutor., 22, 320, 10.1109/COMST.2019.2894816

Khelifi, 2020, A blockchain-based architecture for secure vehicular named data networks, Comput. Electr. Eng., 86, 10.1016/j.compeleceng.2020.106715

Bilal, 2014, Time aware least recent used (tlru) cache management policy in icn, 528

Bilal, 2017, A cache management scheme for efficient content eviction and replication in cache networks, IEEE Access, 5, 1692, 10.1109/ACCESS.2017.2669344

Kang, 2018, Privacy-preserved pseudonym scheme for fog computing supported internet of vehicles, IEEE Trans. Intell. Transp. Syst., 19, 2627, 10.1109/TITS.2017.2764095

Yao, 2019, Reliable and secure vehicular fog service provision, IEEE Internet Things J., 6, 734, 10.1109/JIOT.2018.2855718

Benzaid, 2016, Fast authentication in wireless sensor networks, Future Gener. Comput. Syst., 55, 362, 10.1016/j.future.2014.07.006

Yassine, 2020, Cloudlet-based intelligent auctioning agents for truthful autonomous electric vehicles energy crowdsourcing, IEEE Trans. Veh. Technol., 69, 5457, 10.1109/TVT.2020.2979941

Lèbre, 2020, Efficient vehicular crowdsourcing models in vanet for disaster management, 1

Li, 2017, Capability-based security enforcement in named data networking, IEEE/ACM Trans. Netw., 25, 2719, 10.1109/TNET.2017.2715822

Misra, 2017, Accconf: An access control framework for leveraging in-network cached data in the icn-enabled wireless edge, IEEE Trans. Dependable Secure Comput., 16, 5, 10.1109/TDSC.2017.2672991

Li, 2016, Attribute-based access control for icn naming scheme, IEEE Trans. Dependable Secure Comput., 15, 194, 10.1109/TDSC.2016.2550437

Venkatraman, 2018, Use of data visualisation for zero-day malware detection, Secur. Commun. Netw., 2018, 1, 10.1155/2018/1728303

Jiang, 2016, Ciphertext-policy attribute based encryption supporting access policy update, 39

Huang, 2017, Secure data access control with ciphertext update and computation outsourcing in fog computing for internet of things, IEEE Access, 5, 12941, 10.1109/ACCESS.2017.2727054

Tan, 2018, Comment on secure data access control with ciphertext update and computation outsourcing in fog computing for internet of things, IEEE Access, 6, 22464, 10.1109/ACCESS.2018.2827698

Sun, 2019, Security and privacy preservation in fog-based crowd sensing on the internet of vehicles, J. Netw. Comput. Appl., 134, 89, 10.1016/j.jnca.2019.02.018

Altayeb, 2013, A survey of vehicular ad hoc networks routing protocols, Int. J. Innov. Appl. Stud., 3, 829

Mohammad, 2011, Vanet architectures and protocol stacks: a survey, 95

R. Yu, Y. Zhang, S. Gjessing, W. Xia, K. Yang, Toward cloud-based vehicular networks with efficient resource management, arXiv preprint arXiv:1308.6208.

Kenney, 2011, Dedicated short-range communications (dsrc) standards in the united states, Proc. IEEE, 99, 1162, 10.1109/JPROC.2011.2132790

Olariu, 2011, Taking vanet to the clouds, Int. J. Pervasive Comput. Commun., 7, 7, 10.1108/17427371111123577

Eltoweissy, 2010, Towards autonomous vehicular clouds, 1

Hussain, 2014, Cooperation-aware vanet clouds: Providing secure cloud services to vehicular ad hoc networks, JIPS, 10, 103

Lee, 2014, Vehicular cloud networking: architecture and design principles, IEEE Commun. Mag., 52, 148, 10.1109/MCOM.2014.6736756

Lee, 2015, S-itsf: a service based intelligent transportation system framework for smart accident management, Human-centric Comput. Inf. Sci., 5, 34, 10.1186/s13673-015-0054-x

Alazab, 2020, Intelligent mobile malware detection using permission requests and api calls, Future Gener. Comput. Syst., 107, 509, 10.1016/j.future.2020.02.002

Mutlag, 2019, Enabling technologies for fog computing in healthcare iot systems, Future Gener. Comput. Syst., 90, 62, 10.1016/j.future.2018.07.049

P.G.V. Naranjo, Z. Pooranian, M. Shojafar, M. Conti, R. Buyya, Focan: A fog-supported smart city network architecture for management of applications in the internet of everything environments, J. Parallel Distrib. Comput.

Zhang, 2018, Data driven business rule generation based on fog computing, Future Gener. Comput. Syst., 89, 494, 10.1016/j.future.2018.07.003

Tang, 2019, Big data for cybersecurity: Vulnerability disclosure trends and dependencies, IEEE Trans. Big Data, 5, 317, 10.1109/TBDATA.2017.2723570

Yi, 2015, A survey of fog computing: concepts, applications and issues, 37

Lai, 2019, Efficient data request answering in vehicular ad-hoc networks based on fog nodes and filters, Future Gener. Comput. Syst., 93, 130, 10.1016/j.future.2018.09.065

Wazid, 2019, Design of secure key management and user authentication scheme for fog computing services, Future Gener. Comput. Syst., 91, 475, 10.1016/j.future.2018.09.017

Kai, 2016, Fog computing for vehicular ad-hoc networks: paradigms, scenarios, and issues, J. China Univ. Posts Telecommun., 23, 56, 10.1016/S1005-8885(16)60021-3

Mota, 2018, Towards scalable mobile crowdsensing through device-to-device communication, J. Netw. Comput. Appl., 122, 99, 10.1016/j.jnca.2018.08.010

H. Shen, G. Bai, Y. Hu, T. Wang, P2ta: Privacy-preserving task allocation for edge computing enhanced mobile crowdsensing, J. Syst. Archit.

Zhan, 2018, Incentive mechanism in platform-centric mobile crowdsensing: A one-to-many bargaining approach, Comput. Netw., 132, 40, 10.1016/j.comnet.2017.12.013

Alazab, 2014, A hybrid wrapper-filter approach for malware detection, J. Netw., 9, 2878

Li, 2016, Ksf-oabe: outsourced attribute-based encryption with keyword search function for cloud storage, IEEE Trans. Serv. Comput., 10, 715, 10.1109/TSC.2016.2542813

J. Li, Y. Wang, Y. Zhang, J. Han, Full verifiability for outsourced decryption in attribute based encryption, IEEE Trans. Serv. Comput.

Hussain, 2018, Secure and privacy-aware incentives-based witness service in social internet of vehicles clouds, IEEE Internet Things J., 5, 2441, 10.1109/JIOT.2018.2847249

Li, 2016, Flexible and fine-grained attribute-based data storage in cloud computing, IEEE Trans. Serv. Comput., 10, 785, 10.1109/TSC.2016.2520932

Li, 2017, User collusion avoidance cp-abe with efficient attribute revocation for cloud storage, IEEE Syst. J., 12, 1767, 10.1109/JSYST.2017.2667679

Bilal, 2020, Secure distribution of protected content in information-centric networking, IEEE Syst. J., 14, 1921, 10.1109/JSYST.2019.2931813

Bilal, 2019, Network-coding approach for information-centric networking, IEEE Syst. J., 13, 1376, 10.1109/JSYST.2018.2862913

Barka, 2018, Behavior-aware uav-assisted crowd sensing technique for urban vehicular environments, 1

Choon, 2003, An identity-based signature from gap diffie-hellman groups, 18

Boneh, 2001, Identity-based encryption from the weil pairing, 213

Boneh, 2005, Hierarchical identity based encryption with constant size ciphertext, 440

Goyal, 2006, Attribute-based encryption for fine-grained access control of encrypted data, 89

Cheung, 2007, Provably secure ciphertext policy abe, 456

Delerablée, 2008, Dynamic threshold public-key encryption, 317

Nkenyereye, 2015, A fine-grained privacy preserving protocol over attribute based access control for vanets, JoWUA, 6, 98

E. Yeh, J. Choi, N. Prelcic, C. Bhat, R. Heath Jr, Security in automotive radar and vehicular networks, Microw. J.

He, 2015, An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks, IEEE Trans. Inf. Forensics Secur., 10, 2681, 10.1109/TIFS.2015.2473820

K. Xue, P. He, X. Zhang, Q. Xia, D.S. Wei, H. Yue, F. Wu, A secure, efficient, and accountable edge-based access control framework for information centric networks, IEEE/ACM Trans. Netw.