4.5 Article

SE-VFC: Secure and Efficient Outsourcing Computing in Vehicular Fog Computing

Journal

IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT
Volume 18, Issue 3, Pages 3389-3399

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TNSM.2021.3080138

Keywords

Outsourcing; Security; Task analysis; Edge computing; Encryption; Resource management; Servers; Outsourcing computing; vehicular fog computing; Boneh-Lynn-Shacham (BLS) signature; attribute-based encryption (ABE)

Funding

  1. Zhejiang Provincial Natural Science Foundation of China [LY19F020021]
  2. National Natural Science Foundation of China [61873232]
  3. Science and Technology Program of the Ministry of Public Security [2018GABJC33]
  4. New Talent Plan of Zhejiang Province [2020R427062]
  5. Opening Project of Key Laboratory of Ministry of Public Security (Public Security Information Application Based on Big-data Architecture) [2020DSJSYS005]

Ask authors/readers for more resources

Fog-aided computing is a new computing paradigm aimed at providing various computation services to end users. Researchers propose a secure and efficient outsourcing computing scheme in vehicular fog computing (SE-VFC) which combines lightweight BLS signature and group signature for batch anonymous authentication of fog vehicles while protecting their privacy. Security analysis confirms the effectiveness of the scheme.
Fog-aided computing is an emerging computing paradigm developed for providing various computation services to end users in vehicular fog computing. However, fog vehicles may be untrusted, and results from malicious operations may cause serious accidents. Therefore, we propose a secure and efficient outsourcing computing scheme in vehicular fog computing (SE-VFC), which performs outsourcing computing through fog vehicles with computing resources, and combines lightweight Boneh-Lynn-Shacham (BLS) signature and group signature to achieve batch anonymous authentication of fog vehicles while protecting their privacy in multiple outsourcing tasks. We also verify the correctness of the outsourcing computing results. Security analysis shows that our scheme can authenticate the fog vehicles in the outsourcing computation and preserve their privacy, it can also trace the malicious ones if necessary. Compared with the existing schemes, our scheme has relatively low communication and computation overhead, thus it is quite efficient for batch authentication especially in multiple computing tasks. Extensive simulation results verify the effectiveness and practicality of our proposed scheme in vehicular fog computing.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.5
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available