Font Size: a A A

Research On Technology In Data Access Security Of Vehicle Networking Based On Multi-properties

Posted on:2017-02-21Degree:MasterType:Thesis
Country:ChinaCandidate:L J PangFull Text:PDF
GTID:2308330488997149Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
IOV(Internet of Vehicle) contains of storing, proceesing and analyzing mass car involved datas, vehicle-cloud is the core part of IOV. The risk of data theft is increased greatly by unauthorized users due to the nature feature of cloud, such as the complexity of users and relationship between data owners and data users. Data properties and user attributes can uniquely identify data content and user. This thesis makes research on data access control technology based on data properties and user attributes, the main work is as follows:1. As for the data properties, this thesis analyses the current network-based data leakage prevention program and proposes a cloud data access scheme of IOV based on network gene GID(Gene Identification) and Bloom filter. It sets white list and uses CRC to calculate GID marking data in the white list and stores GID in the Bloom filter. We design an algorithm to calculate the best location of filter in order to minimum the storage.Only when the GID of accessed data matches the GID contained in the white list, can data be accessed by users. It then makes analysis between direct GID comparison and comparision combined with Bloom filter, simulation shows that GID combined with Bloom filter can effectively reduce the system cost.2. CP-ABE(Ciphertext-Policy Attribute-Based Encryption)can encrypt data using user attributes. However, traditional CP-ABE can not be directly used in IOV. This essay proposes DAC-MAVCS, a cloud data access control scheme for multi-authority vehicliar cloud storage. It improves the traditional CP-ABE and encrypts the data using users’ attributes in the scheme. In particular, for the user changes problems, mainly caused by user revocation, we take proxy re-encryption technology and design an efficient user revocation to re-encrypt the ciphertext by cloud server. Simulation shows that the efficiency of encryption /decryption and re-encryption is greatly improved.
Keywords/Search Tags:Internet of Vehicle, Vehicle-Cloud Data Security, Access Security, Access Control
PDF Full Text Request
Related items