Skip to main content
Sensors (Basel, Switzerland) logoLink to Sensors (Basel, Switzerland)
. 2020 Jan 16;20(2):514. doi: 10.3390/s20020514

Efficient Privacy-Preserving Data Sharing for Fog-Assisted Vehicular Sensor Networks

Yang Ming 1,*, Xiaopeng Yu 1
PMCID: PMC7014476  PMID: 31963336

Abstract

Vehicular sensor networks (VSNs) have emerged as a paradigm for improving traffic safety in urban cities. However, there are still several issues with VSNs. Vehicles equipped with sensing devices usually upload large amounts of data reports to a remote cloud center for processing and analyzing, causing heavy computation and communication costs. Additionally, to choose an optimal route, it is required for vehicles to query the remote cloud center to obtain road conditions of the potential moving route, leading to an increased communication delay and leakage of location privacy. To solve these problems, this paper proposes an efficient privacy-preserving data sharing (EP2DS) scheme for fog-assisted vehicular sensor networks. Specifically, the proposed scheme utilizes fog computing to provide local data sharing with low latency; furthermore, it exploits a super-increasing sequence to format the sensing data of different road segments into one report, thus saving on the resources of communication and computation. In addition, using the modified oblivious transfer technology, the proposed scheme can query the road conditions of the potential moving route without disclosing the query location. Finally, an analysis of security suggests that the proposed scheme can satisfy all the requirements for security and privacy, with the evaluation results indicating that the proposed scheme leads to low costs in computation and communication.

Keywords: vehicular sensor networks, fog computing, data sharing, privacy preserving

1. Introduction

Vehicular sensor networks (VSNs) [1,2,3], that is, a combination of wireless communication given by vehicular ad hoc networks [4] and the sensing devices installed in the vehicle, can improve traffic conditions in urban cities, and have recently received considerable attention. In VSNs, the vehicles equipped with sensing devices can record a myriad of data reports on the road conditions and environment situations, and these data reports need be uploaded to the remote cloud center [5,6] for processing and analyzing. In addition, vehicles often need to query the road conditions of potential moving routes at remote cloud centers. However, uploading a large amount of data reports to the cloud data center consumes heavy bandwidth, and leads to an increased communication delay.

Recently, fog computing [7] has been proposed to extend the capabilities of cloud computing [8] near vehicles [9], which can locally handle the data reports uploaded by vehicles. These new properties will bring about benefits such as location awareness and low latency. Fog computing has already been used to provide low latency services in vehicular sensor networks, such as navigation services [10] and surface condition monitoring [11].

A typical architecture of fog-assisted vehicular sensor networks (F-VSNs) [12,13,14] contains the trusted authority, cloud center, fog nodes, and vehicles. The trusted authority is responsible for generating system parameters, and the registration of all entities (cloud center, fog nodes and vehicles). The cloud center provides centralized control with strong computing power and large storage capacity from a remote location. Fog nodes have available computing, storage, and communication resources [15], which is deployed at the edge of networks with physical proximity to vehicles, playing as the bridge across the vehicles and the cloud center. Vehicles are installed with a variety of smart sensors that can sense road conditions and environmental parameters. F-VSNs allows some computations and processing to be performed at the fog nodes, greatly reducing the consumption of communication time and energy.

Although F-VSNs brings a great deal of benefits and conveniences, there still exist several issues in terms of data collection and data query. Specifically, vehicles generate a large amount of sensory data reflecting the road conditions and environment situations, and need to upload the sensory data to cloud center for further processing and analyzing, which brings heavy computation and communication costs. To solve this problem, data aggregation technology, which is designed to aggregate multiple data into one report, has recently received more and more attention.

However, using the existing data aggregation schemes [16,17,18,19,20,21,22] cannot determine the number of data reports produced in each road segment, and cannot compute the average sensory data in each road segment. To solve the problem, the scheme [23] exploits the Chinese remainder theorem and Paillier cryptosystem to calculate the average sensory data in each segments; however, it brings heavy computation and communication costs. In addition, to choose an optimal route, vehicles often query about the road conditions of the potential moving routes, but the query reports uploaded by vehicles are tightly associated with the query location, and thus the query location could be disclosed.

The oblivious transfer [24,25], homomorphic encryption technology [26,27], and proxy re-encryption technique [23] have been exploited to hide the query location. However, it is worth noting that the computation and communication costs by the schemes [24,25] is directly proportional to the data dimension, the schemes [26,27] do not support the scenario with high vehicle density, and the scheme [23] needs heavy computation and communication costs.

1.1. Our Contributions

To solve the aforementioned problems, this paper proposes an efficient privacy-preserving data sharing (EP2DS) scheme for fog-assisted vehicular sensor networks. The main contributions of this paper are as follows:

  • First, the proposed EP2DS scheme exploits the super-increasing sequence [20] for achieving multi-dimensional data aggregation, while calculating the average sensory data in each road segment, greatly saving on the resources of communication and computation.

  • Secondly, by utilizing the modified oblivious transfer [28], the proposed EP2DS scheme is able to query about the road conditions of the potential moving routes without disclosing the query location.

  • Thirdly, an analysis of security indicates that the proposed EP2DS scheme is proven to be secure under elliptic curve discrete logarithm (ECDL) assumption in the random oracle model and satisfies all the requirements for security and privacy.

  • Finally, the performances of computation and communication in costs are evaluated through quantitative calculations, with the results that the proposed EP2DS scheme is of more efficiency than others.

1.2. Organization

This paper is organized as follows. The related work is surveyed in Section 2. We introduce the background in Section 3. The concrete scheme is proposed in Section 4. Section 5 provides an analysis of the security. In Section 6, the performance evaluation is performed. Section 7 concludes the paper.

2. Related Works

Some works closely related to this paper are briefly reviewed below.

In F-VSNs, massive sensory data is produced in each data dimension, and needs to be uploaded for further processing and analysis; data aggregation schemes [16,17,18,19,20,21,22,23] have received considerable attention recently, and are roughly classified into two categories: single-dimensional data aggregation [16,17,18,19] and multi-dimensional data aggregation [20,21,22,23]. Zhuo et al. [16] introduced a data aggregation scheme, which protects each involved entity’s identity privacy, and allows the requester to examine the correctness of the obtained results. Rabieh et al. [17] employed the data aggregation technique to find out the routes for the vehicle to be in each road segment; however, it only can calculate the data aggregation result, and cannot recover the content in each data dimension.

Xu et al. [18] constructed a privacy-preserving data aggregation scheme that can classify messages based on where and when the sensor data is collected, and aggregate the data collected in the same area and period. Sun et al. [19] designed a data aggregation mechanism considering data integrity and access control. However, the schemes [16,17,18,19] are unable to determine the number of the data reports produced in each data dimension, and further fail to calculate the average sensory data in each data dimension. Lin et al. [20] integrated the perturbation technique and super-increasing sequence to combine multiple aggregated data into one data report to improve the energy efficiency.

Lu et al. [21] employed the homomorphic Paillier encryption, one-way hash chain technique and Chinese remainder theorem to achieve lightweight multi-dimensional data aggregation. On the basis of the super-increasing sequence and modified homomorphic Paillier encryption, Wang et al. [22] introduced a multi-subtasks aggregation scheme, in which each aggregated datum is mapped to a specific area and period. Kong et al. [23] designed a privacy-preserving multi-dimensional data sharing scheme using the Chinese remainder theorem and modified Paillier encryption, with counting the number of the sensory data collected at each segments and calculating the average sensory data in each segment.

Although schemes [20,21,22,23] are able to calculate the average sensory data in each data dimension, they bring heavy computation costs and communication overhead. In addition, the query vehicle usually wants to know the road conditions of the potential moving route, which could lead to that the query location being disclosed in the data query process, the schemes in [23,24,25,26,27] have been proposed to solve this problem.

Ghinita et al. [24] and Paulet et al. [25] employed the oblivious transfer to hide query location in the data query process, but the communication cost of schemes [24,25] is directly proportional to the data dimension. Zhu et al. [25,26] utilized an improved homomorphic encryption technology to protect the query location in location-based services, but it do not support scenarios with a high vehicle density. Kong et al. [23] utilized the proxy re-encryption technique to hide the query location, but it does not support queries of whole network sensory data during the data query phase.

To sum up, from the review above, the available data aggregation schemes [16,17,18,19,20,21,22,23] either fail to determine the number of data reports produced in each data dimension or bring heavy computation and communication costs. In addition, the communication costs of the existing schemes [23,24,25,26,27] are either directly proportional to the data dimension or bring heavy communication costs in the data query process.

To address the issues above, we propose an EP2DS scheme for fog-assisted vehicular sensor networks, which can not only reduce the computation and communication costs, but also calculate the average sensory data in each road segment. Additionally, the proposed EP2DS scheme can query the road conditions of potential moving routes without disclosing the query location.

3. Background

3.1. System Model

The system model is presented in Figure 1, which is composed of five entities: trusted authority (TA), cloud center (CC), the data collection vehicle Vi(i=1,2,···,δ), fog node FNj(j=1,2,···,n), and the data query vehicle Vq. The road area is divided into m segments, and each segment k(k=1,2,···,m) is represented by a unique two-dimensional identifier (uk,vk), approximating of the location coordinates [23]. As to readability, the definitions of notations employed in this study are illustrated in Table 1.

Figure 1.

Figure 1

System model.

Table 1.

Notations

Symbol Definition
TA Trusted authority
CC Cloud center
(s,Ppub) TA’s public key and private key
(x,Pcc) CC’s public key and private key
Vi The i-th data collection vehicle
(IDi,PIDi) Vi’s real identity and pseudo identity
(xi,Ri) Vi’s private key
FNj The j-th fog node
IDj FNj’s identity
(xFNj,RFNj) FNj’s private key
Vq The data query vehicle
(IDq,PIDq) Vq’s real identity and pseudo identity
(xq,Rq) Vq’s private key
(uk,vk) Identifier of the segment k
d Maximum value of sensory data
m The total number of segments
n The total number of fog nodes
δ The total number of vehicles
|d| Maximum length of sensory data
φ The vehicles’ sharing key
di,kj The sensory data captured by Vi at segment k under FNj
ei,kj If di,kj>0, then ei,kj=1; If di,kj=0, then ei,kj=0.
Hi Eight one-way hash functions, Hi:{0,1}*Zq*,i=1,2,···,7,H8:{0,1}*{0,1}|d|-1.
The exclusive OR operation
p,q Two large prime numbers
Fp The finite field over p
G An additive group with the order q on the elliptic curve E over Fp
P A generator of G

The wireless connections between the vehicles and the fog nodes are brought about by the Institute of Electrical and Electronics Engineers (IEEE) 802.11p standard [29]. The connections between the fog nodes and CC are achieved via either the wired links or other links with low transmission delay and high bandwidth.

TA: A fully trusted entity, which is responsible for the management of the security parameters for the system and the registration of the cloud center, fog nodes, and vehicles, and periodically updates the system information.

CC: An honest-but-curious entity, which is responsible for providing centralized control with powerful storage and computing capabilities from a remote location. In addition, it can perform computational analytics from data reports uploaded by the fog nodes, and distribute data to all fog nodes for further sharing with vehicles [30].

Vi: It is equipped with smart sensors, periodically formatting a data report from the collected sensory data and uploading the data report towards the fog node.

FNj: This consists of a road side unit and an edge server [13], and aggregates the data reports uploaded by the data collection vehicles under its communication range and transmits the aggregated data report towards CC. Meanwhile, each fog node manages one or more segments, and can assist in sharing the sensory data to the query vehicle [31].

Vq: To choose an optimal route, Vq usually sends a query report to the fog node, then the fog node returns a response report to Vq.

In our system model, we assume the fog node is honest-but-curious, i.e., it is able to correctly execute the operations defined in the protocol; however, it also can try to violate the privacy of the vehicle through analyzing the vehicle’s data report and query report; meanwhile, we assume neither the fog nodes nor the query vehicles can collude with each other in the proposed EP2DS scheme. Additionally, we assume there exists an attacker, which can eavesdrop on the data transmission and launch attacks.

3.2. Security Requirement

The following security requirements should be achieved.

Authentication and data integrity: The proposed EP2DS scheme should guarantee that any reports are not modified during the transmission process, and can detect any modification of the reports; moreover, any entity in F-VSNs should be able to be authenticated to ensure the reliability of the data source.

Confidentiality: To ensure the privacy of sensory data, the proposed EP2DS scheme should provide confidentiality, i.e., no attacker can obtain the sensory data from data report.

Location privacy preservation: To protect vehicle’s query location, it is important not to disclose the query location to fog nodes that provide location-based services in the data query process.

Identity privacy preservation: Apart from the TA, any entities should not trace or recognize the identity of the data collection vehicle by analyzing the received data reports.

Traceability: TA should be able to reveal the identity of the malicious vehicle uploading the bogus data report.

Unlinkability: Apart from the TA, neither fog nodes nor the malicious vehicles can determine whether the two data reports are from the same vehicle.

Resistance to attacks: The proposed EP2DS scheme should be able to withstand various popular attacks such as the modification attack, replay attack, impersonation attack, and man-in-the-middle attack.

3.3. Elliptic Curve

Let Fp be a finite field with a prime number p. The elliptic curve E over Fp defined as the set of all points (x,y) meeting y2=x3+ax+bmodp, where 4a3+27b20 and a,bFp [32,33].

An infinity point O, and other points on E, form an additive cyclic group G with the order q and generator P. Let PG and kZq*, the scalar multiplication over G is described as kP=P+P+···+P (k times).

3.4. Security Assumption

ECDL problem [34,35]: Given two elements P,QG, the ECDL problem is to find an integer xZq* such that Q=xP.

ECDL assumption [34,35]: It is hard for any probabilistic polynomial-time algorithm to solve ECDL problem with non-negligible probability.

4. The Proposed Scheme

The proposed EP2DS scheme includes system initialization, registration, data collection, and data query phases. Note that the data flows in the data collection and data query phases are shown in Figure 2.

Figure 2.

Figure 2

Data flows in the data collection and data query phases.

4.1. System Initialization

TA produces all system parameters through executing the following steps.

  • (1)

    TA randomly chooses a large prime number p, and selects a non-singular elliptic curve E defined by y2=x3+ax+bmodp, where a,bFp.

  • (2)

    TA picks a group G of E with the prime order q and a generator P.

  • (3)

    TA randomly chooses sZq* as its master key and computes its public key Ppub=sP.

  • (4)

    TA chooses eight one-way hash functions Hi:{0,1}*Zq*, i=1,2,···,7, H8:{0,1}*{0,1}|d|-1.

  • (5)

    TA chooses a super-increasing sequence a=(a1,a2,···,am), such that k=1mak3nδd<q, k=1i-1ak3nδd<ai (i=1,2,···,m), where a1,a2,···,am are large prime numbers and d is the maximum value of the data. Then, TA assigns prime number ak towards segment k.

  • (6)

    TA publishes the system parameters {p,q,G,P,Ppub, H1,H2,H3,H4,H5,H6,H7,H8,a}.

4.2. Registration

All vehicles, fog nodes, and cloud centers register with TA.

4.2.1. Vi Registers with TA

  • (1)

    Vi sends the identity IDi to the TA in secure channel.

  • (2)
    After confirming the identity IDi, TA randomly chooses wiZq* and computes
    PIDi,1=wiP,PIDi,2=IDiH1(wiPpub,ti),
    and sets PIDi={PIDi,1,PIDi,2,ti}, where ti represents the valid period of PIDi.
  • (3)
    TA randomly chooses riZq* and computes
    Ri=riP,xi=ri+sH2(PIDi,Ri,Ppub).
  • (4)

    TA randomly chooses a sharing key φ{0,1}|d|-1, and transmits the pseudo identity PIDi, the private key (xi,Ri) and the sharing key φ to Vi in a secure channel.

4.2.2. FNj Registers with TA

  • (1)

    FNj sends the identity IDFNj to the TA in a secure channel.

  • (2)
    TA randomly chooses rFNjZq* and computes
    RFNj=rFNjP,xFNj=rFNj+sH3(IDFNj,RFNj,Ppub).
  • (3)

    TA sends the private key (xFNj,RFNj) to FNj in a secure channel.

4.2.3. CC Registers with TA

  • (1)

    TA randomly chooses xZq* and computes Pcc=xP.

  • (2)

    TA sends the private key x and public key Pcc to CC in a secure channel.

4.3. Data Collection

The data collection phase includes three processes: data gathering, data aggregation, and data reading.

4.3.1. Data Gathering

Vi gathers sensory data in a short period of time, e.g., every five minutes: (i) if there is a sensory data obtained at road segment k under FNj, i.e., di,kj>0, then ei,kj=1; (ii) if there is no sensory data obtained at road segment k under FNj, i.e., di,kj=0, then ei,kj=0.

Vi produces a data report through executing the following steps:

  • (1)

    Vi formats (di,1j,di,2j,···,di,mj) and (ei,1j,ei,2j,···,ei,mj) into dij=k=1mak(di,kj+φ) and eij=k=1mak(ei,kj+φ).

  • (2)
    Vi randomly selects rij, sijZq* and computes
    Aij=rijP,Bij=dijP+rijPcc,Cij=sijP,Dij=eijP+sijPcc.
  • (3)
    Vi randomly picks lijZq* and calculates
    Lij=lijP,σij=xi+lijH4(PIDi,Ri,Aij,Bij,Cij,Dij,Lij,Tij),
    where Tij is current timestamp.
  • (4)

    Vi transmits the data report DRij={PIDi,Ri,Aij,Bij, Cij,Dij,Lij,σij,Tij} towards FNj, as shown in Figure 2 (①).

4.3.2. Data Aggregation

Supposing w vehicles {V1,V2,···,Vw} upload the data reports {DR1j,DR2j,···,DRwj} to FNj, where wδ. FNj can aggregate data reports through executing the following steps:

  • (1)
    FNj checks whether ti is valid and Tij is fresh for each i=1,2,···,w. If ti is not valid or Tij is not fresh, DRij will be rejected. Otherwise, FNj performs the batch verification using small exponent test [36]. FNj randomly selects a set of small numbers θ1j,θ2j,···,θwj[1,2w] and checks whether the following equation holds
    i=1wθijσijP=i=1wθijRi+i=1wθijH2(PIDi,Ri,Ppub)Ppub+i=1wθijH4(PIDi,Ri,Aij,Bij,Cij,Dij,Lij,Tij)Lij.
    If it does hold, FNj computes
    Aj=i=1wAij,Bj=i=1wBij,Cj=i=1wCij,Dj=i=1wDij.
  • (2)
    FNj randomly picks ljZq* and calculates
    Lj=ljP,σj=xFNj+ljH5(IDFNj,RFNj,Aj,Bj,Cj,Dj,Lj,Tj),
    where Tj is current timestamp.
  • (3)

    FNj transmits the aggregated data report ADRj={IDFNj,RFNj,Aj,Bj,Cj,Dj,Lj,σj,Tj} towards CC, as shown in Figure 2 (②).

4.3.3. Data Reading

After receiving {ADR1,ADR2,···,ADRn} from {FN1, FN2,···,FNn} respectively, CC executes the following steps:

  • (1)
    CC checks whether Tj is fresh for each j=1,2,···,n. If Tj is not fresh, ADRj will be rejected. Otherwise, CC randomly chooses a set of small numbers θ1,θ2,···,θn[1,2n] and performs the batch verification using small exponent test [36]. CC verifies whether the following equation holds
    j=1nθjσjP=j=1nθjRFNj+j=1nθjH3(IDFNj,RFNj,Ppub)Ppub+j=1nθjH5(IDFNj,RFNj,Aj,Bj,Cj,Dj,Lj,Tj)Lj.
    If it does hold, CC calculates
    Φ=j=1nBj-x·j=1nAj,Δ=j=1nDj-x·j=1nCj.
    By solving the discrete log of Φ and Δ with the base P, utilizing the Pollard’s lambda algorithm [37], CC can obtain
    μ=j=1ni=1w(φ+dij),ν=j=1ni=1w(φ+eij).
  • (2)

    CC distributes μ and ν to all fog nodes {FN1,FN2,···,FNn} for further sharing with vehicles.

4.4. Data Query

The data query vehicle Vq intends to query the data captured at segment c with the identifier (uc,vc) at the FNj. The phase includes three processes: query generation, data response, and response reading.

4.4.1. Query Generation

  • (1)
    Vq selects two random numbers rqj,sqjZq* and calculates
    Eqj=rqjP,Fqj=ucP+xqEqj,Gqj=sqjP,Hqj=vcP+xqGqj.
  • (2)
    Vq randomly picks lqjZq* and calculates
    Lqj=lqjP,σqj=xq+lqjH6(PIDq,Rq,Eqj,Fqj,Gqj,Hqj,Lqj,Tqj),
    where Tqj is the current timestamp.
  • (3)

    Vq transmits the query report QRqj={PIDq,Rq,Eqj,Fqj, Gqj,Hqj,Lqj,σqj,Tqj} towards FNj, as shown in Figure 2 (③).

4.4.2. Data Response

  • (1)
    After receiving QRqj, FNj checks whether tq is valid and Tqj is fresh. If tq is not valid or Tqj is not fresh, QRqj will be rejected. Otherwise, FNj verifies whether the following equation holds
    σqjP=Rq+H2(PIDq,Rq,Ppub)Ppub+H6(PIDq,Rq,Eqj,Fqj,Gqj,Hqj,Lqj,Tqj)Lqj.
    If it does hold, FNj selects two random numbers tqj,φqjZq* and calculates
    Jqj=tqjEqj+φqjGqj,Kqj=tqjFqj+φqjHqj,
    Mqj=μ+k=1makH8(tqjuk+φqjvk),Nqj=ν+k=1makH8(tqjuk+φqjvk).
  • (2)
    FNj randomly picks l^qjZq* and calculates
    L^qj=l^qjP,σ^qj=xFNj+l^qjH7(IDFNj,RFNj,Jqj,Kqj,Mqj,Nqj,L^qj,T^qj),
    where T^qj is the current timestamp.
  • (3)

    FNj transmits the response report RRqj={IDFNj, RFNj,Jqj,Kqj,Mqj,Nqj,L^qj,σ^qj,T^qj} towards Vq, as shown in Figure 2 (④).

4.4.3. Response Reading

  • (1)
    After receiving RRqj, Vq checks whether T^qj is fresh. If T^qj is not fresh, RRqj will be rejected. Otherwise, Vq verifies whether the following equation holds
    σ^qjP=RFNj+H3(IDFNj,RFNj,Ppub)Ppub+H7(IDFNj,RFNj,Jqj,Kqj,Mqj,Nqj,L^qj,T^qj)L^qj.
    If it does hold, Vq calculates
    Λ=Kqj-xq·Jqj.

    By solving the discrete log of Λ with the base P, utilizing the Pollard’s lambda algorithm [37], Vq can obtain βc=H8(tqjuc+φqjvc).

  • (2)

    By calling the Algorithm 1, Vq can achieve the average sensing data d¯c captured at segment c.

Algoruthm 1 Recovery d¯c captured at segment c
Input: (a1,a2,···,am), βc, φ, δ, Mqj and Nqj
Output:  d¯c
begin:
      set X1=Mqj, X2=Nqj;
      for k=m to c do
            dk=X1-X1modakak, ek=X2-X2modakak;
            X1=X1modak, X2=X2modak;
      return d¯c=dc-βc-δφec-βc-δφ.
end

5. Security

This section depicts the security proof of the proposed EP2DS scheme in the random oracle model. Additionally, a security evaluation and comparison on the proposed EP2DS scheme and schemes of [17,19,23,25,26] is conducted.

5.1. Security Model

The security model of the proposed EP2DS scheme can be found in the Appendix A.

5.2. Security Proof

The security proof of the proposed EP2DS scheme can be found in the Appendix B.

5.3. Analysis and Comparison of Security Requirement

Authentication and data integrity: Based on Theorem 2, no polynomial-time attacker is able to fake a valid data report owing to the ECDL assumption. Therefore, authentication and data integrity can be ensured in the proposed EP2DS scheme.

Confidentiality: Based on Theorem 1, without the cloud center’s private key x, any attacker is unable to compute the sensing data μ=j=1ni=1w(φ+dij) and ν=j=1ni=1w(φ+eij), and thus confidentiality can be ensured in the proposed EP2DS scheme.

Location privacy preservation: Based on Theorem 1, without the the data query vehicle’s private key xq, no attacker can obtain the query location (uc,vc) from {Eqj=rqjP, Fqj=ucP+xqEqj, Gqj=sqjP, Hqj=vcP+xqGqj}, and hence the location privacy can be guaranteed in the proposed EP2DS scheme.

Identity privacy preservation: On the basis of the proposed EP2DS scheme, the identity IDi of Vi is only contained in the pseudo identity PIDi={PIDi,1,PIDi,2,ti}, where PIDi,1=wiP, PIDi,2=IDiH(wiPpub,ti) and Ppub=sP. To extract the identity IDi of Vi, the attacker has to compute IDi=PIDi,2H(s·PIDi,2,ti). However, it is impossible to solve wi·s·P for any attacker to obtain IDi without knowing wi and s. Therefore, the identity privacy is guaranteed in the proposed EP2DS scheme.

Traceability: In accordance with the proposed EP2DS scheme, TA can adopt its own master key s to calculate IDi=PIDi,2H(s·PIDi,2,ti), and find out the identity IDi of Vi from the pseudo identity PIDi involved in the data report, with the proposed EP2DS scheme satisfying the traceability.

Unlinkability: On the basis of the proposed EP2DS scheme, the data reports generated by any vehicle are random, and any attacker cannot link the two data reports sent by the same vehicle, with the proposed EP2DS scheme realizing the traceability.

Resistance to attacks: The proposed EP2DS scheme is able to withstand the networks attacks in the following:

  • Modification attack: Based on Theorem 2, any polynomial attacker is unable to forge a valid data report with modification on data reports found.

  • Replay attack: On the basis of the proposed EP2DS scheme, the timestamp is contained in the data report. By examining freshness of the timestamp, the verifier is able to bear any replay attacks.

  • Impersonation attack: From Theorem 2, no attacker can fabricate a legal data report without vehicle’s private key.

  • Man-in-the-middle attack: The analysis of the modification attack shows that any modification of the data reports on transmission is able to be found.

Security comparisons of schemes [17,19,23,25,26] and the proposed EP2DS scheme are displayed in Table 2. S1, S2, S3, S4, S5, S6, S7, S8, S9, and S10 are used to represent authentication and data integrity, confidentiality, location privacy preservation, identity privacy preservation, traceability, unlinkability, the modification attack, the replay attack, the impersonation attack, and the man-in-the-middle attack, respectively.

Table 2.

Security comparisons. Efficient privacy-preserving data sharing (EP2DS), represents “satisfy” and × denotes “does not satisfy”.

Security S1 S2 S3 S4 S5 S6 S7 S8 S9 S10
Rabieh et al.’s scheme [17] × × ×
Sun et al.’s scheme [19] ×
Kong et al.’s scheme [23] × × × ×
Paulet et al.’s scheme [25] × × × × × × ×
Zhu et al.’s scheme [26] × × × ×
EP2DS

In accordance with Table 2, Rabieh et al.’s scheme [17] is able to provide location privacy preservation, identity privacy preservation, and traceability. Sun et al.’s scheme [19] cannot achieve location privacy preservation. Kong et al.’s scheme [23] cannot achieve identity privacy preservation, traceability, the replay attack, and the man-in-the-middle attack. Paulet et al.’s scheme [25] cannot achieve authentication and data integrity, identity privacy preservation, traceability, the modification attack, the replay attack, the impersonation attack, and the man-in-the-middle attack. Zhu et al.’s scheme [26] cannot achieve identity privacy preservation and traceability, the replay attack, and the man-in-the-middle attack. In contrast, all security requirements are able to be satisfied in the proposed EP2DS scheme.

6. Performance Evaluation

We analyze the computation and communication costs of these schemes [17,19,23,25,26] and the proposed EP2DS scheme, and evaluate their performance.

To realize a fair comparison, we compare these schemes [17,19,23,25,26] with the proposed EP2DS scheme under the 80-bit security level [38]. Regarding the pairing-based schemes [17,19,23,25,26], we choose a bilinear pairing e:G1×G1G2, where G1 is an additive group defined by the generator P with order q on the super singular elliptic curve E:y2=x3+xmodp with the embedding degree 2, q is 160-bit Solinas prime number and p is 512-bit primer number meeting q·12·r=p+1. With regard to the proposed EP2DS scheme, we pick a group G, where G is produced by the generator P with the order q on an elliptic curve E:y2=x3+ax+bmodp with a prime order q, where q, p are 160 bits prime number and a=-3, b is 160-bits random prime number.

The running time of the operations is able to be derived by making use of the MIRACL Crypto SDK [39]. We run the experiment on a 64-bit Windows 10 operating system with 2.53 GHz, an i7 CPU and 4 GB memory. Table 3 lists the average running time for these operations.

Table 3.

Runtime of cryptographic operation (millisecond).

Notations Descriptions Runtime
Tsm Scalar multiplication operation in G 0.3851
Tlog Solving the DL operation mod p 0.6438
Te The exponentiation operation in G1 2.0289
Tm The multiplication operation in G1 1.4293
Th Map to point hash function operation 3.5819
Tp Bilinear pairing operation in G1 10.3092

6.1. Computation Costs

The computation costs of the proposed EP2DS scheme and these schemes [17,19,23,25,26] are displayed in Table 4.

Table 4.

Comparison of computation costs.

Scheme Data Collection Phase Data Query Phase
Vi FN CC Va FN
[17] 2Tm+2Te Tm+Te+(w+1)Tp Te+(n+1)Tp
= 6.9164 ms = 10.3092w+13.7674 ms =10.3092n+2.0289 ms
[19] 2Tm+Te+Th (w+3)Tm+4Tp Tm+nTe+2Tp
= 15.1967 ms = 1.4293w+45.5247 ms =2.0289n+11.7385 ms
[23] 4Tm+4Te 2wTm 6nTm+4nTe 10Tm+7Te 9Tm+7Te
= 13.8328 ms = 2.8586w ms =16.6914n ms =28.4953 ms =27.0660 ms
[25] 5Tm+9Te 6mTm+(8m+ )Te
=25.4066 ms =24.8070m+6.0867 ms
[26] 2Tp+5Te 4Tp+4Tm
=30.7629 ms =46.9540 ms
EP2DS 5Tsm (w+3)Tsm (n+3)Tsm+2Tlog 11Tsm+2Tlog 8Tsm
=1.9255 ms =0.3851w+1.1553 ms =0.3851n+2.4429 ms =5.5237 ms =3.0808 ms

In the data collection phase, for Rabieh et al.’s scheme [17], Vi requires running two multiplication operations in G1 and two exponentiation operations in G1, thus the total time is 2Tm+2Te = 6.9164 ms. FN requires executing one multiplication operation in G1, one exponentiation operation in G1, and w+1 bilinear pairing operations in G1, and thus the total time is Tm+Te+(w+1)Tp = 10.3092w+13.7674 ms. CC requires executing one exponentiation operation in G1 and n+1 bilinear pairing operations in G1, and hence the total time is Te+(n+1)Tp=10.3092n+2.0289 ms.

For Sun et al.’s scheme [19], Vi requires running two multiplication operations in G1 and one exponentiation operation in G1 and one map to point hash function operation, thus the total time is 2Tm+Te+Th = 15.1967 ms. FN requires executing w+3 multiplication operations in G1 and four bilinear pairing operations in G1, so the total time is (w+3)Tm+4Tp = 1.4293w +45.5247 ms. CC requires executing one multiplication operation in G1, n exponentiation operations in G1 and two multiplication operations in G1, and hence the total time is Tm+nTe+2Tp=2.0289n+11.7385 ms.

For Kong et al.’s scheme [23], Vi requires running four multiplication operations in Zn2 and four exponentiation operations in Zn2, thus the total time is 4Tm+4Te = 13.8328 ms. FN requires executing 2w multiplication operations in G1, so the total time is 2wTm = 2.8586w ms. CC requires executing 6n multiplication operations in G1 and 4n exponentiation operations in G1, and hence the total time is 6nTm+4nTe=16.6914n ms.

For the proposed EP2DS scheme, Vi needs to run five scalar multiplication operations in G, and therefore the total time is 5Tsm = 1.9255 ms. FN requires executing w+3 scalar multiplication operations in G; accordingly, the total time is (w+3)Tsm = 0.3851w+1.1553 ms. CC requires executing n+3 scalar multiplication operations in G and two solving the DL operations; therefore, the total time is (n+3)Tsm+2Tlog = 0.3851n+2.4429 ms.

In the data query phase, for Kong et al.’s scheme [23], Vq requires running ten multiplication operations in G1 and seven exponentiation operations in G1, so the total time is 10Tm+7Te = 28.4953 ms. FN needs to run nine multiplication operations in G1 and seven exponentiation operations in G1, the total time is thus 9Tm+7Te = 27.0660 ms. For Paulet et al.’s scheme [25], Vq requires running five multiplication operations in G1 and nine exponentiation operations in G1, the total time is thus 5Tm+9Te = 25.4066 ms. FN needs to run 6m multiplication operations in G1 and 8m+3 exponentiation operations in G1, the total time is thus 6mTm+(8m+3)Te = 24.8070m +6.0867 ms.

For Zhu et al.’s scheme [26], Vq requires running five exponentiation operations in G1 and two bilinear pairing operation in G1, the total time is thus 5Te+2Tp = 30.7629 ms. FN needs to run four multiplication operations in G1 and four bilinear pairing operation in G1, the total time is thus 4Tm+4Tp = 46.9540 ms.

For the proposed EP2DS scheme, Vq needs to run eleven scalar multiplication operations in G and two solving the DL operations, and hence the total time is 11Tsm+2Tlog = 5.5237 ms. FN needs to run eight scalar multiplication operations in G, thus the total time is 8Tsm = 3.0808 ms.

Figure 3 clearly demonstrates the comparison result of computation costs in the data collection phase. Figure 3a shows that the computation costs of Vi is 1.9255 ms, which decreases by 72.2%, 87.3%, and 86.1% compared with that by Rabieh et al.’s scheme [17], Sun et al.’s scheme [19], and Kong et al.’s scheme [23], respectively. As shown in Figure 3b, the computation costs of FN increase linearly with the number of vehicles, with the proposed EP2DS scheme having a lower slope compared with Rabieh et al.’s scheme [17], Sun et al.’s scheme [19], and Kong et al.’s scheme [23]. From Figure 3c, we can see that the computation costs of CC grows linearly with the number of fog nodes, and the proposed EP2DS scheme has a lower slope compared with Rabieh et al.’s scheme [17], Sun et al.’s scheme [19], and Kong et al.’s scheme [23].

Figure 3.

Figure 3

Computation costs in the data collection phase. (a) Computation costs of Vi; (b) Computation costs of FN vs. number of vehicles; (c) Computation costs of CC vs. number of FN.

Figure 4 clearly indicates the comparison result of the computation costs in the data query phase. From Figure 4a, we can know that the computation costs of Vq in the proposed EP2DS scheme are 5.5237 ms, which decreases by 80.6%, 78.3%, and 82.0% compared with that by Kong et al.’s scheme [23], Paulet et al.’s scheme [25], and Zhu et al.’s scheme [26], respectively. Figure 4b shows the correlation between the computation cost of FN and the number of segments m, we can see that the computation cost of FN in the EP2DS scheme is the smallest compared with Kong et al.’s scheme [23], Paulet et al.’s scheme [25], and Zhu et al.’s scheme [26]. The computation costs of FN in the proposed EP2DS scheme are 3.0808 ms, which decreases by 88.6% and 93.4% compared with Kong et al.’s scheme [23] and Zhu et al.’s scheme [26]. Furthermore, unlike Paulet et al.’s scheme [25], the computation cost of FN in the EP2DS scheme does not increase with the number of segments m.

Figure 4.

Figure 4

Computation costs in the data query phase. (a) Computation costs of Vq; (b) Computation costs of FN vs. number of segments.

6.2. Communication Costs

The communication costs of the proposed EP2DS scheme and these schemes [17,19,23,25,26], are evaluated in this subsection. We mainly consider the data report size, query report size, and response report size. As mentioned above, the lengths of the elements in G, Zq*,Zn, and Zn2 are 160 bits (20 bytes), 160 bits (20 bytes), 1024 bits (128 bytes), and 2048 bits (256 bytes), respectively, assuming that the length of timestamp and identity are 32 bits (4 bytes). The comparison results of communication costs are illustrated in Table 5.

Table 5.

Comparison of the communication costs.

Scheme Data Collection Phase Data Query Phase
Data Report Size Query Report Size Response Report Size
Rabieh et al.’s scheme [17] 260 bytes
Sun et al.’s scheme [19] 516 bytes
Kong et al.’s scheme [23] 1152 bytes 1152 bytes 1664 bytes
Paulet et al.’s scheme [25] 256 bytes 256m+128 bytes
Zhu et al.’s scheme [26] 324 bytes 320 bytes
EP2DS 172 bytes 172 bytes 148 bytes

In the data collection phase, for Rabieh et al.’s scheme [17], the data report size is 260 bytes, as

|Cv|+|TS|+|αv|=128+4+128=260bytes.

For Sun et al.’s scheme [19], the data report size is 516 bytes, as

|Sc|+|SignCi|+|ti|=256+256+4=516bytes.

For Kong et al.’s scheme [23], the data report size is 1152 bytes, as

|Ci,1|+|Ci,2|+|Ci,3|+|Ci,4|+|MACi|=256+256+256+256+128=1152bytes.

For the proposed EP2DS scheme, the data report size is 172 bytes, as

|PIDi|+|Ri|+|Aij|+|Bij|+|Cij|+|Dij|+|Lij|+|σij|+|Tij|=28+20+20+20+20+20+20+20+4+4=172bytes.

In the data query phase, for Kong et al.’s scheme [23], the query report size is 1152 bytes, as

|Ca,1|+|Ca,2|+|Ca,3|+|Ca,4|+|MACa|=256+256+256+256+128=1152bytes.

The response report size is 1664 bytes, as

|Cr,1|+|Cr,2|+|Cr,3|+|Cr,4|+|Cr,5|+|Cr,6|+|MACr|=256+256+256+256+256+256+128=1664bytes.

For Paulet et al.’s scheme [25], the query report size is 256 bytes, as

|C1|+|C2|=128+128=256bytes.

The response report size is 256m+128 bytes, as

|C1,1|+|C1,2|+···+|C1,m|+|C2,1|+|C2,2|···+|C2,m|+|γ|=128m+128m+128=256m+128bytes.

For Zhu et al.’s scheme [26], the query report size is 324 bytes, as

|IDLBS|+|ELQR|+|Ui|+|TS|+|Sigi|=4+256+256+4+256=324bytes.

The response report size is 320 bytes, as

|Erq1(TRL)|+|IDcs|+|TS|+|Sigcs|=256+4+4+256=320bytes.

For the proposed EP2DS scheme, the query report size is 172 bytes, as

|PIDq|+|Rq|+|Aqj|+|Bqj|+|Cqj|+|Dqj|+|Lqj|+|σqj|+|Tqj|=28+20+20+20+20+20+20+20+4=172bytes.

The response report size is 148 bytes, as

|IDFNj|+|RFNj|+|Jqj|+|Kqj|+|Mqj|+|Nqj|+|L^qj|+|σ^qj|+|T^qj|=4+20+20+20+20+20+20+20+4=148bytes.

The results from the comparison of communication costs in the data collection phase are illustrated in Figure 5. In terms of the data report size, the proposed EP2DS scheme requires 172 bytes, which is decreased by 33.8%, 66.7%, and 85.1% compared with that for Rabieh et al.’s scheme [17], Sun et al.’s scheme [19], and Kong et al.’s scheme [23], respectively.

Figure 5.

Figure 5

Comparison of the data report size.

The result from the comparison of communication costs in the data query phase is shown in Figure 6. Regarding the query report size, from Figure 6a, we can see that the proposed EP2DS scheme requires 172 bytes, a decrease of 85.1%, 32.8%, and 46.9% compared with that by Kong et al.’s scheme [23], Paulet et al.’s scheme [25], and Zhu et al.’s scheme [26], respectively. Figure 6b shows the correlation between the response report size and the number of segments m, and we can see that the response report size in the EP2DS scheme is the smallest compared with Kong et al.’s scheme [23], Paulet et al.’s scheme [25], and Zhu et al.’s scheme [26]. The proposed EP2DS scheme requires 148 bytes, which is decreased by 91.1% and 53.8% compared with that of Kong et al.’s scheme [23] and Zhu et al.’s scheme [26], respectively. Furthermore, unlike Paulet et al.’s scheme [25], the response report size in the EP2DS scheme does not increase with the number of segments m.

Figure 6.

Figure 6

(a) Comparison of the query report size; (b) Comparison of the response report size.

7. Conclusions

This paper proposes an efficient privacy-preserving data sharing scheme for fog-assisted vehicular sensor networks. Based on the super-increasing sequence, the proposed EP2DS scheme is able to format the data reports captured at different road segments into one report, while calculating the average sensory data in each road segment, greatly saving on the resources of communication and computation. Furthermore, by exploiting the modified oblivious transfer technology, the proposed EP2DS scheme also can query the road conditions of the potential moving route in the data query phase without disclosing the query location. Finally, an analysis of security displays that the proposed EP2DS scheme can satisfy all the requirements for security and privacy, with the performance evaluation suggesting that the proposed EP2DS scheme is more efficient in computation and communication costs compared to the existing schemes of [17,19,23,25,26]. Accordingly, the proposed EP2DS scheme is more appropriate for achieving data sharing in fog-assisted vehicular sensor networks. In future work, we will consider using blockchain technology to achieve decentralization and privacy protection.

Acknowledgments

The authors would like to thank the anonymous reviewers for their constructive comments and suggestions which helped us to improve the organization and presentation of this paper.

Appendix A

Security Model

The proposed EP2DS scheme should satisfy the confidentiality and unforgeability. The security is defined by the following two interaction games executed by a challenger C and an attacker A. A could make the following queries.

  • Hash queries: Upon receiving the query, C returns a random value to A.

  • Extract queries: Upon receiving the query on the pseudo identity PIDi, C returns a private key to A.

  • Signcryption queries: Upon receiving the query on the message mi under PIDi, C returns a ciphertext to A.

Definition A1

(Confidentiality). The proposed scheme is secure against indistinguishability under the chosen plaintext attack (IND-CPA), if any probabilistic polynomial-time attacker does not have the ability to win the below game with a non-negligible advantage.

The IND-CPA is defined by the following game.

Setup: C generates the system parameters and returns to A.

Phase 1: A adaptively makes the hash, extract, and signcryption queries with polynomial bounded times.

Challenge: A chooses a challenging identity PIDi*, picks two messages m0* and m1* and sends to C. C randomly picks b{0,1} and produces the ciphertext of message mb* under PIDi*. Finally, C returns the ciphertext to A.

Phase 2: A is able to adaptively perform the query in Phase 1 apart from that, it cannot make extract queries on PIDi*.

Guess: A produces a guess b{0,1}. The advantage that A wins the game is

AdvAIND-CPA=|Pr[b=b]-12|.

Definition A2

(Unforgeability). The proposed scheme can achieve existential unforgeability against adaptive chosen message attacks (EUF-CMA), if any probabilistic polynomial-time attacker does not have the ability to win the below game with a non-negligible advantage.

The EUF-CMA is defined by the following game.

Initialization: A selects a challenging pseudo identity PIDi* and transmits to C.

Setup: C generates the system parameters and returns to A.

Queries: A adaptively makes hash, extract and signcryption queries.

Forgery: A outputs a ciphertext on mi* under PIDi*, such that

  • The ciphertext on mi* under PIDi* is valid.

  • PIDi* has not been requested in the extract queries.

Appendix B

Security Proof

Theorem A1.

The proposed EP2DS scheme can provide confidentiality if ElGamal encryption is secure against the IND-CPA.

Supposing there is an attacker A is able to win the game defined in Definition 1 with a non-negligible probability ε, we can construct an algorithm B that could break the IND-CPA of ElGamal encryption with probability ε.

Initialization: The simulator S for ElGamal encryption generates the {p,q,P,G,Ppub) and transmits to B.

Setup: B chooses hash functions Hi: i=1,2,···,8 and a super-increasing sequence a. Finally, B returns {p,q,P,G, Ppub,Psp,H1,H2,H3,H4,H5,H6,H7,H8,a} to A.

To keep the rapidly response and consistency, B maintains the following list:

  • LH2: It consists of tuples (PIDi,Ri,Ppub,hi).

  • LH4: It consists of tuples (PIDi,Ri,Ci,1,Ci,2,Li,Ti,τi).

  • LVi: It consists of tuples (PIDi,xi,Ri).

Phase 1: A adaptively is able to adaptively perform the following polynomial bounded times queries.

H2 queries: A performs a query on (PIDi,Ri,Ppub), B executes as follows:

  • If LH2 contains (PIDi,Ri,Ppub,hi), B responds with the previous value hi=H2(PIDi,Ri,Ppub) to A.

  • If LH2 does not contain (PIDi,Ri,Ppub,hi), B randomly chooses a number hiZq*, adds (PIDi,Ri, Ppub,hi) into LH2 and returns hi to A.

H4 queries: A performs a query on (PIDi,Ri,Ci,1,Ci,2, Li,Ti), B executes as follows:

  • If LH4 contains (PIDi,Ri,Ci,1,Ci,2,Li,Ti,τi), B responds with the previous value τi=H4(PIDi,Ri,Ci,1, Ci,2,Li,Ti) to A.

  • If LH4 does not contain (PIDi,Ri,Ci,1,Ci,2,Li, Ti,τi), B randomly chooses a number τiZq*, adds (PIDi,Ri,Ci,1,Ci,2,Li,Ti,τi) into LH4 and returns τi to A.

Extract queries: A performs a query on PIDi, B executes as follows:

  • If PIDi=PIDi*, B aborts the game.

  • If PIDiPIDi*, B executes:
    • -
      If LVi contains (PIDi,xi,Ri), B returns (xi,Ri) to A.
    • -
      If LVi does not contain (PIDi,xi,Ri), B randomly chooses xi,hiZq* and makes Ri=xiP-hiPpub. If hi already appear in LH2, B chooses another xiZq* and tries again. B inserts (PIDi,xi,Ri) and (PIDi,Ri,Ppub,hi) into LVi and LH2, respectively. Finally, B returns the (xi,Ri) to A.

Signcryption queries: A makes a query on the message mi under PIDi, B returns mi to S. S randomly chooses tiZq* and computes Ci,1=tiP, Ci,2=tiPcc+miP,and returns them to B. B produces a ciphertext {PIDi, Ri,Ci,1,Ci,2,Li,σi,Ti} in accordance with the proposed scheme. Finally, B returns the ciphertext to A.

Challenge: A selects a challenging identity PIDi*, picks two same length message m0* and m1* and sends them to B. Then B transmits them to S. S randomly chooses b{0,1}, ti*Zq* and computes Ci,1*=ti*P, Ci,2*=ti*Pcc+mb*P, and returns them to B. B produce a ciphertext {PIDi*,Ri*,Ci,1*,Ci,2*,Li*,σi*,Ti*} in accordance with the proposed scheme. Finally, B returns the ciphertext to A.

Phase 2: A is able to adaptively perform the query in Phase 1 apart from it cannot make a extract queries on PIDi*.

Guess: B can output b as its guess against the IND-CPA of ElGamal encryption.

Probability analysis: Supposing that A is able to make at most qH2 times H2 queries, qH4 times H4 queries, qe times extract queries and qs times signcryption queries. We define two events as follows:

  • E1: B does not abort above game in extract queries.

  • E2: B is able to correctly output the value of b.

According to the above simulation, we could obtain that Pr[E1](1-1qH2)qe and Pr[E2|E1]ε, and hence the advantage that B is able to break the IND-CPA of ElGamal encryption is

ε=Pr[E2|E1]Pr[E1](1-1qH2)qeε.

In accordance with the above analysis, we can conclude that B can break the IND-CPA of ElGamal encryption with a non-negligible probability, this is contradicts with the security of ElGamal encryption, so the proposed EP2DS scheme could provide confidentiality.

Theorem A2.

The proposed EP2DS scheme can provide the unforgeability if the ECDL problem is hard.

Assuming that there is an attacker A can break the unforgeability of the proposed EP2DS scheme with a non-negligible advantage ε, we can construct an algorithm B for solving the ECDL problem with probability ε.

Initialization: A picks a challenging identity PIDi* and returns to B.

Setup: Given an instance (P,aP=Q) of the ECDL problem, then B sets Ppub=Q and returns {p,q,P,G,Ppub,Psp,H1, H2,H3,H4,H5,H6,H7,H8,a} to A.

H2 queries: It is the same as Theorem 1.

H4 queries: It is the same as Theorem 1.

Extract queries: It is the same as Theorem 1.

Signcryption queries: A makes a query on the message mi under PIDi, B executes as follows:

  • If PIDi=PIDi*, B randomly selects ti,li,σi,hi,τiZq* and calculates Ci,1=tiP, Ci,2=tiPcc+miP, Li=liP,Ri=σiP-(hiPpub+τiLi). If the hi already appears in LH2 or τi already appears in LH4, B chooses another σiZq* and tries again. Then, B returns the ciphertext {PIDi,Ri,Ci,1,Ci,2,Li,σi, Ti} to A, and inserts (PIDi,Ri,Ppub,hi) and (PIDi,Ri,Ci,1,Ci,2, Li,Ti,τi) into LH2 and LH4, respectively.

  • If PIDiPIDi*, B generates a ciphertext {PIDi,Ri, Ci,1,Ci,2,Li,σi,Ti} in accordance with the proposed scheme. Then, B returns the ciphertext to A.

Forgery: A outputs a forged ciphertexts {PIDi*,Ri*, Ci,1*,Ci,2*,Li*,σi*,Ti*} on mi* under PIDi*. On the basis of the forking lemma [40,41], B is able to output another valid ciphertext {PIDi*,Ri*,Ci,1*,Ci,2*,Li*,σi*,Ti*} on mi* under PIDi* by choosing a different H2. Since both ciphertexts are valid, we are able to gain the following two equations

σi*P=Ri*+hi*Ppub+τi*Li,σi*P=Ri*+hi*Ppub+τi*Li.

We can gain the equations:

(σi*-σi*)P=σi*P-σi*P=(hi*-hi*)Ppub=(hi*-hi*)aP.

B outputs a=(hi*-hi*)-1(σi*-σi*) as a solution of ECDL problem.

Probability analysis: Supposing that A is able to make at most qH2 times H2 queries, qH4 times H4 queries, qe times extract queries, and qs times signcryption queries. We define three events as follows:

  • E1: B never abort above game in extract and signcryption queries.

  • E2: B is able to output a valid ciphertext.

  • E3: PIDi=PIDi*.

According to the above simulation, we could obtain that Pr[E1](1-1qH2)qe(1-1qH4)qs, Pr[E2|E1]ε, and Pr[E3|E1E2]1qH2. Thus, the probability that B is able to solve the ECDL problem is shown as:

ε=Pr[E1E2E3]Pr[E3|E1E2]Pr[E2|E1]Pr[E1]1qH2(1-1qH2)qe(1-1qH4)qsε.

Due to the non-negligibility of ε, we are able to know that ε is non-negligible. In accordance with the above analysis, we are able to conclude that B can solve the ECDL problem with a non-negligible probability. This contradicts with the hardness of the ECDL problem [42], and hence the proposed EP2DS scheme can provide unforgeability.

Author Contributions

Y.M. and X.Y. conceived of the work, designed the concrete scheme, and wrote the paper. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported in part by the Natural Science Foundation of Shaanxi Province under Grant 2018JM6081, and in part by the Fundamental Research Funds for the Central Universities, CHD, under Grant 300102249204.

Conflicts of Interest

The authors declare no conflict of interest.

References

  • 1.Lee U., Magistretti E., Zhou B., Gerla M., Bellavista P., Corradi A. MobEyes: Smart mobs for urban monitoring with a vehicular sensor network. IEEE Trans. Commun. Mag. 2006;13:52–57. doi: 10.1109/WC-M.2006.250358. [DOI] [Google Scholar]
  • 2.Placzek B. Selective data collection in vehicular networks for traffic control applications. Transp. Res. Part C Emerging Technol. 2012;23:14–28. doi: 10.1016/j.trc.2011.12.007. [DOI] [Google Scholar]
  • 3.Mednis A., Elsts A., Selavo L. Embedded solution for road condition monitoring using vehicular sensor networks; Proceedings of the 2012 6th International Conference on Application of Information and Communication Technologies (AICT); Tbilisi, Georgia. 17–19 October 2012; pp. 1–5. [Google Scholar]
  • 4.Fiebig B. European traffic accidents and purposed solutions; Proceedings of the ITU-Workshop on Standardization in Telecommunication for Motor Vehicles; Geneva, Switzerland. 24–25 November 2003; pp. 24–25. [Google Scholar]
  • 5.Yu R., Huang X., Kang J., Ding J., Maharjan S., Gjessing S., Zhang Y. Cooperative resource management in cloud-enabled vehicular networks. IEEE Trans. Ind. Electron. 2015;62:7938–7951. doi: 10.1109/TIE.2015.2481792. [DOI] [Google Scholar]
  • 6.Ni J., Lin X., Zhang K., Shen X.M. Privacy-preserving real-time navigation system using vehicular crowdsourcing; Proceedings of the IEEE 84th Vehicular Technology Conference: VTC2016-Fall; Montreal, QC, Canada. 18–21 September 2016; pp. 1–5. [Google Scholar]
  • 7.Bonomi F., Milito R., Zhu J., Addepalli S. Fog computing and its role in the internet of things; Proceedings of the Mobile Cloud Computing Workshop; Helsinki, Finland. 13–17 August 2012; pp. 13–16. [Google Scholar]
  • 8.Armbrust M., Fox A., Griffith R., Joseph A.D., Katz R.H., Konwinski A., Lee G., Patterson D.A., Rabkin A., Stoica I., et al. A view of cloud computing. Commun. ACM. 2010;53:50–58. doi: 10.1145/1721654.1721672. [DOI] [Google Scholar]
  • 9.Dai Y., Xu D., Maharjan S., Zhang Y. Joint offloading and resource allocation in vehicular edge computing and networks; Proceedings of the IEEE Global Communications Conference; Abu Dhabi, UAE. 9–13 December 2018; pp. 1–7. [Google Scholar]
  • 10.Ni J., Zhang K., Yu Y., Lin X., Shen X.S. Privacy-preserving smart parking navigation supporting efficient driving guidance retrieval. IEEE Trans. Veh. Technol. 2018;67:6504–6517. doi: 10.1109/TVT.2018.2805759. [DOI] [Google Scholar]
  • 11.Basudan S., Lin X., Sankaranarayanan K. A privacy-preserving vehicular crowdsensing based road surface condition monitoring system using fog computing. IEEE Internet Things J. 2017;4:772–782. doi: 10.1109/JIOT.2017.2666783. [DOI] [Google Scholar]
  • 12.Chun S., Shin S., Seo S., Eom S., Jung J., Lee K. A pubsub-based fog computing architecture for Internet-of-vehicles; Proceedings of the 8th International Conference on Cloud Computing Technology and Science; Luxembourg. 12–15 December 2016; pp. 90–93. [Google Scholar]
  • 13.Ni J., Zhang A., Lin X., Shen X.S. Security, privacy, and fairness in fog-based vehicular crowdsensing. IEEE Commun. Mag. 2017;55:146–152. doi: 10.1109/MCOM.2017.1600679. [DOI] [Google Scholar]
  • 14.Wei J., Wang X., Li N. A privacy-preserving fog computing framework for vehicular crowdsensing betworks. IEEE Access. 2018;6:43776–43784. doi: 10.1109/ACCESS.2018.2861430. [DOI] [Google Scholar]
  • 15.Omoniwa B., Hussain R., Javed M.A. Fog/Edge computing-based IoT (FECIoT): Architecture, applications, and research issues. IEEE Internet Things. 2019;6:4118–4149. doi: 10.1109/JIOT.2018.2875544. [DOI] [Google Scholar]
  • 16.Zhuo G., Jia Q., Guo L., Li M., Li P. Privacy-preserving verifiable data aggregation and analysis for cloud-assisted mobile crowdsourcing; Proceedings of the 35th IEEE International Conference on Computer Communications; San Francisco, CA, USA. 10–14 April 2016; pp. 1–9. [Google Scholar]
  • 17.Rabieh K., Mahmoud M.M.E.A., Younis M. Privacy-preserving route reporting schemes for traffic management systems. IEEE Trans. Veh. Technol. 2017;66:2703–2713. doi: 10.1109/TVT.2016.2583466. [DOI] [Google Scholar]
  • 18.Xu C., Lu R., Wang H., Zhu L., Huang C. PAVS: A new privacy-preserving data aggregation scheme for vehicle sensing systems. Sensors. 2017;17:500. doi: 10.3390/s17030500. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 19.Sun G., Sun S., Sun J., Yu H., Du X., Guizani M. Security and privacy preservation in fog-based crowd sensing on the internet of vehicles. J. Network Comput. Appl. 2019;134:89–99. doi: 10.1016/j.jnca.2019.02.018. [DOI] [Google Scholar]
  • 20.Lin X., Lu R., Shen X. MDPA: Multidimensional privacy-preserving aggregation scheme for wireless sensor networks. Wirel. Commun. Mob. Comput. 2010;10:843–856. doi: 10.1002/wcm.796. [DOI] [Google Scholar]
  • 21.Lu R., Heung K., Lashkari A.H., Ghorbani A.A. A light-weight privacy-preserving data aggregation scheme for fog computing-enhanced IoT. IEEE Access. 2017;5:3302–3312. doi: 10.1109/ACCESS.2017.2677520. [DOI] [Google Scholar]
  • 22.Wang B., Chang Z., Zhou Z., Ristaniemi T. Reliable and privacy-preserving task recomposition for crowdsensing in vehicular fog computing; Proceedings of the 87th Vehicular Technology Conference; Porto, Portugal. 3–6 June 2018; pp. 6–11. [Google Scholar]
  • 23.Kong Q., Lu R., Ma M., Bao H. A privacy-preserving sensory data sharing scheme in internet of vehicles. Future Gener. Comput. Syst. 2019;92:644–655. doi: 10.1016/j.future.2017.12.003. [DOI] [Google Scholar]
  • 24.Ghinita G., Kalnis P., Kantarcioglu M., Bertino E. A hybrid technique for private location-based queries with database protection; Proceedings of the 11th International Symposium on Spatial and Temporal Databases; Aalborg, Denmark. 8–10 July 2009; pp. 98–116. [Google Scholar]
  • 25.Paulet R., Kaosar M.G., Yi X., Bertino E. Privacy-preserving and content protecting location based queries. IEEE Trans. Knowl. Data Eng. 2014;26:1200–1210. doi: 10.1109/TKDE.2013.87. [DOI] [Google Scholar]
  • 26.Zhu H., Lu R., Huang C., Chen L., Li H. An efficient privacy-preserving location-based services query scheme in outsourced cloud. IEEE Trans. Veh. Technol. 2016;65:7729–7739. doi: 10.1109/TVT.2015.2499791. [DOI] [Google Scholar]
  • 27.Zhu H., Liu F., Li H. Efficient and privacy-preserving polygons spatial query framework for location-based services. IEEE Internet Things J. 2017;4:536–545. doi: 10.1109/JIOT.2016.2553083. [DOI] [Google Scholar]
  • 28.Naor M., Pinkas B. Oblivious transfer with adaptive queries; Proceedings of the Advances in Cryptology-CRYPTO’99; Santa Barbara, CA, USA. 15–19 August 1999; pp. 573–590. [Google Scholar]
  • 29.IEEE, 802.11p-2010-IEEE Standard for Information technology. [(accessed on 14 January 2020)]; Available online: https://ieeexplore.ieee.org/document/5514475/versions#versions.
  • 30.Jiang S., Liu J., Duan M., Wang L., Fang L. Secure and privacy-preserving report de-duplication in the fog-based vehicular crowdsensing system; Proceedings of the IEEE Global Communications Conference; Abu Dhabi, UAE. 9–13 December 2018; pp. 1–6. [Google Scholar]
  • 31.Zhu L., Li M., Zhang Z. Secure fog-assisted crowdsensing with collusion resistance: From data reporting to data requesting. IEEE Internet Things J. 2019;6:5473–5484. doi: 10.1109/JIOT.2019.2902459. [DOI] [Google Scholar]
  • 32.Miller V.S. Use of elliptic curves in cryptography; Proceedings of the Advances in Cryptology-CRYPTO’85; Santa Barbara, CA, USA. 18–22 August 1985; pp. 417–426. [Google Scholar]
  • 33.Koblitz N. Elliptic curve cryptosystem. Math. Comput. 1987;48:203–209. doi: 10.1090/S0025-5718-1987-0866109-5. [DOI] [Google Scholar]
  • 34.Ming Y., Zhang X., Shen X. Efficient privacy-preserving multi-dimensional data aggregation scheme in smart grid. IEEE Access. 2019;7:32907–32921. doi: 10.1109/ACCESS.2019.2903533. [DOI] [Google Scholar]
  • 35.He D., Zeadally S., Xu B., Huang X. An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks. IEEE Trans. Inf. Forensics Secur. 2015;10:2681–2690. doi: 10.1109/TIFS.2015.2473820. [DOI] [Google Scholar]
  • 36.Liu J.K., Yuen T.H., Au M.H., Susilo W. Improvements on an authentication scheme for vehicular sensor networks. Expert Syst. Appl. 2014;41:2559–2564. doi: 10.1016/j.eswa.2013.10.003. [DOI] [Google Scholar]
  • 37.Boneh D., Goh E., Nissim K. Evaluating 2-DNF formulas on ciphertexts; Proceedings of the 2nd Theory of Cryptography Conference; Cambridge, MA, USA. 10–12 February 2005; pp. 325–341. [Google Scholar]
  • 38.Ming Y., Cheng H. Efficient certificateless conditional privacy-preserving authentication scheme in VANETs. Mob. Inf. Syst. 2019;2019:1–19. doi: 10.1155/2019/7593138. [DOI] [Google Scholar]
  • 39.Shamus Software Ltd Multi precision integer and rational arithmetic cryptographic library (MIRACL) [(accessed on 1 December 2019)]; Available online: http://www.certivox.com/miracl/
  • 40.Pointcheval D., Stern J. Security proofs for signature schemes; Proceedings of the Advances in Cryptology-EUROCRYPT’96; Saragossa, Spain. 12–16 May 1996; pp. 387–398. [Google Scholar]
  • 41.Ming Y., Shen X. PCPA: A practical certificateless conditional privacy preserving authentication scheme for vehicular ad hoc networks. Sensors. 2018;18:1573. doi: 10.3390/s18051573. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 42.He D., Kumar N., Zeadally S., Vinel A., Yang L.T. Efficient and privacy-preserving data aggregation scheme for smart grid against internal adversaries. IEEE Trans. Smart Grid. 2017;13:1–9. doi: 10.1109/TSG.2017.2720159. [DOI] [Google Scholar]

Articles from Sensors (Basel, Switzerland) are provided here courtesy of Multidisciplinary Digital Publishing Institute (MDPI)

RESOURCES