Secure Data Sharing Scheme for Vehicular Cloud Networks Using an Optimized RSA Algorithm
Keywords:
Vehicular cloud computing, Secure Data Transmission, Encryption, Decryption, and Rivest Shamir AdelmanAbstract
In modern years, vehicular cloud computing (VCC) has come up with innovative technology to give continuous information to the vehicles from every time and everywhere. VCC delivers both secure and non-secure information to its users. The vehicles carry low computational powers, storage, etc., so they gather and forward their information to the vehicular cloud for computing and storage. Nevertheless, privacy and security are the primary concerns we must focus on every VCC system. This study proposes secure and effective data-sharing scheme for vehicular cloud computing environments using an optimized RSA algorithm that encrypts the data initially and stores it in the cloud to protect it from unauthorized access. The method performs key generation process optimally using the Spiral learning centred Coati Optimization Algorithm (SLCOA) which helps to improve the system’s security further. The simulation outcomes proved that our model is secure and well suitable for VCC compared to other related schemes.
Downloads
References
Quy, V. K., Nam, V. H., Linh, D. M., Ban, N. T., & Han, N. D. (2022). Communication solutions for vehicle ad-hoc network in smart cities environment: A comprehensive survey. Wireless Personal Communications, 122(3), 2791-2815.
Gong, M., Yoo, Y., & Ahn, S. (2023). Vehicular Cloud Forming and Task Scheduling for Energy-Efficient Cooperative Computing. IEEE Access, 11, 3858-3871.
Alhilal, A. Y., Finley, B., Braud, T., Su, D., & Hui, P. (2022). Street smart in 5G: Vehicular applications, communication, and computing. IEEE Access, 10, 105631-105656.
Shahnawaz, A., & Shabana, M. (2024). Efficient time-oriented latency-based secure data encryption for cloud storage [J]. Cyber Security and Applications, 2, 100027.
Akilandeswari, V., Kumar, A., Thilagamani, S., Subedha, V., Kalpana, V., Kaur, K., & Asenso, E. (2022). Minimum latency-secure key transmission for cloud-based internet of vehicles using reinforcement learning. Computational Intelligence and Neuroscience, 2022.
Ramachandra, M. N., Srinivasa Rao, M., Lai, W. C., Parameshachari, B. D., Ananda Babu, J., & Hemalatha, K. L. (2022). An efficient and secure big data storage in cloud environment by using triple data encryption standard. Big Data and Cognitive Computing, 6(4), 101.
Rathore, M. S., Poongodi, M., Saurabh, P., Lilhore, U. K., Bourouis, S., Alhakami, W., ... & Hamdi, M. (2022). A novel trust-based security and privacy model for internet of vehicles using encryption and steganography. Computers and Electrical Engineering, 102, 108205.
Adee, R., & Mouratidis, H. (2022). A dynamic four-step data security model for data in cloud computing based on cryptography and steganography. Sensors, 22(3), 1109.
Sana, M. U., Li, Z., Kiren, T., Liaqat, H. B., Naseem, S., & Saeed, A. (2023). A Secure Method for Data Storage and Transmission in Sustainable Cloud Computing. Computers, Materials & Continua, 75(2).
Boubaker, S., Alsubaei, F. S., Said, Y., & Ahmed, H. E. (2023). Lightweight Cryptography for Connected Vehicles Communication Security on Edge Devices. Electronics, 12(19), 4090.
Al‐Balasmeh, H., Singh, M., & Singh, R. (2022). Framework of data privacy preservation and location obfuscation in vehicular cloud networks. Concurrency and Computation: Practice and Experience, 34(5), e6682.
Liu, Z., Wan, L., Guo, J., Huang, F., Feng, X., Wang, L., & Ma, J. (2023). PPRU: A privacy-preserving reputation updating scheme for cloud-assisted vehicular networks. IEEE Transactions on Vehicular Technology.
Kumar, V., Al-Tameemi, A. M. A., Kumari, A., Ahmad, M., Falah, M. W., & Abd El-Latif, A. A. (2022). Psebvc: Provably secure ecc and biometric based authentication framework using smartphone for vehicular cloud environment. IEEE Access, 10, 84776-84789.
Sun, J., Xu, G., Zhang, T., Cheng, X., Han, X., & Tang, M. (2022). Secure data sharing with flexible cross-domain authorization in autonomous vehicle systems. IEEE Transactions on Intelligent Transportation Systems.
Vaanchig, N., Qin, Z., & Ragchaasuren, B. (2022). Constructing secure‐channel free identity‐based encryption with equality test for vehicle‐data sharing in cloud computing. Transactions on Emerging Telecommunications Technologies, 33(5), e3896.
Di, C., & Wu, W. (2022). A novel identity-based mutual authentication scheme for vehicle ad hoc networks. Wireless Communications and Mobile Computing, 2022.
A Privacy Preserving Authentication Protocol Using Quantum ComputingforV2IAuthenticationinVehicularAdHocNetworks
Al-Shareeda, M. A., Manickam, S., Mohammed, B. A., Al-Mekhlafi, Z. G., Qtaish, A., Alzahrani, A. J., ... & Almekhlafi, K. (2022). Provably secure with efficient data sharing scheme for fifth-generation (5G)-enabled vehicular networks without road-side unit (RSU). Sustainability, 14(16), 9961.
Tiberti, W., Civino, R., Gavioli, N., Pugliese, M., & Santucci, F. (2023). A Hybrid-Cryptography Engine for Securing Intra-Vehicle Communications. Applied Sciences, 13(24), 13024.
Downloads
Published
How to Cite
Issue
Section
License
![Creative Commons License](http://i.creativecommons.org/l/by-sa/4.0/88x31.png)
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.