4.5 Article

SE-VFC: Secure and Efficient Outsourcing Computing in Vehicular Fog Computing

期刊

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TNSM.2021.3080138

关键词

Outsourcing; Security; Task analysis; Edge computing; Encryption; Resource management; Servers; Outsourcing computing; vehicular fog computing; Boneh-Lynn-Shacham (BLS) signature; attribute-based encryption (ABE)

资金

  1. Zhejiang Provincial Natural Science Foundation of China [LY19F020021]
  2. National Natural Science Foundation of China [61873232]
  3. Science and Technology Program of the Ministry of Public Security [2018GABJC33]
  4. New Talent Plan of Zhejiang Province [2020R427062]
  5. Opening Project of Key Laboratory of Ministry of Public Security (Public Security Information Application Based on Big-data Architecture) [2020DSJSYS005]

向作者/读者索取更多资源

Fog-aided computing is a new computing paradigm aimed at providing various computation services to end users. Researchers propose a secure and efficient outsourcing computing scheme in vehicular fog computing (SE-VFC) which combines lightweight BLS signature and group signature for batch anonymous authentication of fog vehicles while protecting their privacy. Security analysis confirms the effectiveness of the scheme.
Fog-aided computing is an emerging computing paradigm developed for providing various computation services to end users in vehicular fog computing. However, fog vehicles may be untrusted, and results from malicious operations may cause serious accidents. Therefore, we propose a secure and efficient outsourcing computing scheme in vehicular fog computing (SE-VFC), which performs outsourcing computing through fog vehicles with computing resources, and combines lightweight Boneh-Lynn-Shacham (BLS) signature and group signature to achieve batch anonymous authentication of fog vehicles while protecting their privacy in multiple outsourcing tasks. We also verify the correctness of the outsourcing computing results. Security analysis shows that our scheme can authenticate the fog vehicles in the outsourcing computation and preserve their privacy, it can also trace the malicious ones if necessary. Compared with the existing schemes, our scheme has relatively low communication and computation overhead, thus it is quite efficient for batch authentication especially in multiple computing tasks. Extensive simulation results verify the effectiveness and practicality of our proposed scheme in vehicular fog computing.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.5
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据