A Fully Auditable Data Propagation Scheme With Dynamic Vehicle Management for EC-ITS

Published: 01 Jan 2024, Last Modified: 08 Apr 2025IEEE Trans. Intell. Transp. Syst. 2024EveryoneRevisionsBibTeXCC BY-SA 4.0
Abstract: Access control and authenticity are two critical concerns of the encrypted propagating data in edge computing-assisted intelligent transportation systems (EC-ITS). This paper presents a fully traceable and verifiable ciphertext-policy attribute-based encryption scheme with auditable outsourced decryption and dynamic identity revocation (FTV-AOD-DR-CP-ABE) for EC-ITS as a confidential and fine-grained data sharing and acquiring module. The proposed FTV-AOD-DR-CP-ABE is computing-efficient that all the algorithms executed by vehicles including $\mathbf {Enc}$ , $\mathbf {OutKeyGen}$ and $\mathbf {FinalDec}$ are constant complexity. In addition, an efficient identity-based signature and message commitment (IBSMC) algorithm is constructed for the ciphertext and message in our FTV-AOD-DR-CP-ABE to provide both of them with traceable authenticity and verifiability. An outsourced key auditing algorithm $\mathbf {TKAudit}$ is also innovated for RSU to audit the legality and freshness of outsourced key $\mathsf {TK}$ , which can protect the propagating data system against the flooding and DDoS attack with the illegal outsourced keys. Based on the traceability of the ciphertext and outsourced key, a dynamic vehicle revocation mechanism is designed in our scheme. Next the rigorous proofs of the data confidentiality, ciphertext and message traceable verifiability, $\mathsf {TK}$ auditability and revocable security are given in random oracle model (ROM). Finally, by comprehensive comparison and evaluation of the proposed FTV-AOD-DR-CP-ABE with other state-of-the-art data propagating schemes, our FTV-AOD-DR-CP-ABE is more comprehensive.
Loading