2016
DOI: 10.1155/2016/1493290
|View full text |Cite
|
Sign up to set email alerts
|

Conditional Ciphertext-Policy Attribute-Based Encryption Scheme in Vehicular Cloud Computing

Abstract: VCC (Vehicular Cloud Computing) is an emerging and promising paradigm, due to its significance in traffic management and road safety. However, it is difficult to maintain both data security and system efficiency in Vehicular Cloud, because the traffic and vehicular related data is large and complicated. In this paper, we propose a conditional ciphertext-policy attribute-based encryption (C-CP-ABE) scheme to solve this problem. Comparing with CP-ABE, this scheme enables data owner to add extra access trees and … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 35 publications
0
3
0
Order By: Relevance
“…In a cloud-supported CV application, distributed and scalable access control schemes are required. Various attribute-based access control models have been presented in the literature (e.g., ciphertext-policy attribute-based encryption [35], secure billing protocol over attribute-based encryption [36]) for preserving confidential information in cloud-supported CV applications. Along with an appropriate access control model, asymmetric or public-key cryptography is necessary for information exchange in cloudsupported CV applications [37]- [40].…”
Section: A Confidentialitymentioning
confidence: 99%
“…In a cloud-supported CV application, distributed and scalable access control schemes are required. Various attribute-based access control models have been presented in the literature (e.g., ciphertext-policy attribute-based encryption [35], secure billing protocol over attribute-based encryption [36]) for preserving confidential information in cloud-supported CV applications. Along with an appropriate access control model, asymmetric or public-key cryptography is necessary for information exchange in cloudsupported CV applications [37]- [40].…”
Section: A Confidentialitymentioning
confidence: 99%
“…This scheme is restricted therein it allows an authority merely to issue private keys expressing threshold policies. Since then, several works [2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17] proposed different ABE systems and applications, among which two worksare remarkable. Goyal et al [6] propounded a fine-grained access constraint for attribute-based encryption.…”
Section: Introductionmentioning
confidence: 99%
“…In recent years, Li [14] propounded a hidden access policy CP-ABE scheme, which can protect the privacy of the encryptor and decryptor. Guan [16] proposed a conditional CP-ABE which enables data owner to add extra access trees and the corresponding conditions. Jiang [15] proposed a flexible CP-ABE supporting AND-gate and threshold with short ciphertexts.…”
Section: Introductionmentioning
confidence: 99%