Javascript must be enabled to continue!
A Privacy Preserving V2I Service Access Management System for Vehicular Clouds
View through CrossRef
Vehicular cloud computing is a technological paradigm shifting which takes advantage of cloud computingto provide vehicles with useful computing resources and services. With the rapid advancementof intelligent vehicles and Intelligent Transportation System infrastructures, some researches on theliteratures have put forth a vision of the combination of vehicular network with could computing inrecent. However, little efforts have concentrated on security features for vehicular cloud services. Inparticular, privacy is one of the critical security issues in vehicular cloud as well as vehicular communicationssince a third-party entity may be involved in cloud service management and operations. Inthis paper, we design a privacy preserving vehicle-to-infrastructure cloud access management systemin which neither global eavesdropper nor any single system management entity can trace a vehiclefor service provision. We make use of pre-loaded pseudonyms to generate anonymous service accesstokens for vehicles and RSU local revocation check to reduce the size of revocation list in the system.
Title: A Privacy Preserving V2I Service Access Management System for Vehicular Clouds
Description:
Vehicular cloud computing is a technological paradigm shifting which takes advantage of cloud computingto provide vehicles with useful computing resources and services.
With the rapid advancementof intelligent vehicles and Intelligent Transportation System infrastructures, some researches on theliteratures have put forth a vision of the combination of vehicular network with could computing inrecent.
However, little efforts have concentrated on security features for vehicular cloud services.
Inparticular, privacy is one of the critical security issues in vehicular cloud as well as vehicular communicationssince a third-party entity may be involved in cloud service management and operations.
Inthis paper, we design a privacy preserving vehicle-to-infrastructure cloud access management systemin which neither global eavesdropper nor any single system management entity can trace a vehiclefor service provision.
We make use of pre-loaded pseudonyms to generate anonymous service accesstokens for vehicles and RSU local revocation check to reduce the size of revocation list in the system.
Related Results
Augmented Differential Privacy Framework for Data Analytics
Augmented Differential Privacy Framework for Data Analytics
Abstract
Differential privacy has emerged as a popular privacy framework for providing privacy preserving noisy query answers based on statistical properties of databases. ...
Privacy Risk in Recommender Systems
Privacy Risk in Recommender Systems
Nowadays, recommender systems are mostly used in many online applications to filter information and help users in selecting their relevant requirements. It avoids users to become o...
THE SECURITY AND PRIVACY MEASURING SYSTEM FOR THE INTERNET OF THINGS DEVICES
THE SECURITY AND PRIVACY MEASURING SYSTEM FOR THE INTERNET OF THINGS DEVICES
The purpose of the article: elimination of the gap in existing need in the set of clear and objective security and privacy metrics for the IoT devices users and manufacturers and a...
Privacy in online advertising platforms
Privacy in online advertising platforms
Online advertising is consistently considered as the pillar of the "free⢠content on the Web since it is commonly the funding source of websites. Furthermore, the option of deliver...
Privacy awareness in generative AI: the case of ChatGPT
Privacy awareness in generative AI: the case of ChatGPT
Purpose
Generative AI, like ChatGPT, uses large language models that process human language and learn from patterns identified in large data sets. Despite the great benefits offere...
Differential privacy learned index
Differential privacy learned index
Indexes are fundamental components of database management systems, traditionally implemented through structures like B-Tree, Hash, and BitMap indexes. These index structures map ke...
On the Status of Rights
On the Status of Rights
Photo by Patrick Tomasso on Unsplash
ABSTRACT
In cases where the law conflicts with bioethics, the status of rights must be determined to resolve some of the tensions. ...
Privacy - Preserving Technique in cybersecurity: Balancing Data Protection and User Rights
Privacy - Preserving Technique in cybersecurity: Balancing Data Protection and User Rights
Increasing technological complexity of cyber threats creates a major challenge between securing data privacy and maintaining potent cybersecurity practices. The paper examines priv...

