Skip to main content

2015 | OriginalPaper | Buchkapitel

Eroca: A Framework for Efficiently Recovering Outsourced Ciphertexts for Autonomous Vehicles

verfasst von : Xu An Wang, Jianfeng Ma, Yinbin Miao, Kai Zhang

Erschienen in: Transactions on Computational Collective Intelligence XIX

Verlag: Springer Berlin Heidelberg

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In the near future, the next generation (5G) telecommunication network with high speed will become a reality. Autonomous vehicle system without drivers are a typical application of 5G network, for it can connect base stations, autonomous vehicles and computing centers such as traffic information clouds in a very flexible, truly mobile and powerful way. To ensure the security and privacy of autonomous vehicle system, a promise way is to encrypt the real time traffic information and upload the ciphertexts to the center cloud for easily sharing road traffic information among the vehicles. To share these real time traffic information without sacrificing privacy, attribute based encryption (ABE) and block ciphers like AES are promising tools for encrypting these large traffic information. But a basic fact for the autonomous vehicle system is that, the vehicles need to continuously update the traffic information for really catching the road’s real time traffic status, and these updates are often little compared with the status a moment ago. In this paper, we consider the problem of how to retrieve and update the data from the early encrypted file in the cloud efficiently. We propose the notion of attribute based encryption with sender recoverable (ABE-SR). Compared with ABE, ABE-SR can easily achieve message recoverable and updatable for the encrypter. We give a concrete ABE-SR scheme, discuss its features compared with the traditional ABE and prove its security. Based on ABE-SR, we propose a new framework for efficiently recovering outsourced ciphertexts for autonomous vehicles: Eroca. Finally, we give the roughly evaluation results, which show our proposal framework is practical.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy (SP07), pp. 321–334 (2007) Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy (SP07), pp. 321–334 (2007)
2.
Zurück zum Zitat Piretti, M., Traynor, P., McDaniel, P., Waters, B.: Secure attribute-based systems. In: ACM Conference on Computer and Communications Security (CCS06), pp. 99–112 (2006) Piretti, M., Traynor, P., McDaniel, P., Waters, B.: Secure attribute-based systems. In: ACM Conference on Computer and Communications Security (CCS06), pp. 99–112 (2006)
3.
Zurück zum Zitat Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457–473. Springer, Heidelberg (2005) CrossRef Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457–473. Springer, Heidelberg (2005) CrossRef
4.
Zurück zum Zitat Goyal, V., Omkant, P., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: ACM Conference on Computer and Communications Security (CCS06), pp. 89–98 (2006) Goyal, V., Omkant, P., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: ACM Conference on Computer and Communications Security (CCS06), pp. 89–98 (2006)
5.
Zurück zum Zitat Waters, B.: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 53–70. Springer, Heidelberg (2011) CrossRef Waters, B.: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 53–70. Springer, Heidelberg (2011) CrossRef
6.
Zurück zum Zitat Yu, S., Wang, C., Ren, K., Lou, W.: Achieving secure scalable and fine-grained data access control in cloud computing. In: Proceedings of the 29th Conference on Information Communications (INFOCOM 10), pp. 534–542. IEEE Press (2010) Yu, S., Wang, C., Ren, K., Lou, W.: Achieving secure scalable and fine-grained data access control in cloud computing. In: Proceedings of the 29th Conference on Information Communications (INFOCOM 10), pp. 534–542. IEEE Press (2010)
7.
Zurück zum Zitat Li, J., Chen, X., Li, J., Jia, C., Ma, J., Lou, W.: Fine-grained access control system based on outsourced attribute-based encryption. In: Crampton, J., Jajodia, S., Mayes, K. (eds.) ESORICS 2013. LNCS, vol. 8134, pp. 592–609. Springer, Heidelberg (2013) CrossRef Li, J., Chen, X., Li, J., Jia, C., Ma, J., Lou, W.: Fine-grained access control system based on outsourced attribute-based encryption. In: Crampton, J., Jajodia, S., Mayes, K. (eds.) ESORICS 2013. LNCS, vol. 8134, pp. 592–609. Springer, Heidelberg (2013) CrossRef
8.
Zurück zum Zitat Li, J., Huang, X., Li, J., Chen, X., Xiang, Y.: Securely utsourcing attribute-based encryption with checkability. IEEE Trans. Parallel Distrib. Syst. 25, 2201–2210 (2013). doi:10.1109/TPDS.2013.271 CrossRef Li, J., Huang, X., Li, J., Chen, X., Xiang, Y.: Securely utsourcing attribute-based encryption with checkability. IEEE Trans. Parallel Distrib. Syst. 25, 2201–2210 (2013). doi:10.​1109/​TPDS.​2013.​271 CrossRef
9.
Zurück zum Zitat Ostrovsky, R., Sahai, A., Waters, B.: Attribute-based encryption with non-monotonic access structures. In: ACM Conference on Computer and Communications Security (CCS07), pp. 195–203 (2007) Ostrovsky, R., Sahai, A., Waters, B.: Attribute-based encryption with non-monotonic access structures. In: ACM Conference on Computer and Communications Security (CCS07), pp. 195–203 (2007)
10.
Zurück zum Zitat Hur, J., Noh, D.: Attribute-based access control with efficient revocation in data outsourcing systems. IEEE Trans. Parallel Distrib. Syst. 22(7), 1214–1221 (2011)CrossRef Hur, J., Noh, D.: Attribute-based access control with efficient revocation in data outsourcing systems. IEEE Trans. Parallel Distrib. Syst. 22(7), 1214–1221 (2011)CrossRef
11.
Zurück zum Zitat Li, M., Yu, S., Zheng, Y., Ren, K., Lou, W.: Scalable and secure sharing of personal health records in cloud computing using attribute- based encryption. IEEE Trans. Parallel Distrib. Syst. 24(1), 131–143 (2013)CrossRef Li, M., Yu, S., Zheng, Y., Ren, K., Lou, W.: Scalable and secure sharing of personal health records in cloud computing using attribute- based encryption. IEEE Trans. Parallel Distrib. Syst. 24(1), 131–143 (2013)CrossRef
12.
Zurück zum Zitat Yang, K., Jia, X., Ren, K., Zhang, B., Xie, R.: DAC-MACS: effective data acces control for multi-authority cloud storage systems. IEEE Trans. Inf. Forensics Secur. 8(11), 1790–1801 (2013)CrossRef Yang, K., Jia, X., Ren, K., Zhang, B., Xie, R.: DAC-MACS: effective data acces control for multi-authority cloud storage systems. IEEE Trans. Inf. Forensics Secur. 8(11), 1790–1801 (2013)CrossRef
13.
Zurück zum Zitat Wei, P., Zheng, Y., Wang, X.: Public key encryption for the forgetful. Cryptology ePrint Arch. 2011, 197 (2011)MATH Wei, P., Zheng, Y., Wang, X.: Public key encryption for the forgetful. Cryptology ePrint Arch. 2011, 197 (2011)MATH
14.
Zurück zum Zitat Wei, P., Zheng, Y.: Efficient public key encryption admitting decryption by sender. In: De Capitani di Vimercati, S., Mitchell, C. (eds.) EuroPKI 2012. LNCS, vol. 7868, pp. 37–52. Springer, Heidelberg (2013) CrossRef Wei, P., Zheng, Y.: Efficient public key encryption admitting decryption by sender. In: De Capitani di Vimercati, S., Mitchell, C. (eds.) EuroPKI 2012. LNCS, vol. 7868, pp. 37–52. Springer, Heidelberg (2013) CrossRef
15.
Zurück zum Zitat Sahai, A., Seyalioglu, H., Waters, B.: Dynamic credentials and ciphertext delegation for attribute-based encryption. In: Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. LNCS, vol. 7417, pp. 199–217. Springer, Heidelberg (2012) CrossRef Sahai, A., Seyalioglu, H., Waters, B.: Dynamic credentials and ciphertext delegation for attribute-based encryption. In: Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. LNCS, vol. 7417, pp. 199–217. Springer, Heidelberg (2012) CrossRef
16.
Zurück zum Zitat Lee, K., Choi, S.G., Lee, D.H., Park, J.H., Yung, M.: Self-updatable encryption: time constrained access control with hidden attributes and better efficiency. In: Sako, K., Sarkar, P. (eds.) ASIACRYPT 2013, Part I. LNCS, vol. 8269, pp. 235–254. Springer, Heidelberg (2013) CrossRef Lee, K., Choi, S.G., Lee, D.H., Park, J.H., Yung, M.: Self-updatable encryption: time constrained access control with hidden attributes and better efficiency. In: Sako, K., Sarkar, P. (eds.) ASIACRYPT 2013, Part I. LNCS, vol. 8269, pp. 235–254. Springer, Heidelberg (2013) CrossRef
17.
Zurück zum Zitat Yang, K., Jia, X., Ren, K., Xie, R., Huang, L.: Enabling efficient access control with dynamic policy updating for big data in the cloud. In: INFOCOM14, pp. 2013–2021. IEEE (2014) Yang, K., Jia, X., Ren, K., Xie, R., Huang, L.: Enabling efficient access control with dynamic policy updating for big data in the cloud. In: INFOCOM14, pp. 2013–2021. IEEE (2014)
18.
Zurück zum Zitat Chen, X., Li, J., Weng, J., Ma, J., Lou, W.: Verifiable computation over large database with incremental updates. In: Kutyłowski, M., Vaidya, J. (eds.) ICAIS 2014, Part I. LNCS, vol. 8712, pp. 148–162. Springer, Heidelberg (2014) Chen, X., Li, J., Weng, J., Ma, J., Lou, W.: Verifiable computation over large database with incremental updates. In: Kutyłowski, M., Vaidya, J. (eds.) ICAIS 2014, Part I. LNCS, vol. 8712, pp. 148–162. Springer, Heidelberg (2014)
19.
Zurück zum Zitat Lai, J., Deng, R.H., Pang, H., Weng, J.: Verifiable computation on outsourced encrypted data. In: Kutyłowski, M., Vaidya, J. (eds.) ICAIS 2014, Part I. LNCS, vol. 8712, pp. 273–291. Springer, Heidelberg (2014) Lai, J., Deng, R.H., Pang, H., Weng, J.: Verifiable computation on outsourced encrypted data. In: Kutyłowski, M., Vaidya, J. (eds.) ICAIS 2014, Part I. LNCS, vol. 8712, pp. 273–291. Springer, Heidelberg (2014)
Metadaten
Titel
Eroca: A Framework for Efficiently Recovering Outsourced Ciphertexts for Autonomous Vehicles
verfasst von
Xu An Wang
Jianfeng Ma
Yinbin Miao
Kai Zhang
Copyright-Jahr
2015
Verlag
Springer Berlin Heidelberg
DOI
https://doi.org/10.1007/978-3-662-49017-4_8