Version 2 2020-01-28, 15:04Version 2 2020-01-28, 15:04
Version 1 2019-10-14, 16:43Version 1 2019-10-14, 16:43
journal contribution
posted on 2020-01-28, 15:04authored byJie Cui, Xiaoyu Zhang, Hong Zhong, Jing Zhang, Lu Liu
With an increasing number of cloud service
providers (CSPs), research works on multi-cloud environments
to provide solutions to avoid vendor lock-in and deal with
the single-point failure problem have expanded considerably.
However, a few schemes focus on the conditional privacy protection authentication of vehicular networks under a multi-cloud
environment. In this regard, we propose a robust and extensible
authentication scheme for vehicular networks to fulfil the evergrowing diversified service demands from users. According to our
solution, the vehicles need to register with the trusted authority
(TA) only once to achieve a fast and efficient authentication
with CSPs. Additionally, as long as the new CSP is successfully
registered in TA, it can participate in vehicular service. A cloud
broker, which is managed by the TA, is responsible for connecting
all the cloud services; consequently, the complexity involved in
the selection of CSPs is hidden from the users’ view. A detailed
security analysis establishes that our scheme can fulfil conditional
privacy protection and achieve the security objectives of vehicular
networks. Our scheme is based on elliptic curve cryptography
and does not employ the complex bilinear pairing operation. An
evaluation of performance of the proposed scheme indicates that
it is suitable for applications involving vehicular networks.
Funding
The work was supported by the National Natural Science Foundation of China (No.61872001, No.61572001,
No.61702005), the Open Fund of Key Laboratory of Embedded System and Service Computing (Tongji University),
Ministry of Education (No. ESSCKF2018-03), the Open Fund
for Discipline Construction, Institute of Physical Science and
Information Technology, Anhui University and the Excellent
Talent Project of Anhui University. The authors are very
grateful to the anonymous referees for their detailed comments
and suggestions regarding this paper.
History
Citation
IEEE Transactions on Information Forensics and Security, 2019, 15, pp.1654-1667
Author affiliation
/Organisation/COLLEGE OF SCIENCE AND ENGINEERING/Department of Informatics
Version
AM (Accepted Manuscript)
Published in
IEEE Transactions on Information Forensics and Security
Volume
15
Pagination
1654-1667
Publisher
Institute of Electrical and Electronics Engineers (IEEE)
The file associated with this record is under embargo until publication, in accordance with the publisher's self-archiving policy. The full text may be available through the publisher links provided above.