University of Leicester
Browse
2.pdf (21.03 MB)

Extensible Conditional Privacy Protection Authentication Scheme for Secure Vehicular Networks in a Multi-Cloud Environment

Download (21.03 MB)
Version 2 2020-01-28, 15:04
Version 1 2019-10-14, 16:43
journal contribution
posted on 2020-01-28, 15:04 authored by Jie Cui, Xiaoyu Zhang, Hong Zhong, Jing Zhang, Lu Liu
With an increasing number of cloud service providers (CSPs), research works on multi-cloud environments to provide solutions to avoid vendor lock-in and deal with the single-point failure problem have expanded considerably. However, a few schemes focus on the conditional privacy protection authentication of vehicular networks under a multi-cloud environment. In this regard, we propose a robust and extensible authentication scheme for vehicular networks to fulfil the evergrowing diversified service demands from users. According to our solution, the vehicles need to register with the trusted authority (TA) only once to achieve a fast and efficient authentication with CSPs. Additionally, as long as the new CSP is successfully registered in TA, it can participate in vehicular service. A cloud broker, which is managed by the TA, is responsible for connecting all the cloud services; consequently, the complexity involved in the selection of CSPs is hidden from the users’ view. A detailed security analysis establishes that our scheme can fulfil conditional privacy protection and achieve the security objectives of vehicular networks. Our scheme is based on elliptic curve cryptography and does not employ the complex bilinear pairing operation. An evaluation of performance of the proposed scheme indicates that it is suitable for applications involving vehicular networks.

Funding

The work was supported by the National Natural Science Foundation of China (No.61872001, No.61572001, No.61702005), the Open Fund of Key Laboratory of Embedded System and Service Computing (Tongji University), Ministry of Education (No. ESSCKF2018-03), the Open Fund for Discipline Construction, Institute of Physical Science and Information Technology, Anhui University and the Excellent Talent Project of Anhui University. The authors are very grateful to the anonymous referees for their detailed comments and suggestions regarding this paper.

History

Citation

IEEE Transactions on Information Forensics and Security, 2019, 15, pp.1654-1667

Author affiliation

/Organisation/COLLEGE OF SCIENCE AND ENGINEERING/Department of Informatics

Version

  • AM (Accepted Manuscript)

Published in

IEEE Transactions on Information Forensics and Security

Volume

15

Pagination

1654-1667

Publisher

Institute of Electrical and Electronics Engineers (IEEE)

issn

1556-6013

Acceptance date

2019-10-02

Copyright date

2019

Available date

2019-10-11

Publisher version

https://ieeexplore.ieee.org/document/8865553

Notes

The file associated with this record is under embargo until publication, in accordance with the publisher's self-archiving policy. The full text may be available through the publisher links provided above.

Language

en

Usage metrics

    University of Leicester Publications

    Categories

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC