Open Access
This article is
- freely available
- re-usable
Sensors 2020, 20(2), 514; https://doi.org/10.3390/s20020514
Article
Efficient Privacy-Preserving Data Sharing for Fog-Assisted Vehicular Sensor Networks
School of Information Engineering, Chang’an University, Xi’an 710064, China
^{*}
Author to whom correspondence should be addressed.
Received: 18 December 2019 / Accepted: 14 January 2020 / Published: 16 January 2020
Abstract
:Vehicular sensor networks (VSNs) have emerged as a paradigm for improving traffic safety in urban cities. However, there are still several issues with VSNs. Vehicles equipped with sensing devices usually upload large amounts of data reports to a remote cloud center for processing and analyzing, causing heavy computation and communication costs. Additionally, to choose an optimal route, it is required for vehicles to query the remote cloud center to obtain road conditions of the potential moving route, leading to an increased communication delay and leakage of location privacy. To solve these problems, this paper proposes an efficient privacy-preserving data sharing (EP${}^{2}$DS) scheme for fog-assisted vehicular sensor networks. Specifically, the proposed scheme utilizes fog computing to provide local data sharing with low latency; furthermore, it exploits a super-increasing sequence to format the sensing data of different road segments into one report, thus saving on the resources of communication and computation. In addition, using the modified oblivious transfer technology, the proposed scheme can query the road conditions of the potential moving route without disclosing the query location. Finally, an analysis of security suggests that the proposed scheme can satisfy all the requirements for security and privacy, with the evaluation results indicating that the proposed scheme leads to low costs in computation and communication.
Keywords:
vehicular sensor networks; fog computing; data sharing; privacy preserving1. Introduction
Vehicular sensor networks (VSNs) [1,2,3], that is, a combination of wireless communication given by vehicular ad hoc networks [4] and the sensing devices installed in the vehicle, can improve traffic conditions in urban cities, and have recently received considerable attention. In VSNs, the vehicles equipped with sensing devices can record a myriad of data reports on the road conditions and environment situations, and these data reports need be uploaded to the remote cloud center [5,6] for processing and analyzing. In addition, vehicles often need to query the road conditions of potential moving routes at remote cloud centers. However, uploading a large amount of data reports to the cloud data center consumes heavy bandwidth, and leads to an increased communication delay.
Recently, fog computing [7] has been proposed to extend the capabilities of cloud computing [8] near vehicles [9], which can locally handle the data reports uploaded by vehicles. These new properties will bring about benefits such as location awareness and low latency. Fog computing has already been used to provide low latency services in vehicular sensor networks, such as navigation services [10] and surface condition monitoring [11].
A typical architecture of fog-assisted vehicular sensor networks (F-VSNs) [12,13,14] contains the trusted authority, cloud center, fog nodes, and vehicles. The trusted authority is responsible for generating system parameters, and the registration of all entities (cloud center, fog nodes and vehicles). The cloud center provides centralized control with strong computing power and large storage capacity from a remote location. Fog nodes have available computing, storage, and communication resources [15], which is deployed at the edge of networks with physical proximity to vehicles, playing as the bridge across the vehicles and the cloud center. Vehicles are installed with a variety of smart sensors that can sense road conditions and environmental parameters. F-VSNs allows some computations and processing to be performed at the fog nodes, greatly reducing the consumption of communication time and energy.
Although F-VSNs brings a great deal of benefits and conveniences, there still exist several issues in terms of data collection and data query. Specifically, vehicles generate a large amount of sensory data reflecting the road conditions and environment situations, and need to upload the sensory data to cloud center for further processing and analyzing, which brings heavy computation and communication costs. To solve this problem, data aggregation technology, which is designed to aggregate multiple data into one report, has recently received more and more attention.
However, using the existing data aggregation schemes [16,17,18,19,20,21,22] cannot determine the number of data reports produced in each road segment, and cannot compute the average sensory data in each road segment. To solve the problem, the scheme [23] exploits the Chinese remainder theorem and Paillier cryptosystem to calculate the average sensory data in each segments; however, it brings heavy computation and communication costs. In addition, to choose an optimal route, vehicles often query about the road conditions of the potential moving routes, but the query reports uploaded by vehicles are tightly associated with the query location, and thus the query location could be disclosed.
The oblivious transfer [24,25], homomorphic encryption technology [26,27], and proxy re-encryption technique [23] have been exploited to hide the query location. However, it is worth noting that the computation and communication costs by the schemes [24,25] is directly proportional to the data dimension, the schemes [26,27] do not support the scenario with high vehicle density, and the scheme [23] needs heavy computation and communication costs.
1.1. Our Contributions
To solve the aforementioned problems, this paper proposes an efficient privacy-preserving data sharing (EP${}^{2}$DS) scheme for fog-assisted vehicular sensor networks. The main contributions of this paper are as follows:
- First, the proposed EP${}^{2}$DS scheme exploits the super-increasing sequence [20] for achieving multi-dimensional data aggregation, while calculating the average sensory data in each road segment, greatly saving on the resources of communication and computation.
- Secondly, by utilizing the modified oblivious transfer [28], the proposed EP${}^{2}$DS scheme is able to query about the road conditions of the potential moving routes without disclosing the query location.
- Thirdly, an analysis of security indicates that the proposed EP${}^{2}$DS scheme is proven to be secure under elliptic curve discrete logarithm (ECDL) assumption in the random oracle model and satisfies all the requirements for security and privacy.
- Finally, the performances of computation and communication in costs are evaluated through quantitative calculations, with the results that the proposed EP${}^{2}$DS scheme is of more efficiency than others.
1.2. Organization
This paper is organized as follows. The related work is surveyed in Section 2. We introduce the background in Section 3. The concrete scheme is proposed in Section 4. Section 5 provides an analysis of the security. In Section 6, the performance evaluation is performed. Section 7 concludes the paper.
2. Related Works
Some works closely related to this paper are briefly reviewed below.
In F-VSNs, massive sensory data is produced in each data dimension, and needs to be uploaded for further processing and analysis; data aggregation schemes [16,17,18,19,20,21,22,23] have received considerable attention recently, and are roughly classified into two categories: single-dimensional data aggregation [16,17,18,19] and multi-dimensional data aggregation [20,21,22,23]. Zhuo et al. [16] introduced a data aggregation scheme, which protects each involved entity’s identity privacy, and allows the requester to examine the correctness of the obtained results. Rabieh et al. [17] employed the data aggregation technique to find out the routes for the vehicle to be in each road segment; however, it only can calculate the data aggregation result, and cannot recover the content in each data dimension.
Xu et al. [18] constructed a privacy-preserving data aggregation scheme that can classify messages based on where and when the sensor data is collected, and aggregate the data collected in the same area and period. Sun et al. [19] designed a data aggregation mechanism considering data integrity and access control. However, the schemes [16,17,18,19] are unable to determine the number of the data reports produced in each data dimension, and further fail to calculate the average sensory data in each data dimension. Lin et al. [20] integrated the perturbation technique and super-increasing sequence to combine multiple aggregated data into one data report to improve the energy efficiency.
Lu et al. [21] employed the homomorphic Paillier encryption, one-way hash chain technique and Chinese remainder theorem to achieve lightweight multi-dimensional data aggregation. On the basis of the super-increasing sequence and modified homomorphic Paillier encryption, Wang et al. [22] introduced a multi-subtasks aggregation scheme, in which each aggregated datum is mapped to a specific area and period. Kong et al. [23] designed a privacy-preserving multi-dimensional data sharing scheme using the Chinese remainder theorem and modified Paillier encryption, with counting the number of the sensory data collected at each segments and calculating the average sensory data in each segment.
Although schemes [20,21,22,23] are able to calculate the average sensory data in each data dimension, they bring heavy computation costs and communication overhead. In addition, the query vehicle usually wants to know the road conditions of the potential moving route, which could lead to that the query location being disclosed in the data query process, the schemes in [23,24,25,26,27] have been proposed to solve this problem.
Ghinita et al. [24] and Paulet et al. [25] employed the oblivious transfer to hide query location in the data query process, but the communication cost of schemes [24,25] is directly proportional to the data dimension. Zhu et al. [25,26] utilized an improved homomorphic encryption technology to protect the query location in location-based services, but it do not support scenarios with a high vehicle density. Kong et al. [23] utilized the proxy re-encryption technique to hide the query location, but it does not support queries of whole network sensory data during the data query phase.
To sum up, from the review above, the available data aggregation schemes [16,17,18,19,20,21,22,23] either fail to determine the number of data reports produced in each data dimension or bring heavy computation and communication costs. In addition, the communication costs of the existing schemes [23,24,25,26,27] are either directly proportional to the data dimension or bring heavy communication costs in the data query process.
To address the issues above, we propose an EP${}^{2}$DS scheme for fog-assisted vehicular sensor networks, which can not only reduce the computation and communication costs, but also calculate the average sensory data in each road segment. Additionally, the proposed EP${}^{2}$DS scheme can query the road conditions of potential moving routes without disclosing the query location.
3. Background
3.1. System Model
The system model is presented in Figure 1, which is composed of five entities: trusted authority ($TA$), cloud center ($CC$), the data collection vehicle ${V}_{i}$$(i=1,2,\xb7\xb7\xb7,\delta )$, fog node $F{N}_{j}$$(j=1,2,\xb7\xb7\xb7,n)$, and the data query vehicle ${V}_{q}$. The road area is divided into m segments, and each segment k$(k=1,2,\xb7\xb7\xb7,m)$ is represented by a unique two-dimensional identifier $({u}_{k},{v}_{k})$, approximating of the location coordinates [23]. As to readability, the definitions of notations employed in this study are illustrated in Table 1.
The wireless connections between the vehicles and the fog nodes are brought about by the Institute of Electrical and Electronics Engineers (IEEE) 802.11p standard [29]. The connections between the fog nodes and $CC$ are achieved via either the wired links or other links with low transmission delay and high bandwidth.
$TA$: A fully trusted entity, which is responsible for the management of the security parameters for the system and the registration of the cloud center, fog nodes, and vehicles, and periodically updates the system information.
$CC$: An honest-but-curious entity, which is responsible for providing centralized control with powerful storage and computing capabilities from a remote location. In addition, it can perform computational analytics from data reports uploaded by the fog nodes, and distribute data to all fog nodes for further sharing with vehicles [30].
${V}_{i}$: It is equipped with smart sensors, periodically formatting a data report from the collected sensory data and uploading the data report towards the fog node.
$F{N}_{j}$: This consists of a road side unit and an edge server [13], and aggregates the data reports uploaded by the data collection vehicles under its communication range and transmits the aggregated data report towards $CC$. Meanwhile, each fog node manages one or more segments, and can assist in sharing the sensory data to the query vehicle [31].
${V}_{q}$: To choose an optimal route, ${V}_{q}$ usually sends a query report to the fog node, then the fog node returns a response report to ${V}_{q}$.
In our system model, we assume the fog node is honest-but-curious, i.e., it is able to correctly execute the operations defined in the protocol; however, it also can try to violate the privacy of the vehicle through analyzing the vehicle’s data report and query report; meanwhile, we assume neither the fog nodes nor the query vehicles can collude with each other in the proposed EP${}^{2}$DS scheme. Additionally, we assume there exists an attacker, which can eavesdrop on the data transmission and launch attacks.
3.2. Security Requirement
The following security requirements should be achieved.
Authentication and data integrity: The proposed EP${}^{2}$DS scheme should guarantee that any reports are not modified during the transmission process, and can detect any modification of the reports; moreover, any entity in F-VSNs should be able to be authenticated to ensure the reliability of the data source.
Confidentiality: To ensure the privacy of sensory data, the proposed EP${}^{2}$DS scheme should provide confidentiality, i.e., no attacker can obtain the sensory data from data report.
Location privacy preservation: To protect vehicle’s query location, it is important not to disclose the query location to fog nodes that provide location-based services in the data query process.
Identity privacy preservation: Apart from the $TA$, any entities should not trace or recognize the identity of the data collection vehicle by analyzing the received data reports.
Traceability: $TA$ should be able to reveal the identity of the malicious vehicle uploading the bogus data report.
Unlinkability: Apart from the $TA$, neither fog nodes nor the malicious vehicles can determine whether the two data reports are from the same vehicle.
Resistance to attacks: The proposed EP${}^{2}$DS scheme should be able to withstand various popular attacks such as the modification attack, replay attack, impersonation attack, and man-in-the-middle attack.
3.3. Elliptic Curve
Let ${F}_{p}$ be a finite field with a prime number p. The elliptic curve E over ${F}_{p}$ defined as the set of all points $(x,y)$ meeting ${y}^{2}={x}^{3}+ax+b\phantom{\rule{0.277778em}{0ex}}mod\phantom{\rule{0.277778em}{0ex}}p$, where $4{a}^{3}+27{b}^{2}\ne 0$ and $a,b\in {F}_{p}$ [32,33].
An infinity point O, and other points on E, form an additive cyclic group $\mathbb{G}$ with the order q and generator P. Let $P\in \mathbb{G}$ and $k\in {\mathbb{Z}}_{q}^{*}$, the scalar multiplication over $\mathbb{G}$ is described as $kP=P+P+\xb7\xb7\xb7+P$ (k times).
3.4. Security Assumption
4. The Proposed Scheme
The proposed EP${}^{2}$DS scheme includes system initialization, registration, data collection, and data query phases. Note that the data flows in the data collection and data query phases are shown in Figure 2.
4.1. System Initialization
$TA$ produces all system parameters through executing the following steps.
- (1)
- $TA$ randomly chooses a large prime number p, and selects a non-singular elliptic curve E defined by ${y}^{2}={x}^{3}+ax+b\phantom{\rule{0.277778em}{0ex}}mod\phantom{\rule{0.277778em}{0ex}}p$, where $a,b\in {F}_{p}$.
- (2)
- $TA$ picks a group $\mathbb{G}$ of E with the prime order q and a generator P.
- (3)
- $TA$ randomly chooses $s\in {\mathbb{Z}}_{q}^{*}$ as its master key and computes its public key ${P}_{pub}=sP$.
- (4)
- $TA$ chooses eight one-way hash functions ${H}_{i}:{\{0,1\}}^{*}\to {\mathbb{Z}}_{q}^{*}$, $i=1,2,\xb7\xb7\xb7,7$, ${H}_{8}:{\{0,1\}}^{*}\to \in {\{0,1\}}^{\left|d\right|-1}$.
- (5)
- $TA$ chooses a super-increasing sequence $\overrightarrow{a}=({a}_{1},{a}_{2},\xb7\xb7\xb7,{a}_{m})$, such that ${\sum}_{k=1}^{m}{a}_{k}3n\delta d<q$, ${\sum}_{k=1}^{i-1}{a}_{k}3n\delta d<{a}_{i}$ ($i=1,2,\xb7\xb7\xb7,m$), where ${a}_{1},{a}_{2},\xb7\xb7\xb7,{a}_{m}$ are large prime numbers and d is the maximum value of the data. Then, $TA$ assigns prime number ${a}_{k}$ towards segment k.
- (6)
- $TA$ publishes the system parameters $\{p,q,\mathbb{G},P,{P}_{pub},$ ${H}_{1},{H}_{2},{H}_{3},{H}_{4},{H}_{5},{H}_{6},{H}_{7},{H}_{8},\overrightarrow{a}\}$.
4.2. Registration
All vehicles, fog nodes, and cloud centers register with $TA$.
4.2.1. ${V}_{i}$ Registers with $TA$
- (1)
- ${V}_{i}$ sends the identity $I{D}_{i}$ to the $TA$ in secure channel.
- (2)
- After confirming the identity $I{D}_{i}$, $TA$ randomly chooses ${w}_{i}\in {\mathbb{Z}}_{q}^{*}$ and computes$$PI{D}_{i,1}={w}_{i}P,PI{D}_{i,2}=I{D}_{i}\oplus {H}_{1}({w}_{i}{P}_{pub},{t}_{i}),$$
- (3)
- $TA$ randomly chooses ${r}_{i}\in {\mathbb{Z}}_{q}^{*}$ and computes$${R}_{i}={r}_{i}P,{x}_{i}={r}_{i}+s{H}_{2}(PI{D}_{i},{R}_{i},{P}_{pub}).$$
- (4)
- $TA$ randomly chooses a sharing key $\phi \in {\{0,1\}}^{\left|d\right|-1}$, and transmits the pseudo identity $PI{D}_{i}$, the private key $({x}_{i},{R}_{i})$ and the sharing key $\phi $ to ${V}_{i}$ in a secure channel.
4.2.2. $F{N}_{j}$ Registers with $TA$
- (1)
- $F{N}_{j}$ sends the identity $I{D}_{F{N}_{j}}$ to the $TA$ in a secure channel.
- (2)
- $TA$ randomly chooses ${r}_{F{N}_{j}}\in {\mathbb{Z}}_{q}^{*}$ and computes$${R}_{F{N}_{j}}={r}_{F{N}_{j}}P,{x}_{F{N}_{j}}={r}_{F{N}_{j}}+s{H}_{3}(I{D}_{F{N}_{j}},{R}_{F{N}_{j}},{P}_{pub}).$$
- (3)
- $TA$ sends the private key $({x}_{F{N}_{j}},{R}_{F{N}_{j}})$ to $F{N}_{j}$ in a secure channel.
4.2.3. $CC$ Registers with $TA$
- (1)
- $TA$ randomly chooses $x\in {\mathbb{Z}}_{q}^{*}$ and computes ${P}_{cc}=xP$.
- (2)
- $TA$ sends the private key x and public key ${P}_{cc}$ to $CC$ in a secure channel.
4.3. Data Collection
The data collection phase includes three processes: data gathering, data aggregation, and data reading.
4.3.1. Data Gathering
${V}_{i}$ gathers sensory data in a short period of time, e.g., every five minutes: (i) if there is a sensory data obtained at road segment k under $F{N}_{j}$, i.e., ${d}_{i,k}^{j}>0$, then ${e}_{i,k}^{j}=1$; (ii) if there is no sensory data obtained at road segment k under $F{N}_{j}$, i.e., ${d}_{i,k}^{j}=0$, then ${e}_{i,k}^{j}=0$.
${V}_{i}$ produces a data report through executing the following steps:
- (1)
- ${V}_{i}$ formats $({d}_{i,1}^{j},{d}_{i,2}^{j},\xb7\xb7\xb7,{d}_{i,m}^{j})$ and $({e}_{i,1}^{j},{e}_{i,2}^{j},\xb7\xb7\xb7,{e}_{i,m}^{j})$ into ${d}_{i}^{j}={\sum}_{k=1}^{m}{a}_{k}({d}_{i,k}^{j}+\phi )$ and ${e}_{i}^{j}={\sum}_{k=1}^{m}{a}_{k}({e}_{i,k}^{j}+\phi )$.
- (2)
- ${V}_{i}$ randomly selects ${r}_{i}^{j}$, ${s}_{i}^{j}\in {\mathbb{Z}}_{q}^{*}$ and computes$${A}_{i}^{j}={r}_{i}^{j}P,{B}_{i}^{j}={d}_{i}^{j}P+{r}_{i}^{j}{P}_{cc},{C}_{i}^{j}={s}_{i}^{j}P,{D}_{i}^{j}={e}_{i}^{j}P+{s}_{i}^{j}{P}_{cc}.$$
- (3)
- ${V}_{i}$ randomly picks ${l}_{i}^{j}\in {\mathbb{Z}}_{q}^{*}$ and calculates$${L}_{i}^{j}={l}_{i}^{j}P,{\sigma}_{i}^{j}={x}_{i}+{l}_{i}^{j}{H}_{4}(PI{D}_{i},{R}_{i},{A}_{i}^{j},{B}_{i}^{j},{C}_{i}^{j},{D}_{i}^{j},{L}_{i}^{j},{T}_{i}^{j}),$$
- (4)
- ${V}_{i}$ transmits the data report $D{R}_{i}^{j}=\{PI{D}_{i},{R}_{i},{A}_{i}^{j},{B}_{i}^{j},$ ${C}_{i}^{j},{D}_{i}^{j},{L}_{i}^{j},{\sigma}_{i}^{j},{T}_{i}^{j}\}$ towards $F{N}_{j}$, as shown in Figure 2 (①).
4.3.2. Data Aggregation
Supposing w vehicles $\{{V}_{1},{V}_{2},\xb7\xb7\xb7,{V}_{w}\}$ upload the data reports $\{D{R}_{1}^{j},D{R}_{2}^{j},\xb7\xb7\xb7,D{R}_{w}^{j}\}$ to $F{N}_{j}$, where $w\le \delta $. $F{N}_{j}$ can aggregate data reports through executing the following steps:
- (1)
- $F{N}_{j}$ checks whether ${t}_{i}$ is valid and ${T}_{i}^{j}$ is fresh for each $i=1,2,\xb7\xb7\xb7,w$. If ${t}_{i}$ is not valid or ${T}_{i}^{j}$ is not fresh, $D{R}_{i}^{j}$ will be rejected. Otherwise, $F{N}_{j}$ performs the batch verification using small exponent test [36]. $F{N}_{j}$ randomly selects a set of small numbers ${\theta}_{1}^{j},{\theta}_{2}^{j},\xb7\xb7\xb7,{\theta}_{w}^{j}\in [1,{2}^{w}]$ and checks whether the following equation holds$$\begin{array}{c}{\sum}_{i=1}^{w}{\theta}_{i}^{j}{\sigma}_{i}^{j}P={\sum}_{i=1}^{w}{\theta}_{i}^{j}{R}_{i}+{\sum}_{i=1}^{w}{\theta}_{i}^{j}{H}_{2}(PI{D}_{i},{R}_{i},{P}_{pub}){P}_{pub}\hfill \\ \phantom{\rule{2.em}{0ex}}\phantom{\rule{2.em}{0ex}}\phantom{\rule{2.em}{0ex}}\phantom{\rule{2.em}{0ex}}\phantom{\rule{2.em}{0ex}}\phantom{\rule{0.277778em}{0ex}}+{\sum}_{i=1}^{w}{\theta}_{i}^{j}{H}_{4}(PI{D}_{i},{R}_{i},{A}_{i}^{j},{B}_{i}^{j},{C}_{i}^{j},{D}_{i}^{j},{L}_{i}^{j},{T}_{i}^{j}){L}_{i}^{j}.\hfill \end{array}$$If it does hold, $F{N}_{j}$ computes$${A}^{j}={\sum}_{i=1}^{w}{A}_{i}^{j},{B}^{j}={\sum}_{i=1}^{w}{B}_{i}^{j},{C}^{j}={\sum}_{i=1}^{w}{C}_{i}^{j},{D}^{j}={\sum}_{i=1}^{w}{D}_{i}^{j}.$$
- (2)
- $F{N}_{j}$ randomly picks ${l}^{j}\in {\mathbb{Z}}_{q}^{*}$ and calculates$${L}^{j}={l}^{j}P,{\sigma}^{j}={x}_{F{N}_{j}}+{l}^{j}{H}_{5}(I{D}_{F{N}_{j}},{R}_{F{N}_{j}},{A}^{j},{B}^{j},{C}^{j},{D}^{j},{L}^{j},{T}^{j}),$$
- (3)
- $F{N}_{j}$ transmits the aggregated data report $AD{R}^{j}=\{I{D}_{F{N}_{j}},{R}_{F{N}_{j}},{A}^{j},{B}^{j},{C}^{j},{D}^{j},{L}^{j},{\sigma}^{j},{T}^{j}\}$ towards $CC$, as shown in Figure 2 (②).
4.3.3. Data Reading
After receiving $\{AD{R}^{1},AD{R}^{2},\xb7\xb7\xb7,AD{R}^{n}\}$ from $\{F{N}_{1},$ $F{N}_{2},\xb7\xb7\xb7,F{N}_{n}\}$ respectively, $CC$ executes the following steps:
- (1)
- $CC$ checks whether ${T}^{j}$ is fresh for each $j=1,2,\xb7\xb7\xb7,n$. If ${T}^{j}$ is not fresh, $AD{R}^{j}$ will be rejected. Otherwise, $CC$ randomly chooses a set of small numbers ${\theta}^{1},{\theta}^{2},\xb7\xb7\xb7,{\theta}^{n}\in [1,{2}^{n}]$ and performs the batch verification using small exponent test [36]. $CC$ verifies whether the following equation holds$$\begin{array}{c}{\sum}_{j=1}^{n}{\theta}^{j}{\sigma}^{j}P={\sum}_{j=1}^{n}{\theta}^{j}{R}_{F{N}_{j}}+{\sum}_{j=1}^{n}{\theta}^{j}{H}_{3}(I{D}_{F{N}_{j}},{R}_{F{N}_{j}},{P}_{pub}){P}_{pub}\hfill \\ \phantom{\rule{2.em}{0ex}}\phantom{\rule{2.em}{0ex}}\phantom{\rule{2.em}{0ex}}\phantom{\rule{2.em}{0ex}}\phantom{\rule{2.em}{0ex}}\phantom{\rule{1.em}{0ex}}\phantom{\rule{0.277778em}{0ex}}\phantom{\rule{0.166667em}{0ex}}+{\sum}_{j=1}^{n}{\theta}^{j}{H}_{5}(I{D}_{F{N}_{j}},{R}_{F{N}_{j}},{A}^{j},{B}^{j},{C}^{j},{D}^{j},{L}^{j},{T}^{j}){L}^{j}.\hfill \end{array}$$If it does hold, $CC$ calculates$$\mathsf{\Phi}={\sum}_{j=1}^{n}{B}^{j}-x\xb7{\sum}_{j=1}^{n}{A}^{j},\Delta ={\sum}_{j=1}^{n}{D}^{j}-x\xb7{\sum}_{j=1}^{n}{C}^{j}.$$By solving the discrete log of $\mathsf{\Phi}$ and $\Delta $ with the base P, utilizing the Pollard’s lambda algorithm [37], $CC$ can obtain$$\mu ={\sum}_{j=1}^{n}{\sum}_{i=1}^{w}(\phi +{d}_{i}^{j}),\nu ={\sum}_{j=1}^{n}{\sum}_{i=1}^{w}(\phi +{e}_{i}^{j}).$$
- (2)
- $CC$ distributes $\mu $ and $\nu $ to all fog nodes $\{F{N}_{1},F{N}_{2},\xb7\xb7\xb7,F{N}_{n}\}$ for further sharing with vehicles.
4.4. Data Query
The data query vehicle ${V}_{q}$ intends to query the data captured at segment c with the identifier $({u}_{c},{v}_{c})$ at the $F{N}_{j}$. The phase includes three processes: query generation, data response, and response reading.
4.4.1. Query Generation
- (1)
- ${V}_{q}$ selects two random numbers ${r}_{q}^{j},{s}_{q}^{j}\in {\mathbb{Z}}_{q}^{*}$ and calculates$${E}_{q}^{j}={r}_{q}^{j}P,{F}_{q}^{j}={u}_{c}P+{x}_{q}{E}_{q}^{j},{G}_{q}^{j}={s}_{q}^{j}P,{H}_{q}^{j}={v}_{c}P+{x}_{q}{G}_{q}^{j}.$$
- (2)
- ${V}_{q}$ randomly picks ${l}_{q}^{j}\in {\mathbb{Z}}_{q}^{*}$ and calculates$${L}_{q}^{j}={l}_{q}^{j}P,{\sigma}_{q}^{j}={x}_{q}+{l}_{q}^{j}{H}_{6}(PI{D}_{q},{R}_{q},{E}_{q}^{j},{F}_{q}^{j},{G}_{q}^{j},{H}_{q}^{j},{L}_{q}^{j},{T}_{q}^{j}),$$
- (3)
- ${V}_{q}$ transmits the query report $Q{R}_{q}^{j}=\{PI{D}_{q},{R}_{q},{E}_{q}^{j},{F}_{q}^{j},$ ${G}_{q}^{j},{H}_{q}^{j},{L}_{q}^{j},{\sigma}_{q}^{j},{T}_{q}^{j}\}$ towards $F{N}_{j}$, as shown in Figure 2 (③).
4.4.2. Data Response
- (1)
- After receiving $Q{R}_{q}^{j}$, $F{N}_{j}$ checks whether ${t}_{q}$ is valid and ${T}_{q}^{j}$ is fresh. If ${t}_{q}$ is not valid or ${T}_{q}^{j}$ is not fresh, $Q{R}_{q}^{j}$ will be rejected. Otherwise, $F{N}_{j}$ verifies whether the following equation holds$$\begin{array}{c}{\sigma}_{q}^{j}P={R}_{q}+{H}_{2}(PI{D}_{q},{R}_{q},{P}_{pub}){P}_{pub}+{H}_{6}(PI{D}_{q},{R}_{q},{E}_{q}^{j},{F}_{q}^{j},{G}_{q}^{j},{H}_{q}^{j},{L}_{q}^{j},{T}_{q}^{j}){L}_{q}^{j}.\end{array}$$If it does hold, $F{N}_{j}$ selects two random numbers ${t}_{q}^{j},{\phi}_{q}^{j}\in {\mathbb{Z}}_{q}^{*}$ and calculates$$\phantom{\rule{0.166667em}{0ex}}{J}_{q}^{j}={t}_{q}^{j}{E}_{q}^{j}+{\phi}_{q}^{j}{G}_{q}^{j},{K}_{q}^{j}={t}_{q}^{j}{F}_{q}^{j}+{\phi}_{q}^{j}{H}_{q}^{j},$$$${M}_{q}^{j}=\mu +{\sum}_{k=1}^{m}{a}_{k}{H}_{8}({t}_{q}^{j}{u}_{k}+{\phi}_{q}^{j}{v}_{k}),{N}_{q}^{j}=\nu +{\sum}_{k=1}^{m}{a}_{k}{H}_{8}({t}_{q}^{j}{u}_{k}+{\phi}_{q}^{j}{v}_{k}).$$
- (2)
- $F{N}_{j}$ randomly picks ${\widehat{l}}_{q}^{j}\in {\mathbb{Z}}_{q}^{*}$ and calculates$${\widehat{L}}_{q}^{j}={\widehat{l}}_{q}^{j}P,{\widehat{\sigma}}_{q}^{j}={x}_{F{N}_{j}}+{\widehat{l}}_{q}^{j}{H}_{7}(I{D}_{F{N}_{j}},{R}_{F{N}_{j}},{J}_{q}^{j},{K}_{q}^{j},{M}_{q}^{j},{N}_{q}^{j},{\widehat{L}}_{q}^{j},{\widehat{T}}_{q}^{j}),$$
- (3)
- $F{N}_{j}$ transmits the response report $R{R}_{q}^{j}=\{I{D}_{F{N}_{j}},$ ${R}_{F{N}_{j}},{J}_{q}^{j},{K}_{q}^{j},{M}_{q}^{j},{N}_{q}^{j},{\widehat{L}}_{q}^{j},{\widehat{\sigma}}_{q}^{j},{\widehat{T}}_{q}^{j}\}$ towards ${V}_{q}$, as shown in Figure 2 (④).
4.4.3. Response Reading
- (1)
- After receiving $R{R}_{q}^{j}$, ${V}_{q}$ checks whether ${\widehat{T}}_{q}^{j}$ is fresh. If ${\widehat{T}}_{q}^{j}$ is not fresh, $R{R}_{q}^{j}$ will be rejected. Otherwise, ${V}_{q}$ verifies whether the following equation holds$$\begin{array}{c}{\widehat{\sigma}}_{q}^{j}P={R}_{F{N}_{j}}+{H}_{3}(I{D}_{F{N}_{j}},{R}_{F{N}_{j}},{P}_{pub}){P}_{pub}+{H}_{7}(I{D}_{F{N}_{j}},{R}_{F{N}_{j}},{J}_{q}^{j},{K}_{q}^{j},{M}_{q}^{j},{N}_{q}^{j},{\widehat{L}}_{q}^{j},{\widehat{T}}_{q}^{j}){\widehat{L}}_{q}^{j}.\hfill \end{array}$$If it does hold, ${V}_{q}$ calculates$$\mathsf{\Lambda}={K}_{q}^{j}-{x}_{q}\xb7{J}_{q}^{j}.$$By solving the discrete log of $\mathsf{\Lambda}$ with the base P, utilizing the Pollard’s lambda algorithm [37], ${V}_{q}$ can obtain ${\beta}_{c}={H}_{8}({t}_{q}^{j}{u}_{c}+{\phi}_{q}^{j}{v}_{c})$.
- (2)
- By calling the Algorithm 1, ${V}_{q}$ can achieve the average sensing data ${\overline{d}}_{c}$ captured at segment c.
Algoruthm 1 Recovery ${\overline{d}}_{c}$ captured at segment c |
Input: $({a}_{1},{a}_{2},\xb7\xb7\xb7,{a}_{m})$, ${\beta}_{c}$, $\phi $, $\delta $, ${M}_{q}^{j}$ and ${N}_{q}^{j}$ |
Output: ${\overline{d}}_{c}$ |
begin: |
set ${X}_{1}={M}_{q}^{j}$, ${X}_{2}={N}_{q}^{j}$; |
for $k=m$ to c do |
${d}_{k}=\frac{{X}_{1}-{X}_{1}\phantom{\rule{0.277778em}{0ex}}mod\phantom{\rule{0.277778em}{0ex}}{a}_{k}}{{a}_{k}}$, ${e}_{k}=\frac{{X}_{2}-{X}_{2}\phantom{\rule{0.277778em}{0ex}}mod\phantom{\rule{0.277778em}{0ex}}{a}_{k}}{{a}_{k}}$; |
${X}_{1}={X}_{1}\phantom{\rule{0.277778em}{0ex}}mod\phantom{\rule{0.277778em}{0ex}}{a}_{k}$, ${X}_{2}={X}_{2}\phantom{\rule{0.277778em}{0ex}}mod\phantom{\rule{0.277778em}{0ex}}{a}_{k}$; |
return ${\overline{d}}_{c}=\frac{{d}_{c}-{\beta}_{c}-\delta \phi}{{e}_{c}-{\beta}_{c}-\delta \phi}$. |
end |
5. Security
This section depicts the security proof of the proposed EP${}^{2}$DS scheme in the random oracle model. Additionally, a security evaluation and comparison on the proposed EP${}^{2}$DS scheme and schemes of [17,19,23,25,26] is conducted.
5.1. Security Model
The security model of the proposed EP${}^{2}$DS scheme can be found in the Appendix A.
5.2. Security Proof
The security proof of the proposed EP${}^{2}$DS scheme can be found in the Appendix B.
5.3. Analysis and Comparison of Security Requirement
Authentication and data integrity: Based on Theorem 2, no polynomial-time attacker is able to fake a valid data report owing to the ECDL assumption. Therefore, authentication and data integrity can be ensured in the proposed EP${}^{2}$DS scheme.
Confidentiality: Based on Theorem 1, without the cloud center’s private key x, any attacker is unable to compute the sensing data $\mu ={\sum}_{j=1}^{n}{\sum}_{i=1}^{w}(\phi +{d}_{i}^{j})$ and $\nu ={\sum}_{j=1}^{n}{\sum}_{i=1}^{w}(\phi +{e}_{i}^{j})$, and thus confidentiality can be ensured in the proposed EP${}^{2}$DS scheme.
Location privacy preservation: Based on Theorem 1, without the the data query vehicle’s private key ${x}_{q}$, no attacker can obtain the query location $({u}_{c},{v}_{c})$ from $\{{E}_{q}^{j}={r}_{q}^{j}P$, ${F}_{q}^{j}={u}_{c}P+{x}_{q}{E}_{q}^{j}$, ${G}_{q}^{j}={s}_{q}^{j}P$, ${H}_{q}^{j}={v}_{c}P+{x}_{q}{G}_{q}^{j}\}$, and hence the location privacy can be guaranteed in the proposed EP${}^{2}$DS scheme.
Identity privacy preservation: On the basis of the proposed EP${}^{2}$DS scheme, the identity $I{D}_{i}$ of ${V}_{i}$ is only contained in the pseudo identity $PI{D}_{i}=\{PI{D}_{i,1},PI{D}_{i,2},{t}_{i}\}$, where $PI{D}_{i,1}={w}_{i}P$, $PI{D}_{i,2}=I{D}_{i}\oplus H({w}_{i}{P}_{pub},{t}_{i})$ and ${P}_{pub}=sP$. To extract the identity $I{D}_{i}$ of ${V}_{i}$, the attacker has to compute $I{D}_{i}=PI{D}_{i,2}\oplus H(s\xb7PI{D}_{i,2},{t}_{i})$. However, it is impossible to solve ${w}_{i}\xb7s\xb7P$ for any attacker to obtain $I{D}_{i}$ without knowing ${w}_{i}$ and s. Therefore, the identity privacy is guaranteed in the proposed EP${}^{2}$DS scheme.
Traceability: In accordance with the proposed EP${}^{2}$DS scheme, $TA$ can adopt its own master key s to calculate $I{D}_{i}=PI{D}_{i,2}\oplus H(s\xb7PI{D}_{i,2},{t}_{i})$, and find out the identity $I{D}_{i}$ of ${V}_{i}$ from the pseudo identity $PI{D}_{i}$ involved in the data report, with the proposed EP${}^{2}$DS scheme satisfying the traceability.
Unlinkability: On the basis of the proposed EP${}^{2}$DS scheme, the data reports generated by any vehicle are random, and any attacker cannot link the two data reports sent by the same vehicle, with the proposed EP${}^{2}$DS scheme realizing the traceability.
Resistance to attacks: The proposed EP${}^{2}$DS scheme is able to withstand the networks attacks in the following:
- Modification attack: Based on Theorem 2, any polynomial attacker is unable to forge a valid data report with modification on data reports found.
- Replay attack: On the basis of the proposed EP${}^{2}$DS scheme, the timestamp is contained in the data report. By examining freshness of the timestamp, the verifier is able to bear any replay attacks.
- Impersonation attack: From Theorem 2, no attacker can fabricate a legal data report without vehicle’s private key.
- Man-in-the-middle attack: The analysis of the modification attack shows that any modification of the data reports on transmission is able to be found.
Security comparisons of schemes [17,19,23,25,26] and the proposed EP${}^{2}$DS scheme are displayed in Table 2. S1, S2, S3, S4, S5, S6, S7, S8, S9, and S10 are used to represent authentication and data integrity, confidentiality, location privacy preservation, identity privacy preservation, traceability, unlinkability, the modification attack, the replay attack, the impersonation attack, and the man-in-the-middle attack, respectively.
In accordance with Table 2, Rabieh et al.’s scheme [17] is able to provide location privacy preservation, identity privacy preservation, and traceability. Sun et al.’s scheme [19] cannot achieve location privacy preservation. Kong et al.’s scheme [23] cannot achieve identity privacy preservation, traceability, the replay attack, and the man-in-the-middle attack. Paulet et al.’s scheme [25] cannot achieve authentication and data integrity, identity privacy preservation, traceability, the modification attack, the replay attack, the impersonation attack, and the man-in-the-middle attack. Zhu et al.’s scheme [26] cannot achieve identity privacy preservation and traceability, the replay attack, and the man-in-the-middle attack. In contrast, all security requirements are able to be satisfied in the proposed EP${}^{2}$DS scheme.
6. Performance Evaluation
We analyze the computation and communication costs of these schemes [17,19,23,25,26] and the proposed EP${}^{2}$DS scheme, and evaluate their performance.
To realize a fair comparison, we compare these schemes [17,19,23,25,26] with the proposed EP${}^{2}$DS scheme under the 80-bit security level [38]. Regarding the pairing-based schemes [17,19,23,25,26], we choose a bilinear pairing $e:{\mathbb{G}}_{1}\times {\mathbb{G}}_{1}\to {\mathbb{G}}_{2}$, where ${\mathbb{G}}_{1}$ is an additive group defined by the generator P with order q on the super singular elliptic curve $E:{y}^{2}={x}^{3}+x\phantom{\rule{0.277778em}{0ex}}mod\phantom{\rule{0.277778em}{0ex}}p$ with the embedding degree 2, q is 160-bit Solinas prime number and p is 512-bit primer number meeting $q\xb712\xb7r=p+1$. With regard to the proposed EP${}^{2}$DS scheme, we pick a group $\mathbb{G}$, where $\mathbb{G}$ is produced by the generator P with the order q on an elliptic curve $E:{y}^{2}={x}^{3}+ax+b\phantom{\rule{0.277778em}{0ex}}mod\phantom{\rule{0.277778em}{0ex}}p$ with a prime order q, where q, p are 160 bits prime number and $a=-3$, b is 160-bits random prime number.
The running time of the operations is able to be derived by making use of the MIRACL Crypto SDK [39]. We run the experiment on a 64-bit Windows 10 operating system with 2.53 GHz, an i7 CPU and 4 GB memory. Table 3 lists the average running time for these operations.
6.1. Computation Costs
The computation costs of the proposed EP${}^{2}$DS scheme and these schemes [17,19,23,25,26] are displayed in Table 4.
In the data collection phase, for Rabieh et al.’s scheme [17], ${V}_{i}$ requires running two multiplication operations in ${\mathbb{G}}_{1}$ and two exponentiation operations in ${\mathbb{G}}_{1}$, thus the total time is $2{T}_{m}+2{T}_{e}$ = 6.9164 ms. $FN$ requires executing one multiplication operation in ${\mathbb{G}}_{1}$, one exponentiation operation in ${\mathbb{G}}_{1}$, and $w+1$ bilinear pairing operations in ${\mathbb{G}}_{1}$, and thus the total time is ${T}_{m}+{T}_{e}+(w+1){T}_{p}$ = 10.3092w+13.7674 ms. $CC$ requires executing one exponentiation operation in ${\mathbb{G}}_{1}$ and $n+1$ bilinear pairing operations in ${\mathbb{G}}_{1}$, and hence the total time is ${T}_{e}+(n+1){T}_{p}=10.3092n+2.0289$ ms.
For Sun et al.’s scheme [19], ${V}_{i}$ requires running two multiplication operations in ${\mathbb{G}}_{1}$ and one exponentiation operation in ${\mathbb{G}}_{1}$ and one map to point hash function operation, thus the total time is $2{T}_{m}+{T}_{e}+{T}_{h}$ = 15.1967 ms. $FN$ requires executing $w+3$ multiplication operations in ${\mathbb{G}}_{1}$ and four bilinear pairing operations in ${\mathbb{G}}_{1}$, so the total time is $(w+3){T}_{m}+4{T}_{p}$ = 1.4293w +45.5247 ms. $CC$ requires executing one multiplication operation in ${\mathbb{G}}_{1}$, n exponentiation operations in ${\mathbb{G}}_{1}$ and two multiplication operations in ${\mathbb{G}}_{1}$, and hence the total time is ${T}_{m}+n{T}_{e}+2{T}_{p}=2.0289n+11.7385$ ms.
For Kong et al.’s scheme [23], ${V}_{i}$ requires running four multiplication operations in ${\mathbb{Z}}_{{n}^{2}}$ and four exponentiation operations in ${\mathbb{Z}}_{{n}^{2}}$, thus the total time is $4{T}_{m}+4{T}_{e}$ = 13.8328 ms. $FN$ requires executing $2w$ multiplication operations in ${\mathbb{G}}_{1}$, so the total time is $2w{T}_{m}$ = 2.8586w ms. $CC$ requires executing $6n$ multiplication operations in ${\mathbb{G}}_{1}$ and $4n$ exponentiation operations in ${\mathbb{G}}_{1}$, and hence the total time is $6n{T}_{m}+4n{T}_{e}=16.6914n$ ms.
For the proposed EP${}^{2}$DS scheme, ${V}_{i}$ needs to run five scalar multiplication operations in $\mathbb{G}$, and therefore the total time is $5{T}_{sm}$ = 1.9255 ms. $FN$ requires executing $w+3$ scalar multiplication operations in $\mathbb{G}$; accordingly, the total time is $(w+3){T}_{sm}$ = 0.3851w+1.1553 ms. $CC$ requires executing $n+3$ scalar multiplication operations in $\mathbb{G}$ and two solving the DL operations; therefore, the total time is $(n+3){T}_{sm}+2{T}_{log}$ = 0.3851n+2.4429 ms.
In the data query phase, for Kong et al.’s scheme [23], ${V}_{q}$ requires running ten multiplication operations in ${\mathbb{G}}_{1}$ and seven exponentiation operations in ${\mathbb{G}}_{1}$, so the total time is $10{T}_{m}+7{T}_{e}$ = 28.4953 ms. $FN$ needs to run nine multiplication operations in ${\mathbb{G}}_{1}$ and seven exponentiation operations in ${\mathbb{G}}_{1}$, the total time is thus $9{T}_{m}+7{T}_{e}$ = 27.0660 ms. For Paulet et al.’s scheme [25], ${V}_{q}$ requires running five multiplication operations in ${\mathbb{G}}_{1}$ and nine exponentiation operations in ${\mathbb{G}}_{1}$, the total time is thus $5{T}_{m}+9{T}_{e}$ = 25.4066 ms. $FN$ needs to run $6m$ multiplication operations in ${\mathbb{G}}_{1}$ and $8m+3$ exponentiation operations in ${\mathbb{G}}_{1}$, the total time is thus $6m{T}_{m}+(8m+3){T}_{e}$ = 24.8070m +6.0867 ms.
For Zhu et al.’s scheme [26], ${V}_{q}$ requires running five exponentiation operations in ${\mathbb{G}}_{1}$ and two bilinear pairing operation in ${\mathbb{G}}_{1}$, the total time is thus $5{T}_{e}+2{T}_{p}$ = 30.7629 ms. $FN$ needs to run four multiplication operations in ${\mathbb{G}}_{1}$ and four bilinear pairing operation in ${\mathbb{G}}_{1}$, the total time is thus $4{T}_{m}+4{T}_{p}$ = 46.9540 ms.
For the proposed EP${}^{2}$DS scheme, ${V}_{q}$ needs to run eleven scalar multiplication operations in $\mathbb{G}$ and two solving the DL operations, and hence the total time is $11{T}_{sm}+2{T}_{log}$ = 5.5237 ms. $FN$ needs to run eight scalar multiplication operations in $\mathbb{G}$, thus the total time is $8{T}_{sm}$ = 3.0808 ms.
Figure 3 clearly demonstrates the comparison result of computation costs in the data collection phase. Figure 3a shows that the computation costs of ${V}_{i}$ is 1.9255 ms, which decreases by 72.2%, 87.3%, and 86.1% compared with that by Rabieh et al.’s scheme [17], Sun et al.’s scheme [19], and Kong et al.’s scheme [23], respectively. As shown in Figure 3b, the computation costs of $FN$ increase linearly with the number of vehicles, with the proposed EP${}^{2}$DS scheme having a lower slope compared with Rabieh et al.’s scheme [17], Sun et al.’s scheme [19], and Kong et al.’s scheme [23]. From Figure 3c, we can see that the computation costs of $CC$ grows linearly with the number of fog nodes, and the proposed EP${}^{2}$DS scheme has a lower slope compared with Rabieh et al.’s scheme [17], Sun et al.’s scheme [19], and Kong et al.’s scheme [23].
Figure 4 clearly indicates the comparison result of the computation costs in the data query phase. From Figure 4a, we can know that the computation costs of ${V}_{q}$ in the proposed EP${}^{2}$DS scheme are 5.5237 ms, which decreases by 80.6%, 78.3%, and 82.0% compared with that by Kong et al.’s scheme [23], Paulet et al.’s scheme [25], and Zhu et al.’s scheme [26], respectively. Figure 4b shows the correlation between the computation cost of $FN$ and the number of segments m, we can see that the computation cost of $FN$ in the EP${}^{2}$DS scheme is the smallest compared with Kong et al.’s scheme [23], Paulet et al.’s scheme [25], and Zhu et al.’s scheme [26]. The computation costs of $FN$ in the proposed EP${}^{2}$DS scheme are 3.0808 ms, which decreases by 88.6% and 93.4% compared with Kong et al.’s scheme [23] and Zhu et al.’s scheme [26]. Furthermore, unlike Paulet et al.’s scheme [25], the computation cost of $FN$ in the EP${}^{2}$DS scheme does not increase with the number of segments m.
6.2. Communication Costs
The communication costs of the proposed EP${}^{2}$DS scheme and these schemes [17,19,23,25,26], are evaluated in this subsection. We mainly consider the data report size, query report size, and response report size. As mentioned above, the lengths of the elements in $\mathbb{G}$, ${\mathbb{Z}}_{q}^{*},{\mathbb{Z}}_{n}$, and ${\mathbb{Z}}_{{n}^{2}}$ are 160 bits (20 bytes), 160 bits (20 bytes), 1024 bits (128 bytes), and 2048 bits (256 bytes), respectively, assuming that the length of timestamp and identity are 32 bits (4 bytes). The comparison results of communication costs are illustrated in Table 5.
In the data collection phase, for Rabieh et al.’s scheme [17], the data report size is 260 bytes, as
$$\begin{array}{c}|{C}_{v}|+|TS|+|{\alpha}_{v}|=128+4+128=260\phantom{\rule{0.277778em}{0ex}}\mathrm{bytes}.\hfill \end{array}$$
For Sun et al.’s scheme [19], the data report size is 516 bytes, as
$$\begin{array}{c}|{S}_{c}|+|Sign{C}_{i}|+|{t}_{i}|=256+256+4=516\phantom{\rule{0.277778em}{0ex}}\mathrm{bytes}.\hfill \end{array}$$
For Kong et al.’s scheme [23], the data report size is 1152 bytes, as
$$\begin{array}{c}|{C}_{i,1}|+|{C}_{i,2}|+|{C}_{i,3}|+|{C}_{i,4}|+|MA{C}_{i}|=256+256+256+256+128=1152\phantom{\rule{0.277778em}{0ex}}\mathrm{bytes}.\hfill \end{array}$$
For the proposed EP${}^{2}$DS scheme, the data report size is 172 bytes, as
$$\begin{array}{c}\phantom{\rule{1.em}{0ex}}|PI{D}_{i}|+|{R}_{i}|+|{A}_{i}^{j}|+|{B}_{i}^{j}|+|{C}_{i}^{j}|+|{D}_{i}^{j}|+|{L}_{i}^{j}|+|{\sigma}_{i}^{j}|+|{T}_{i}^{j}|\hfill \\ =28+20+20+20+20+20+20+20+4+4=172\phantom{\rule{0.277778em}{0ex}}\mathrm{bytes}.\hfill \end{array}$$
In the data query phase, for Kong et al.’s scheme [23], the query report size is 1152 bytes, as
$$\begin{array}{c}|{C}_{a,1}|+|{C}_{a,2}|+|{C}_{a,3}|+|{C}_{a,4}|+|MA{C}_{a}|=256+256+256+256+128=1152\phantom{\rule{0.277778em}{0ex}}\mathrm{bytes}.\hfill \end{array}$$
The response report size is 1664 bytes, as
$$\begin{array}{c}\phantom{\rule{1.em}{0ex}}|{C}_{r,1}|+|{C}_{r,2}|+|{C}_{r,3}|+|{C}_{r,4}|+|{C}_{r,5}|+|{C}_{r,6}|+|MA{C}_{r}|\hfill \\ =256+256+256+256+256+256+128=1664\phantom{\rule{0.277778em}{0ex}}\mathrm{bytes}.\hfill \end{array}$$
For Paulet et al.’s scheme [25], the query report size is 256 bytes, as
$$\begin{array}{c}|{C}_{1}|+|{C}_{2}|=128+128=256\phantom{\rule{0.277778em}{0ex}}\mathrm{bytes}.\hfill \end{array}$$
The response report size is 256m+128 bytes, as
$$\begin{array}{c}\phantom{\rule{1.em}{0ex}}|{C}_{1,1}^{{}^{\prime}}|+|{C}_{1,2}^{{}^{\prime}}|+\xb7\xb7\xb7+|{C}_{1,m}^{{}^{\prime}}|+|{C}_{2,1}^{{}^{\prime}}|+|{C}_{2,2}^{{}^{\prime}}|\xb7\xb7\xb7+|{C}_{2,m}^{{}^{\prime}}|+|\gamma |\hfill \\ =128m+128m+128=256m+128\phantom{\rule{0.277778em}{0ex}}\mathrm{bytes}.\hfill \end{array}$$
For Zhu et al.’s scheme [26], the query report size is 324 bytes, as
$$\begin{array}{c}|I{D}_{LBS}|+|{E}_{LQR}|+|{U}_{i}|+|TS|+|Si{g}_{i}|=4+256+256+4+256=324\phantom{\rule{0.277778em}{0ex}}\mathrm{bytes}.\hfill \end{array}$$
The response report size is 320 bytes, as
$$\begin{array}{c}|{E}_{r{q}_{1}}\left(TRL\right)|+|I{D}_{cs}|+|TS|+|Si{g}_{cs}|=256+4+4+256=320\phantom{\rule{0.277778em}{0ex}}\mathrm{bytes}.\hfill \end{array}$$
For the proposed EP${}^{2}$DS scheme, the query report size is 172 bytes, as
$$\begin{array}{c}\phantom{\rule{1.em}{0ex}}|PI{D}_{q}|+|{R}_{q}|+|{A}_{q}^{j}|+|{B}_{q}^{j}|+|{C}_{q}^{j}|+|{D}_{q}^{j}|+|{L}_{q}^{j}|+|{\sigma}_{q}^{j}|+|{T}_{q}^{j}|\hfill \\ =28+20+20+20+20+20+20+20+4=172\phantom{\rule{0.277778em}{0ex}}\mathrm{bytes}.\hfill \end{array}$$
The response report size is 148 bytes, as
$$\begin{array}{c}\phantom{\rule{1.em}{0ex}}|I{D}_{F{N}_{j}}|+|{R}_{F{N}_{j}}|+|{J}_{q}^{j}|+|{K}_{q}^{j}|+|{M}_{q}^{j}|+|{N}_{q}^{j}|+|{\widehat{L}}_{q}^{j}|+|{\widehat{\sigma}}_{q}^{j}|+|{\widehat{T}}_{q}^{j}|\hfill \\ =4+20+20+20+20+20+20+20+4=148\phantom{\rule{0.277778em}{0ex}}\mathrm{bytes}.\hfill \end{array}$$
The results from the comparison of communication costs in the data collection phase are illustrated in Figure 5. In terms of the data report size, the proposed EP${}^{2}$DS scheme requires 172 bytes, which is decreased by 33.8%, 66.7%, and 85.1% compared with that for Rabieh et al.’s scheme [17], Sun et al.’s scheme [19], and Kong et al.’s scheme [23], respectively.
The result from the comparison of communication costs in the data query phase is shown in Figure 6. Regarding the query report size, from Figure 6a, we can see that the proposed EP${}^{2}$DS scheme requires 172 bytes, a decrease of 85.1%, 32.8%, and 46.9% compared with that by Kong et al.’s scheme [23], Paulet et al.’s scheme [25], and Zhu et al.’s scheme [26], respectively. Figure 6b shows the correlation between the response report size and the number of segments m, and we can see that the response report size in the EP${}^{2}$DS scheme is the smallest compared with Kong et al.’s scheme [23], Paulet et al.’s scheme [25], and Zhu et al.’s scheme [26]. The proposed EP${}^{2}$DS scheme requires 148 bytes, which is decreased by 91.1% and 53.8% compared with that of Kong et al.’s scheme [23] and Zhu et al.’s scheme [26], respectively. Furthermore, unlike Paulet et al.’s scheme [25], the response report size in the EP${}^{2}$DS scheme does not increase with the number of segments m.
7. Conclusions
This paper proposes an efficient privacy-preserving data sharing scheme for fog-assisted vehicular sensor networks. Based on the super-increasing sequence, the proposed EP${}^{2}$DS scheme is able to format the data reports captured at different road segments into one report, while calculating the average sensory data in each road segment, greatly saving on the resources of communication and computation. Furthermore, by exploiting the modified oblivious transfer technology, the proposed EP${}^{2}$DS scheme also can query the road conditions of the potential moving route in the data query phase without disclosing the query location. Finally, an analysis of security displays that the proposed EP${}^{2}$DS scheme can satisfy all the requirements for security and privacy, with the performance evaluation suggesting that the proposed EP${}^{2}$DS scheme is more efficient in computation and communication costs compared to the existing schemes of [17,19,23,25,26]. Accordingly, the proposed EP${}^{2}$DS scheme is more appropriate for achieving data sharing in fog-assisted vehicular sensor networks. In future work, we will consider using blockchain technology to achieve decentralization and privacy protection.
Author Contributions
Y.M. and X.Y. conceived of the work, designed the concrete scheme, and wrote the paper. All authors have read and agreed to the published version of the manuscript.
Funding
This work was supported in part by the Natural Science Foundation of Shaanxi Province under Grant 2018JM6081, and in part by the Fundamental Research Funds for the Central Universities, CHD, under Grant 300102249204.
Acknowledgments
The authors would like to thank the anonymous reviewers for their constructive comments and suggestions which helped us to improve the organization and presentation of this paper.
Conflicts of Interest
The authors declare no conflict of interest.
Appendix A
Security Model
The proposed EP${}^{2}$DS scheme should satisfy the confidentiality and unforgeability. The security is defined by the following two interaction games executed by a challenger $\mathcal{C}$ and an attacker $\mathcal{A}$. $\mathcal{A}$ could make the following queries.
- Hash queries: Upon receiving the query, $\mathcal{C}$ returns a random value to $\mathcal{A}$.
- Extract queries: Upon receiving the query on the pseudo identity $PI{D}_{i}$, $\mathcal{C}$ returns a private key to $\mathcal{A}$.
- Signcryption queries: Upon receiving the query on the message ${m}_{i}$ under $PI{D}_{i}$, $\mathcal{C}$ returns a ciphertext to $\mathcal{A}$.
Definition A1
(Confidentiality). The proposed scheme is secure against indistinguishability under the chosen plaintext attack (IND-CPA), if any probabilistic polynomial-time attacker does not have the ability to win the below game with a non-negligible advantage.
The IND-CPA is defined by the following game.
Setup: $\mathcal{C}$ generates the system parameters and returns to $\mathcal{A}$.
Phase 1: $\mathcal{A}$ adaptively makes the hash, extract, and signcryption queries with polynomial bounded times.
Challenge: $\mathcal{A}$ chooses a challenging identity $PI{D}_{i}^{*}$, picks two messages ${m}_{0}^{*}$ and ${m}_{1}^{*}$ and sends to $\mathcal{C}$. $\mathcal{C}$ randomly picks $b\in \{0,1\}$ and produces the ciphertext of message ${m}_{b}^{*}$ under $PI{D}_{i}^{*}$. Finally, $\mathcal{C}$ returns the ciphertext to $\mathcal{A}$.
Phase 2: $\mathcal{A}$ is able to adaptively perform the query in Phase 1 apart from that, it cannot make extract queries on $PI{D}_{i}^{*}$.
Guess: $\mathcal{A}$ produces a guess ${b}^{\prime}\in \{0,1\}$. The advantage that $\mathcal{A}$ wins the game is
$$Ad{v}_{\mathcal{A}}^{IND-CPA}=|Pr[{b}^{\prime}=b]-\frac{1}{2}|.$$
Definition A2
(Unforgeability). The proposed scheme can achieve existential unforgeability against adaptive chosen message attacks (EUF-CMA), if any probabilistic polynomial-time attacker does not have the ability to win the below game with a non-negligible advantage.
The EUF-CMA is defined by the following game.
Initialization: $\mathcal{A}$ selects a challenging pseudo identity $PI{D}_{i}^{*}$ and transmits to $\mathcal{C}$.
Setup: $\mathcal{C}$ generates the system parameters and returns to $\mathcal{A}$.
Queries: $\mathcal{A}$ adaptively makes hash, extract and signcryption queries.
Forgery: $\mathcal{A}$ outputs a ciphertext on ${m}_{i}^{*}$ under $PI{D}_{i}^{*}$, such that
- The ciphertext on ${m}_{i}^{*}$ under $PI{D}_{i}^{*}$ is valid.
- $PI{D}_{i}^{*}$ has not been requested in the extract queries.
Appendix B
Security Proof
Theorem A1.
The proposed EP${}^{2}$DS scheme can provide confidentiality if ElGamal encryption is secure against the IND-CPA.
Supposing there is an attacker $\mathcal{A}$ is able to win the game defined in Definition 1 with a non-negligible probability $\epsilon $, we can construct an algorithm $\mathcal{B}$ that could break the IND-CPA of ElGamal encryption with probability ${\epsilon}^{\prime}$.
Initialization: The simulator $\mathcal{S}$ for ElGamal encryption generates the $\{p,q,P,\mathbb{G},{P}_{pub})$ and transmits to $\mathcal{B}$.
Setup: $\mathcal{B}$ chooses hash functions ${H}_{i}$: $i=1,2,\xb7\xb7\xb7,8$ and a super-increasing sequence $\overrightarrow{a}$. Finally, $\mathcal{B}$ returns $\{p,q,P,\mathbb{G},$ ${P}_{pub},{P}_{sp},{H}_{1},{H}_{2},{H}_{3},{H}_{4},{H}_{5},{H}_{6},{H}_{7},{H}_{8},\overrightarrow{a}\}$ to $\mathcal{A}$.
To keep the rapidly response and consistency, $\mathcal{B}$ maintains the following list:
- ${L}_{{H}_{2}}$: It consists of tuples $(PI{D}_{i},{R}_{i},{P}_{pub},{h}_{i})$.
- ${L}_{{H}_{4}}$: It consists of tuples $(PI{D}_{i},{R}_{i},{C}_{i,1},{C}_{i,2},{L}_{i},$${T}_{i},{\tau}_{i})$.
- ${L}_{{V}_{i}}$: It consists of tuples $(PI{D}_{i},{x}_{i},{R}_{i})$.
Phase 1: $\mathcal{A}$ adaptively is able to adaptively perform the following polynomial bounded times queries.
${H}_{2}$ queries: $\mathcal{A}$ performs a query on $(PI{D}_{i},{R}_{i},{P}_{pub})$, $\mathcal{B}$ executes as follows:
- If ${L}_{{H}_{2}}$ contains $(PI{D}_{i},{R}_{i},{P}_{pub},{h}_{i})$, $\mathcal{B}$ responds with the previous value ${h}_{i}={H}_{2}(PI{D}_{i},{R}_{i},{P}_{pub})$ to $\mathcal{A}$.
- If ${L}_{{H}_{2}}$ does not contain $(PI{D}_{i},{R}_{i},{P}_{pub},{h}_{i})$, $\mathcal{B}$ randomly chooses a number ${h}_{i}\in {\mathbb{Z}}_{q}^{*}$, adds $(PI{D}_{i},{R}_{i},$ ${P}_{pub},{h}_{i})$ into ${L}_{{H}_{2}}$ and returns ${h}_{i}$ to $\mathcal{A}$.
${H}_{4}$ queries: $\mathcal{A}$ performs a query on $(PI{D}_{i},{R}_{i},{C}_{i,1},{C}_{i,2},$ ${L}_{i},{T}_{i})$, $\mathcal{B}$ executes as follows:
- If ${L}_{{H}_{4}}$ contains $(PI{D}_{i},{R}_{i},{C}_{i,1},{C}_{i,2},{L}_{i},{T}_{i},{\tau}_{i})$, $\mathcal{B}$ responds with the previous value ${\tau}_{i}={H}_{4}(PI{D}_{i},{R}_{i},{C}_{i,1},$ ${C}_{i,2},{L}_{i},{T}_{i})$ to $\mathcal{A}$.
- If ${L}_{{H}_{4}}$ does not contain $(PI{D}_{i},{R}_{i},{C}_{i,1},{C}_{i,2},{L}_{i},$ ${T}_{i},{\tau}_{i})$, $\mathcal{B}$ randomly chooses a number ${\tau}_{i}\in {\mathbb{Z}}_{q}^{*}$, adds $(PI{D}_{i},{R}_{i},{C}_{i,1},{C}_{i,2},{L}_{i},{T}_{i},{\tau}_{i})$ into ${L}_{{H}_{4}}$ and returns ${\tau}_{i}$ to $\mathcal{A}$.
Extract queries: $\mathcal{A}$ performs a query on $PI{D}_{i}$, $\mathcal{B}$ executes as follows:
- If $PI{D}_{i}=PI{D}_{i}^{*}$, $\mathcal{B}$ aborts the game.
- If $PI{D}_{i}\ne PI{D}_{i}^{*}$, $\mathcal{B}$ executes:
- -
- If ${L}_{{V}_{i}}$ contains $(PI{D}_{i},{x}_{i},{R}_{i})$, $\mathcal{B}$ returns $({x}_{i},{R}_{i})$ to $\mathcal{A}$.
- -
- If ${L}_{{V}_{i}}$ does not contain $(PI{D}_{i},{x}_{i},{R}_{i})$, $\mathcal{B}$ randomly chooses ${x}_{i},{h}_{i}\in {\mathbb{Z}}_{q}^{*}$ and makes ${R}_{i}={x}_{i}P-{h}_{i}{P}_{pub}$. If ${h}_{i}$ already appear in ${L}_{{H}_{2}}$, $\mathcal{B}$ chooses another ${x}_{i}\in {\mathbb{Z}}_{q}^{*}$ and tries again. $\mathcal{B}$ inserts $(PI{D}_{i},{x}_{i},{R}_{i})$ and $(PI{D}_{i},{R}_{i},{P}_{pub},{h}_{i})$ into ${L}_{{V}_{i}}$ and ${L}_{{H}_{2}}$, respectively. Finally, $\mathcal{B}$ returns the $({x}_{i},{R}_{i})$ to $\mathcal{A}$.
Signcryption queries: $\mathcal{A}$ makes a query on the message ${m}_{i}$ under $PI{D}_{i}$, $\mathcal{B}$ returns ${m}_{i}$ to $\mathcal{S}$. $\mathcal{S}$ randomly chooses ${t}_{i}\in {\mathbb{Z}}_{q}^{*}$ and computes ${C}_{i,1}={t}_{i}P$, ${C}_{i,2}={t}_{i}{P}_{cc}+{m}_{i}P$,and returns them to $\mathcal{B}$. $\mathcal{B}$ produces a ciphertext $\{PI{D}_{i},$ ${R}_{i},{C}_{i,1},{C}_{i,2},{L}_{i},{\sigma}_{i},{T}_{i}\}$ in accordance with the proposed scheme. Finally, $\mathcal{B}$ returns the ciphertext to $\mathcal{A}$.
Challenge: $\mathcal{A}$ selects a challenging identity $PI{D}_{i}^{*}$, picks two same length message ${m}_{0}^{*}$ and ${m}_{1}^{*}$ and sends them to $\mathcal{B}$. Then $\mathcal{B}$ transmits them to $\mathcal{S}$. $\mathcal{S}$ randomly chooses $b\in \{0,1\}$, ${t}_{i}^{*}\in {\mathbb{Z}}_{q}^{*}$ and computes ${C}_{i,1}^{*}={t}_{i}^{*}P$, ${C}_{i,2}^{*}={t}_{i}^{*}{P}_{cc}+{m}_{b}^{*}P$, and returns them to $\mathcal{B}$. $\mathcal{B}$ produce a ciphertext $\{PI{D}_{i}^{*},{R}_{i}^{*},{C}_{i,1}^{*},{C}_{i,2}^{*},{L}_{i}^{*},{\sigma}_{i}^{*},{T}_{i}^{*}\}$ in accordance with the proposed scheme. Finally, $\mathcal{B}$ returns the ciphertext to $\mathcal{A}$.
Phase 2: $\mathcal{A}$ is able to adaptively perform the query in Phase 1 apart from it cannot make a extract queries on $PI{D}_{i}^{*}$.
Guess: $\mathcal{B}$ can output ${b}^{\prime}$ as its guess against the IND-CPA of ElGamal encryption.
Probability analysis: Supposing that $\mathcal{A}$ is able to make at most ${q}_{{H}_{2}}$ times ${H}_{2}$ queries, ${q}_{{H}_{4}}$ times ${H}_{4}$ queries, ${q}_{e}$ times extract queries and ${q}_{s}$ times signcryption queries. We define two events as follows:
- ${E}_{1}$: $\mathcal{B}$ does not abort above game in extract queries.
- ${E}_{2}$: $\mathcal{B}$ is able to correctly output the value of b.
According to the above simulation, we could obtain that $Pr\left[{E}_{1}\right]\ge {(1-\frac{1}{{q}_{{H}_{2}}})}^{{q}_{e}}$ and $Pr\left[{E}_{2}\right|{E}_{1}]\ge \epsilon $, and hence the advantage that $\mathcal{B}$ is able to break the IND-CPA of ElGamal encryption is
$${\epsilon}^{\prime}=Pr\left[{E}_{2}\right|{E}_{1}]Pr\left[{E}_{1}\right]\ge {(1-\frac{1}{{q}_{{H}_{2}}})}^{{q}_{e}}\epsilon .$$
In accordance with the above analysis, we can conclude that $\mathcal{B}$ can break the IND-CPA of ElGamal encryption with a non-negligible probability, this is contradicts with the security of ElGamal encryption, so the proposed EP${}^{2}$DS scheme could provide confidentiality.
Theorem A2.
The proposed EP${}^{2}$DS scheme can provide the unforgeability if the ECDL problem is hard.
Assuming that there is an attacker $\mathcal{A}$ can break the unforgeability of the proposed EP${}^{2}$DS scheme with a non-negligible advantage $\epsilon $, we can construct an algorithm $\mathcal{B}$ for solving the ECDL problem with probability ${\epsilon}^{\prime}$.
Initialization: $\mathcal{A}$ picks a challenging identity $PI{D}_{i}^{*}$ and returns to $\mathcal{B}$.
Setup: Given an instance $(P,aP=Q)$ of the ECDL problem, then $\mathcal{B}$ sets ${P}_{pub}=Q$ and returns $\{p,q,P,\mathbb{G},{P}_{pub},{P}_{sp},{H}_{1},$ ${H}_{2},{H}_{3},{H}_{4},{H}_{5},{H}_{6},{H}_{7},{H}_{8},\overrightarrow{a}\}$ to $\mathcal{A}$.
${H}_{2}$ queries: It is the same as Theorem 1.
${H}_{4}$ queries: It is the same as Theorem 1.
Extract queries: It is the same as Theorem 1.
Signcryption queries: $\mathcal{A}$ makes a query on the message ${m}_{i}$ under $PI{D}_{i}$, $\mathcal{B}$ executes as follows:
- If $PI{D}_{i}=PI{D}_{i}^{*}$, $\mathcal{B}$ randomly selects ${t}_{i},{l}_{i},{\sigma}_{i},{h}_{i},{\tau}_{i}\in {\mathbb{Z}}_{q}^{*}$ and calculates ${C}_{i,1}={t}_{i}P$, ${C}_{i,2}={t}_{i}{P}_{cc}+{m}_{i}P$, ${L}_{i}={l}_{i}P,{R}_{i}={\sigma}_{i}P-({h}_{i}{P}_{pub}+{\tau}_{i}{L}_{i})$. If the ${h}_{i}$ already appears in ${L}_{{H}_{2}}$ or ${\tau}_{i}$ already appears in ${L}_{{H}_{4}}$, $\mathcal{B}$ chooses another ${\sigma}_{i}\in {\mathbb{Z}}_{q}^{*}$ and tries again. Then, $\mathcal{B}$ returns the ciphertext $\{PI{D}_{i},{R}_{i},{C}_{i,1},{C}_{i,2},{L}_{i},{\sigma}_{i},$ ${T}_{i}\}$ to $\mathcal{A}$, and inserts $(PI{D}_{i},{R}_{i},{P}_{pub},{h}_{i})$ and $(PI{D}_{i},{R}_{i},{C}_{i,1},{C}_{i,2},$ ${L}_{i},{T}_{i},{\tau}_{i})$ into ${L}_{{H}_{2}}$ and ${L}_{{H}_{4}}$, respectively.
- If $PI{D}_{i}\ne PI{D}_{i}^{*}$, $\mathcal{B}$ generates a ciphertext $\{PI{D}_{i},{R}_{i},$ ${C}_{i,1},{C}_{i,2},{L}_{i},{\sigma}_{i},{T}_{i}\}$ in accordance with the proposed scheme. Then, $\mathcal{B}$ returns the ciphertext to $\mathcal{A}$.
Forgery: $\mathcal{A}$ outputs a forged ciphertexts $\{PI{D}_{i}^{*},{R}_{i}^{*},$ ${C}_{i,1}^{*},{C}_{i,2}^{*},{L}_{i}^{*},{\sigma}_{i}^{*},{T}_{i}^{*}\}$ on ${m}_{i}^{*}$ under $PI{D}_{i}^{*}$. On the basis of the forking lemma [40,41], $\mathcal{B}$ is able to output another valid ciphertext $\{PI{D}_{i}^{*},{R}_{i}^{*},{C}_{i,1}^{*},{C}_{i,2}^{*},{L}_{i}^{*},{\sigma}_{i}^{{*}^{\prime}},{T}_{i}^{*}\}$ on ${m}_{i}^{*}$ under $PI{D}_{i}^{*}$ by choosing a different ${H}_{2}$. Since both ciphertexts are valid, we are able to gain the following two equations
$${\sigma}_{i}^{*}P={R}_{i}^{*}+{h}_{i}^{*}{P}_{pub}+{\tau}_{i}^{*}{L}_{i},{\sigma}_{i}^{{*}^{\prime}}P={R}_{i}^{*}+{h}_{i}^{{*}^{\prime}}{P}_{pub}+{\tau}_{i}^{*}{L}_{i}.$$
We can gain the equations:
$$\begin{array}{c}({\sigma}_{i}^{*}-\sigma {}_{i}^{{*}^{\prime}})P={\sigma}_{i}^{*}P-\sigma {}_{i}^{{*}^{\prime}}P=({h}_{i}^{*}-h{}_{i}^{{*}^{\prime}}){P}_{pub}=({h}_{i}^{*}-h{}_{i}^{{*}^{\prime}})aP.\hfill \end{array}$$
$\mathcal{B}$ outputs $a={({h}_{i}^{*}-{h}_{i}^{{*}^{\prime}})}^{-1}({\sigma}_{i}^{*}-{\sigma}_{i}^{{*}^{\prime}})$ as a solution of ECDL problem.
Probability analysis: Supposing that $\mathcal{A}$ is able to make at most ${q}_{{H}_{2}}$ times ${H}_{2}$ queries, ${q}_{{H}_{4}}$ times ${H}_{4}$ queries, ${q}_{e}$ times extract queries, and ${q}_{s}$ times signcryption queries. We define three events as follows:
- ${E}_{1}$: $\mathcal{B}$ never abort above game in extract and signcryption queries.
- ${E}_{2}$: $\mathcal{B}$ is able to output a valid ciphertext.
- ${E}_{3}$: $PI{D}_{i}=PI{D}_{i}^{*}$.
According to the above simulation, we could obtain that $Pr\left[{E}_{1}\right]\ge {(1-\frac{1}{{q}_{{H}_{2}}})}^{{q}_{e}}{(1-\frac{1}{{q}_{{H}_{4}}})}^{{q}_{s}}$, $Pr\left[{E}_{2}\right|{E}_{1}]\ge \epsilon $, and $Pr\left[{E}_{3}\right|{E}_{1}\wedge {E}_{2}]\ge \frac{1}{{q}_{{H}_{2}}}$. Thus, the probability that $\mathcal{B}$ is able to solve the ECDL problem is shown as:
$$\begin{array}{c}{\epsilon}^{\prime}=Pr[{E}_{1}\wedge {E}_{2}\wedge {E}_{3}]\ge Pr\left[{E}_{3}\right|{E}_{1}\wedge {E}_{2}]Pr\left[{E}_{2}\right|{E}_{1}]Pr\left[{E}_{1}\right]\ge \frac{1}{{q}_{{H}_{2}}}{(1-\frac{1}{{q}_{{H}_{2}}})}^{{q}_{e}}{(1-\frac{1}{{q}_{{H}_{4}}})}^{{q}_{s}}\epsilon .\hfill \end{array}$$
Due to the non-negligibility of $\epsilon $, we are able to know that ${\epsilon}^{\prime}$ is non-negligible. In accordance with the above analysis, we are able to conclude that $\mathcal{B}$ can solve the ECDL problem with a non-negligible probability. This contradicts with the hardness of the ECDL problem [42], and hence the proposed EP${}^{2}$DS scheme can provide unforgeability.
References
- Lee, U.; Magistretti, E.; Zhou, B.; Gerla, M.; Bellavista, P.; Corradi, A. MobEyes: Smart mobs for urban monitoring with a vehicular sensor network. IEEE Trans. Commun. Mag. 2006, 13, 52–57. [Google Scholar] [CrossRef]
- Placzek, B. Selective data collection in vehicular networks for traffic control applications. Transp. Res. Part C Emerging Technol. 2012, 23, 14–28. [Google Scholar] [CrossRef]
- Mednis, A.; Elsts, A.; Selavo, L. Embedded solution for road condition monitoring using vehicular sensor networks. In Proceedings of the 2012 6th International Conference on Application of Information and Communication Technologies (AICT), Tbilisi, Georgia, 17–19 October 2012; pp. 1–5. [Google Scholar]
- Fiebig, B. European traffic accidents and purposed solutions. In Proceedings of the ITU-Workshop on Standardization in Telecommunication for Motor Vehicles, Geneva, Switzerland, 24–25 November 2003; pp. 24–25. [Google Scholar]
- Yu, R.; Huang, X.; Kang, J.; Ding, J.; Maharjan, S.; Gjessing, S.; Zhang, Y. Cooperative resource management in cloud-enabled vehicular networks. IEEE Trans. Ind. Electron. 2015, 62, 7938–7951. [Google Scholar] [CrossRef]
- Ni, J.; Lin, X.; Zhang, K.; Shen, X.M. Privacy-preserving real-time navigation system using vehicular crowdsourcing. In Proceedings of the IEEE 84th Vehicular Technology Conference: VTC2016-Fall, Montreal, QC, Canada, 18–21 September 2016; pp. 1–5. [Google Scholar]
- Bonomi, F.; Milito, R.; Zhu, J.; Addepalli, S. Fog computing and its role in the internet of things. In Proceedings of the Mobile Cloud Computing Workshop, Helsinki, Finland, 13–17 August 2012; pp. 13–16. [Google Scholar]
- Armbrust, M.; Fox, A.; Griffith, R.; Joseph, A.D.; Katz, R.H.; Konwinski, A.; Lee, G.; Patterson, D.A.; Rabkin, A.; Stoica, I.; et al. A view of cloud computing. Commun. ACM 2010, 53, 50–58. [Google Scholar] [CrossRef]
- Dai, Y.; Xu, D.; Maharjan, S.; Zhang, Y. Joint offloading and resource allocation in vehicular edge computing and networks. In Proceedings of the IEEE Global Communications Conference, Abu Dhabi, UAE, 9–13 December 2018; pp. 1–7. [Google Scholar]
- Ni, J.; Zhang, K.; Yu, Y.; Lin, X.; Shen, X.S. Privacy-preserving smart parking navigation supporting efficient driving guidance retrieval. IEEE Trans. Veh. Technol. 2018, 67, 6504–6517. [Google Scholar] [CrossRef]
- Basudan, S.; Lin, X.; Sankaranarayanan, K. A privacy-preserving vehicular crowdsensing based road surface condition monitoring system using fog computing. IEEE Internet Things J. 2017, 4, 772–782. [Google Scholar] [CrossRef]
- Chun, S.; Shin, S.; Seo, S.; Eom, S.; Jung, J.; Lee, K. A pubsub-based fog computing architecture for Internet-of-vehicles. In Proceedings of the 8th International Conference on Cloud Computing Technology and Science, Luxembourg, 12–15 December 2016; pp. 90–93. [Google Scholar]
- Ni, J.; Zhang, A.; Lin, X.; Shen, X.S. Security, privacy, and fairness in fog-based vehicular crowdsensing. IEEE Commun. Mag. 2017, 55, 146–152. [Google Scholar] [CrossRef]
- Wei, J.; Wang, X.; Li, N. A privacy-preserving fog computing framework for vehicular crowdsensing betworks. IEEE Access 2018, 6, 43776–43784. [Google Scholar] [CrossRef]
- Omoniwa, B.; Hussain, R.; Javed, M.A. Fog/Edge computing-based IoT (FECIoT): Architecture, applications, and research issues. IEEE Internet Things 2019, 6, 4118–4149. [Google Scholar] [CrossRef]
- Zhuo, G.; Jia, Q.; Guo, L.; Li, M.; Li, P. Privacy-preserving verifiable data aggregation and analysis for cloud-assisted mobile crowdsourcing. In Proceedings of the 35th IEEE International Conference on Computer Communications, San Francisco, CA, USA, 10–14 April 2016; pp. 1–9. [Google Scholar]
- Rabieh, K.; Mahmoud, M.M.E.A.; Younis, M. Privacy-preserving route reporting schemes for traffic management systems. IEEE Trans. Veh. Technol. 2017, 66, 2703–2713. [Google Scholar] [CrossRef]
- Xu, C.; Lu, R.; Wang, H.; Zhu, L.; Huang, C. PAVS: A new privacy-preserving data aggregation scheme for vehicle sensing systems. Sensors 2017, 17, 500. [Google Scholar] [CrossRef] [PubMed]
- Sun, G.; Sun, S.; Sun, J.; Yu, H.; Du, X.; Guizani, M. Security and privacy preservation in fog-based crowd sensing on the internet of vehicles. J. Network Comput. Appl. 2019, 134, 89–99. [Google Scholar] [CrossRef]
- Lin, X.; Lu, R.; Shen, X. MDPA: Multidimensional privacy-preserving aggregation scheme for wireless sensor networks. Wirel. Commun. Mob. Comput. 2010, 10, 843–856. [Google Scholar] [CrossRef]
- Lu, R.; Heung, K.; Lashkari, A.H.; Ghorbani, A.A. A light-weight privacy-preserving data aggregation scheme for fog computing-enhanced IoT. IEEE Access 2017, 5, 3302–3312. [Google Scholar] [CrossRef]
- Wang, B.; Chang, Z.; Zhou, Z.; Ristaniemi, T. Reliable and privacy-preserving task recomposition for crowdsensing in vehicular fog computing. In Proceedings of the 87th Vehicular Technology Conference, Porto, Portugal, 3–6 June 2018; pp. 6–11. [Google Scholar]
- Kong, Q.; Lu, R.; Ma, M.; Bao, H. A privacy-preserving sensory data sharing scheme in internet of vehicles. Future Gener. Comput. Syst. 2019, 92, 644–655. [Google Scholar] [CrossRef]
- Ghinita, G.; Kalnis, P.; Kantarcioglu, M.; Bertino, E. A hybrid technique for private location-based queries with database protection. In Proceedings of the 11th International Symposium on Spatial and Temporal Databases, Aalborg, Denmark, 8–10 July 2009; pp. 98–116. [Google Scholar]
- Paulet, R.; Kaosar, M.G.; Yi, X.; Bertino, E. Privacy-preserving and content protecting location based queries. IEEE Trans. Knowl. Data Eng. 2014, 26, 1200–1210. [Google Scholar] [CrossRef]
- Zhu, H.; Lu, R.; Huang, C.; Chen, L.; Li, H. An efficient privacy-preserving location-based services query scheme in outsourced cloud. IEEE Trans. Veh. Technol. 2016, 65, 7729–7739. [Google Scholar] [CrossRef]
- Zhu, H.; Liu, F.; Li, H. Efficient and privacy-preserving polygons spatial query framework for location-based services. IEEE Internet Things J. 2017, 4, 536–545. [Google Scholar] [CrossRef]
- Naor, M.; Pinkas, B. Oblivious transfer with adaptive queries. In Proceedings of the Advances in Cryptology-CRYPTO’99, Santa Barbara, CA, USA, 15–19 August 1999; pp. 573–590. [Google Scholar]
- IEEE, 802.11p-2010-IEEE Standard for Information technology. Available online: https://ieeexplore.ieee.org/document/5514475/versions#versions (accessed on 14 January 2020).
- Jiang, S.; Liu, J.; Duan, M.; Wang, L.; Fang, L. Secure and privacy-preserving report de-duplication in the fog-based vehicular crowdsensing system. In Proceedings of the IEEE Global Communications Conference, Abu Dhabi, UAE, 9–13 December 2018; pp. 1–6. [Google Scholar]
- Zhu, L.; Li, M.; Zhang, Z. Secure fog-assisted crowdsensing with collusion resistance: From data reporting to data requesting. IEEE Internet Things J. 2019, 6, 5473–5484. [Google Scholar] [CrossRef]
- Miller, V.S. Use of elliptic curves in cryptography. In Proceedings of the Advances in Cryptology-CRYPTO’85, Santa Barbara, CA, USA, 18–22 August 1985; pp. 417–426. [Google Scholar]
- Koblitz, N. Elliptic curve cryptosystem. Math. Comput. 1987, 48, 203–209. [Google Scholar] [CrossRef]
- Ming, Y.; Zhang, X.; Shen, X. Efficient privacy-preserving multi-dimensional data aggregation scheme in smart grid. IEEE Access 2019, 7, 32907–32921. [Google Scholar] [CrossRef]
- He, D.; Zeadally, S.; Xu, B.; Huang, X. An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks. IEEE Trans. Inf. Forensics Secur. 2015, 10, 2681–2690. [Google Scholar] [CrossRef]
- Liu, J.K.; Yuen, T.H.; Au, M.H.; Susilo, W. Improvements on an authentication scheme for vehicular sensor networks. Expert Syst. Appl. 2014, 41, 2559–2564. [Google Scholar] [CrossRef]
- Boneh, D.; Goh, E.; Nissim, K. Evaluating 2-DNF formulas on ciphertexts. In Proceedings of the 2nd Theory of Cryptography Conference, Cambridge, MA, USA, 10–12 February 2005; pp. 325–341. [Google Scholar]
- Ming, Y.; Cheng, H. Efficient certificateless conditional privacy-preserving authentication scheme in VANETs. Mob. Inf. Syst. 2019, 2019, 1–19. [Google Scholar] [CrossRef]
- Shamus Software Ltd. Multi precision integer and rational arithmetic cryptographic library (MIRACL). Available online: http://www.certivox.com/miracl/ (accessed on 1 December 2019).
- Pointcheval, D.; Stern, J. Security proofs for signature schemes. In Proceedings of the Advances in Cryptology-EUROCRYPT’96, Saragossa, Spain, 12–16 May 1996; pp. 387–398. [Google Scholar]
- Ming, Y.; Shen, X. PCPA: A practical certificateless conditional privacy preserving authentication scheme for vehicular ad hoc networks. Sensors 2018, 18, 1573. [Google Scholar] [CrossRef] [PubMed]
- He, D.; Kumar, N.; Zeadally, S.; Vinel, A.; Yang, L.T. Efficient and privacy-preserving data aggregation scheme for smart grid against internal adversaries. IEEE Trans. Smart Grid 2017, 13, 1–9. [Google Scholar] [CrossRef]
Figure 3.
Computation costs in the data collection phase. (a) Computation costs of ${V}_{i};$ (b) Computation costs of $FN$ vs. number of vehicles; (c) Computation costs of $CC$ vs. number of $FN$.
Figure 4.
Computation costs in the data query phase. (a) Computation costs of ${V}_{q};$ (b) Computation costs of $FN$ vs. number of segments.
Symbol | Definition |
---|---|
$TA$ | Trusted authority |
$CC$ | Cloud center |
$\left(s,{P}_{pub}\right)$ | $TA$’s public key and private key |
$\left(x,{P}_{cc}\right)$ | $CC$’s public key and private key |
${V}_{i}$ | The i-th data collection vehicle |
$(I{D}_{i},PI{D}_{i})$ | ${V}_{i}$’s real identity and pseudo identity |
$\left({x}_{i},{R}_{i}\right)$ | ${V}_{i}$’s private key |
$F{N}_{j}$ | The j-th fog node |
$I{D}_{j}$ | $F{N}_{j}$’s identity |
$\left({x}_{F{N}_{j}},{R}_{F{N}_{j}}\right)$ | $F{N}_{j}$’s private key |
${V}_{q}$ | The data query vehicle |
$(I{D}_{q},PI{D}_{q})$ | ${V}_{q}$’s real identity and pseudo identity |
$\left({x}_{q},{R}_{q}\right)$ | ${V}_{q}$’s private key |
$({u}_{k},{v}_{k})$ | Identifier of the segment k |
d | Maximum value of sensory data |
m | The total number of segments |
n | The total number of fog nodes |
$\delta $ | The total number of vehicles |
$\left|d\right|$ | Maximum length of sensory data |
$\phi $ | The vehicles’ sharing key |
${d}_{i,k}^{j}$ | The sensory data captured by ${V}_{i}$ at segment k under $F{N}_{j}$ |
${e}_{i,k}^{j}$ | If ${d}_{i,k}^{j}>0$, then ${e}_{i,k}^{j}=1$; If ${d}_{i,k}^{j}=0$, then ${e}_{i,k}^{j}=0$. |
${H}_{i}$ | Eight one-way hash functions, ${H}_{i}:{\{0,1\}}^{*}\to {Z}_{q}^{*},i=1,2,\xb7\xb7\xb7,7,{H}_{8}:{\{0,1\}}^{*}\to {\{0,1\}}^{\left|d\right|-1}$. |
⊕ | The exclusive OR operation |
$p,q$ | Two large prime numbers |
${F}_{p}$ | The finite field over p |
$\mathbb{G}$ | An additive group with the order q on the elliptic curve E over ${F}_{p}$ |
P | A generator of $\mathbb{G}$ |
Table 2.
Security comparisons. Efficient privacy-preserving data sharing (EP${}^{2}$DS), √ represents “satisfy” and × denotes “does not satisfy”.
Security | S1 | S2 | S3 | S4 | S5 | S6 | S7 | S8 | S9 | S10 |
---|---|---|---|---|---|---|---|---|---|---|
Rabieh et al.’s scheme [17] | √ | √ | × | × | × | √ | √ | √ | √ | √ |
Sun et al.’s scheme [19] | √ | √ | × | √ | √ | √ | √ | √ | √ | √ |
Kong et al.’s scheme [23] | √ | √ | √ | × | × | √ | √ | × | √ | × |
Paulet et al.’s scheme [25] | × | √ | √ | × | × | √ | × | × | × | × |
Zhu et al.’s scheme [26] | √ | √ | √ | × | × | √ | √ | × | √ | × |
EP${}^{2}$DS | √ | √ | √ | √ | √ | √ | √ | √ | √ | √ |
Notations | Descriptions | Runtime |
---|---|---|
${T}_{sm}$ | Scalar multiplication operation in $\mathbb{G}$ | 0.3851 |
${T}_{log}$ | Solving the DL operation mod p | 0.6438 |
${T}_{e}$ | The exponentiation operation in ${\mathbb{G}}_{1}$ | 2.0289 |
${T}_{m}$ | The multiplication operation in ${\mathbb{G}}_{1}$ | 1.4293 |
${T}_{h}$ | Map to point hash function operation | 3.5819 |
${T}_{p}$ | Bilinear pairing operation in ${\mathbb{G}}_{1}$ | 10.3092 |
Scheme | Data Collection Phase | Data Query Phase | |||
---|---|---|---|---|---|
${\mathit{V}}_{\mathit{i}}$ | $\mathit{F}\mathit{N}$ | $\mathit{C}\mathit{C}$ | ${\mathit{V}}_{\mathit{a}}$ | $\mathit{F}\mathit{N}$ | |
[17] | $2{T}_{m}$+$2{T}_{e}$ | ${T}_{m}$+${T}_{e}$+$(w$+$1){T}_{p}$ | ${T}_{e}$+$(n$+$1){T}_{p}$ | − | − |
= 6.9164 ms | = 10.3092w+13.7674 ms | =10.3092n+2.0289 ms | |||
[19] | $2{T}_{m}$+${T}_{e}$+${T}_{h}$ | $(w$+$3){T}_{m}$+$4{T}_{p}$ | ${T}_{m}$+$n{T}_{e}$+$2{T}_{p}$ | − | − |
= 15.1967 ms | = 1.4293w+45.5247 ms | =2.0289n+11.7385 ms | |||
[23] | $4{T}_{m}$+$4{T}_{e}$ | $2w{T}_{m}$ | $6n{T}_{m}$+$4n{T}_{e}$ | $10{T}_{m}$+$7{T}_{e}$ | $9{T}_{m}$+$7{T}_{e}$ |
= 13.8328 ms | = 2.8586w ms | =16.6914n ms | =28.4953 ms | =27.0660 ms | |
[25] | − | − | − | $5{T}_{m}$+$9{T}_{e}$ | 6m${T}_{m}$+$(8$m+ )Te |
=25.4066 ms | =24.8070m+6.0867 ms | ||||
[26] | − | − | − | $2{T}_{p}$+$5{T}_{e}$ | $4{T}_{p}$+$4{T}_{m}$ |
=30.7629 ms | =46.9540 ms | ||||
EP${}^{2}$DS | $5{T}_{sm}$ | $(w$+$3){T}_{sm}$ | $(n$+$3){T}_{sm}$+$2{T}_{log}$ | $11{T}_{sm}$+$2{T}_{log}$ | $8{T}_{sm}$ |
=1.9255 ms | =0.3851w+1.1553 ms | =0.3851n+2.4429 ms | =5.5237 ms | =3.0808 ms |
Scheme | Data Collection Phase | Data Query Phase | |
---|---|---|---|
Data Report Size | Query Report Size | Response Report Size | |
Rabieh et al.’s scheme [17] | 260 bytes | − | − |
Sun et al.’s scheme [19] | 516 bytes | − | − |
Kong et al.’s scheme [23] | 1152 bytes | 1152 bytes | 1664 bytes |
Paulet et al.’s scheme [25] | − | 256 bytes | 256m+128 bytes |
Zhu et al.’s scheme [26] | − | 324 bytes | 320 bytes |
EP${}^{2}$DS | 172 bytes | 172 bytes | 148 bytes |
© 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).