Trusted Certified Auditor Using Cryptography for Secure Data Outsourcing and Privacy Preservation in Fog-Enabled VANETs
作者机构:School of Computer Science and EngineeringVIT-AP UniversityAmaravatiAndhra Pradesh522237India
出 版 物:《Computers, Materials & Continua》 (计算机、材料和连续体(英文))
年 卷 期:2024年第79卷第5期
页 面:3089-3110页
核心收录:
学科分类:11[军事学] 1105[军事学-军队指挥学] 0839[工学-网络空间安全] 08[工学] 110505[军事学-密码学] 110503[军事学-军事通信学]
主 题:Vehicular ad-hoc networks data outsourcing privacy preservation cryptography keys trusted certified auditors data security
摘 要:With the recent technological developments,massive vehicular ad hoc networks(VANETs)have been established,enabling numerous vehicles and their respective Road Side Unit(RSU)components to communicate with *** best way to enhance traffic flow for vehicles and traffic management departments is to share thedata they *** needs to be more protection for the VANET *** effective and safe methodof outsourcing is suggested,which reduces computation costs by achieving data security using a homomorphicmapping based on the conjugate operation of *** research proposes a VANET-based data outsourcingsystem to fix the *** keep data outsourcing secure,the suggested model takes cryptography models *** will keep the generated keys for the purpose of vehicle *** controlling and overseeingthe outsourced data while preserving privacy,the suggested approach considers the Trusted Certified Auditor(TCA).Using the secret key,TCA can identify the genuine identity of VANETs when harmful messages *** proposed model develops a TCA-based unique static vehicle labeling system using cryptography(TCA-USVLC)for secure data outsourcing and privacy preservation in *** proposed model calculatesthe trust of vehicles in 16 ms for an average of 180 vehicles and achieves 98.6%accuracy for data encryption toprovide *** proposedmodel achieved 98.5%accuracy in data outsourcing and 98.6%accuracy in privacypreservation in fog-enabled *** curve cryptography models can be applied in the future for betterencryption and decryption rates with lightweight cryptography operations.