Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2732209.2732214acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
research-article

A Secure Automobile Information Sharing System

Published: 14 April 2015 Publication History

Abstract

Utilizing the proxy re-encryption technique described in \cite{w-IBPdr}, we construct a secure storage system named PRINCESS Proxy Re-encryption with INd-Cca security in an Encrypted file Storage System). With PRINCESS, the files encrypted in accordance with the confidentiality levels can be shared among appointed users while remaining encrypted. Furthermore, we implement an automobile information-sharing system based on PRINCESS. With this system, location information obtained from a GPS and the vehicle data obtained via on-board diagnosis and Bluetooth can be shared flexibly and securely. By using this system, it is possible to share automobile information, such as the position and speed, and even the engine's rotational frequency, while ensuring user control and privacy. This system facilitates the potential for new services that require automobile information to be shared securely via cloud technology.

References

[1]
M. Blaze, G. Bleumer, M. Strauss: "Divertible Protocols and Atomic Proxy Cryptography", In: EUROCRYPT 1998, LNCS, vol. 1403, pp. 127--144, Springer (1998).
[2]
D. Boneh, X. Boyen: "Efficient Selective Identity-Based Encryption Without Random Oracles", J. Cryptology 24(4), 659--693 (2011).
[3]
M. Blaze, G. Bleumer, M. Strauss: "Divertible Protocols and Atomic Proxy Cryptography." In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 127--144. Springer, Heidelberg (1998).
[4]
M. Mambo, E. Okamoto: "Proxy Cryptosystem: Delegation of the Power to Decrypt Ciphertexts", In: IEICE Trans. Fundamentals, Vol. E80-A, No. 1, pp. 54--63, Springer (1997).
[5]
(Patent in Japanese) L. Wang: "The Method and its Cryptosystem of the ID-based Encryption with Two Functions (Proxy Decryption and Proxy Re-encryption)", Patent No. 5298394 (2013).
[6]
A. Shamir: "Identity-based Cryptosystems and Signature Schemes", In: CRYPTO 1984, LNCS, vol. 196, pp. 47--53, Springer (1985).
[7]
L. Wang, L. Wang, M. Mambo, E. Okamoto: "Identity-Based Proxy Cryptosystems with Revocability and Hierarchical Confidentialities", IEICE, E95-A(1), pp. 70--88, (2012).
[8]
B. Waters:"Efficient Identity-Based Encryption Without Random Oracles", EUROCRYPT 2005: 114--127 (2005).

Cited By

View all
  • (2015)POSTERProceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security10.1145/2810103.2810123(1684-1686)Online publication date: 12-Oct-2015

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
IoTPTS '15: Proceedings of the 1st ACM Workshop on IoT Privacy, Trust, and Security
April 2015
50 pages
ISBN:9781450334495
DOI:10.1145/2732209
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 14 April 2015

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. automobile information sharing
  2. cloud security
  3. privacy
  4. proxy re-encryption

Qualifiers

  • Research-article

Conference

ASIA CCS '15
Sponsor:
ASIA CCS '15: 10th ACM Symposium on Information, Computer and Communications Security
April 14 - March 14, 2015
Singapore, Republic of Singapore

Acceptance Rates

IoTPTS '15 Paper Acceptance Rate 5 of 13 submissions, 38%;
Overall Acceptance Rate 16 of 39 submissions, 41%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)4
  • Downloads (Last 6 weeks)0
Reflects downloads up to 10 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2015)POSTERProceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security10.1145/2810103.2810123(1684-1686)Online publication date: 12-Oct-2015

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media