A privacy-preserving sensory data sharing scheme in Internet of Vehicles
Internet of Vehicles (IoV), which enables information gathering and disseminating among vehicles, roadside infrastructures and surrounding environments, has received considerable attention recently. However, the flourishing of IoV still faces several challenges in terms of location privacy preservat...
Saved in:
Main Authors: | , , , |
---|---|
Other Authors: | |
Format: | Article |
Language: | English |
Published: |
2020
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/141507 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
Summary: | Internet of Vehicles (IoV), which enables information gathering and disseminating among vehicles, roadside infrastructures and surrounding environments, has received considerable attention recently. However, the flourishing of IoV still faces several challenges in terms of location privacy preservation, vehicular sensory data collection and vehicular sensory data acquisition. Aiming at these challenges, in this paper, we propose a novel efficient and location privacy-preserving data sharing scheme with collusion resistance in IoV, which enables the collection and distribution of the data captured by vehicular sensors. During the vehicular sensory data collection phase, each vehicle structures the multi-dimensional sensory data captured at different locations and exploits the modified Paillier Cryptosystem to achieve the location privacy-preserving sensory data aggregation, while the data aggregation result of multiple vehicles can be recovered by the trusted central entity. During the vehicular sensory data acquisition phase, the proposed scheme exploits the proxy re-encryption technique to achieve the location privacy-preserving data querying at the network edge, i.e., the vehicles query the RSU instead of the trusted central entity. Numerical analysis are performed to validate the effectiveness of the proposed scheme, i.e., low data querying failure probability. Security analysis and performance evaluations are also carried out to validate the security properties and show the computation and communication efficiency of the proposed scheme. |
---|