Font Size: a A A

Research On Attribute-Based Cryptosystem With Location-Based Decryption In The Internet Of Vehicles(IoV) Environment

Posted on:2021-01-05Degree:MasterType:Thesis
Country:ChinaCandidate:M JiangFull Text:PDF
GTID:2392330602964607Subject:Engineering
Abstract/Summary:PDF Full Text Request
As "Internet plus" extends to various fields,and the rapid development of emerging technologies such as cloud computing,the Internet of Things,and the mobile Internet,more and more traditional industries are gradually becoming digital.More and more users are actively or passively joining the Internet.And the new data shows explosive growth.Cloud platforms carry a large amount of information,and most of them are stored in the cloud in the form of clear text.So once the criminals obtain server permissions through illegal channels,it will cause irreparable data security accidents.For traditional cryptographic systems,whether it is a symmetric cryptographic algorithm or an asymmetric cryptographic algorithm,they cannot satisfy flexible access control requirements in a cloud environment.Attribute-based encryption has attracted much attention because it can implement flexible access control.In recent years,access control of cloud storage based on attribute-based encryption has been widely studied.However,with the application and development of the Internet of Vehicles in the field of transportation,people's demand for location-based shared privacy data is growing stronger.This paper proposes a novel data access control scheme to implement attribute-based and location-based access control on encrypted data on the cloud.The main work of this paper is as follows:(1)This paper proposes a location-based data access control scheme.The scheme can support multiple authorities and support both attribute-based and location-based data access control.We give the formal definition,security model,specific structure,and formal security proof of this scheme.(2)In the deployment phase of the solution,we introduced multiple fog computing nodes as the location authority.These fog computing nodes are deployed in the data access area and are responsible for issuing location-based keys.This realizes that only vehicles that reach the specified location and whose attributes meet the access control policy can access the data.At the same time,in order to ensure the credibility of public parameters issued by the authority,we introduce a blockchain system to authenticate the location authority.And the blockchain system is responsible for publishing credible public parameters.(3)In order to improve the calculation efficiency of the solution and reduce the computing load of the connected car client,we introduce fog computing nodes as outsourced servers.They are responsible for performing most of the computation of the decryption operation.For the partially decrypted ciphertext,the client side only needs to perform lightweight operations to achieve the final decryption.(4)We test the calculation efficiency of the scheme to verify the feasibility of the scheme in practical applications.After testing multiple sets of data,it is found that as the number of attributes increases,the running time of the key generation algorithm,encryption algorithm,and decryption algorithm increases linearly.If the number of attributes is small,the corresponding calculation can be completed in a reasonable time.When using outsourced services,the decryption time of the client is a small constant,regardless of the number of attributes.The scheme is proved to be effective and feasible in practical applications.
Keywords/Search Tags:IoV, location-based encryption, attribute-based encryption, fog computing, blockchain
PDF Full Text Request
Related items