Secure cloud internet of vehicles based on blockchain and data transmission scheme of map/reduce

IF 1.2 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Computer Science and Information Systems Pub Date : 2023-01-01 DOI:10.2298/csis220921056l
Hua-Yi Lin
{"title":"Secure cloud internet of vehicles based on blockchain and data transmission scheme of map/reduce","authors":"Hua-Yi Lin","doi":"10.2298/csis220921056l","DOIUrl":null,"url":null,"abstract":"Over the past few years, because of the popularity of the Internet of vehicles and cloud computing, the exchange of group information between vehicles is no longer out of reach. Through WiFi/5G wireless communication protocol, vehicles can instantly deliver traffic conditions and accidents to the back end or group vehicles traveling together, which can reduce traffic congestion and accidents. In addition, vehicles transmit real-time road conditions to the cloud vehicle management center, which can also share real-time road conditions and improve the road efficiency for pedestrians and drivers. However, the transmission of information in an open environment raises the issue of personal information security. Most of the security mechanisms provided by the existing Internet of vehicles require centralized authentication servers, which increase the burden of certificate management and computing. Moreover, the road side unit as a decentralized authentication center may be open to hacking or modification, but due to personal privacy and security concerns, vehicle-to-vehicle is not willing to share information with each other. Therefore, this study is conducted through blockchain to ensure the security of vehicle-based information transmission. Moreover, the elliptic curve Diffie-Hellman (ECDH) key exchange protocol and a secure conference key mechanism with direct user confirmation combined with the back-end cloud platform Map/Reduce is proposed to ensure the identities of Mappers and Reducers that participate in the cloud operation, avoid malicious participants to modify the transmission information, so as to achieve secure Map/Reduce operations, and improves vehicle and passenger traffic safety.","PeriodicalId":50636,"journal":{"name":"Computer Science and Information Systems","volume":"1 1","pages":"137-156"},"PeriodicalIF":1.2000,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer Science and Information Systems","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.2298/csis220921056l","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 1

Abstract

Over the past few years, because of the popularity of the Internet of vehicles and cloud computing, the exchange of group information between vehicles is no longer out of reach. Through WiFi/5G wireless communication protocol, vehicles can instantly deliver traffic conditions and accidents to the back end or group vehicles traveling together, which can reduce traffic congestion and accidents. In addition, vehicles transmit real-time road conditions to the cloud vehicle management center, which can also share real-time road conditions and improve the road efficiency for pedestrians and drivers. However, the transmission of information in an open environment raises the issue of personal information security. Most of the security mechanisms provided by the existing Internet of vehicles require centralized authentication servers, which increase the burden of certificate management and computing. Moreover, the road side unit as a decentralized authentication center may be open to hacking or modification, but due to personal privacy and security concerns, vehicle-to-vehicle is not willing to share information with each other. Therefore, this study is conducted through blockchain to ensure the security of vehicle-based information transmission. Moreover, the elliptic curve Diffie-Hellman (ECDH) key exchange protocol and a secure conference key mechanism with direct user confirmation combined with the back-end cloud platform Map/Reduce is proposed to ensure the identities of Mappers and Reducers that participate in the cloud operation, avoid malicious participants to modify the transmission information, so as to achieve secure Map/Reduce operations, and improves vehicle and passenger traffic safety.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于区块链和map/reduce数据传输方案的安全云车联网
过去几年,由于车联网和云计算的普及,车辆之间的群信息交换已不再遥不可及。通过WiFi/5G无线通信协议,车辆可以即时向后端或组队行驶的车辆传递交通状况和事故,减少交通拥堵和事故。此外,车辆将实时路况传输到云车辆管理中心,云车辆管理中心也可以共享实时路况,提高行人和驾驶员的道路效率。然而,信息在开放环境下的传输,引发了个人信息安全问题。现有的车联网提供的安全机制大多需要集中的认证服务器,增加了证书管理和计算的负担。此外,道路侧单元作为分散的认证中心,可能会被黑客攻击或修改,但出于个人隐私和安全考虑,车对车之间不愿意相互共享信息。因此,本研究通过区块链进行,以确保车载信息传输的安全性。结合后端云平台Map/Reduce,提出椭圆曲线Diffie-Hellman (ECDH)密钥交换协议和用户直接确认的安全会议密钥机制,确保参与云操作的mapers和Reducers的身份,避免恶意参与者修改传输信息,从而实现安全的Map/Reduce操作,提高车辆和乘客的交通安全性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
Computer Science and Information Systems
Computer Science and Information Systems COMPUTER SCIENCE, INFORMATION SYSTEMS-COMPUTER SCIENCE, SOFTWARE ENGINEERING
CiteScore
2.30
自引率
21.40%
发文量
76
审稿时长
7.5 months
期刊介绍: About the journal Home page Contact information Aims and scope Indexing information Editorial policies ComSIS consortium Journal boards Managing board For authors Information for contributors Paper submission Article submission through OJS Copyright transfer form Download section For readers Forthcoming articles Current issue Archive Subscription For reviewers View and review submissions News Journal''s Facebook page Call for special issue New issue notification Aims and scope Computer Science and Information Systems (ComSIS) is an international refereed journal, published in Serbia. The objective of ComSIS is to communicate important research and development results in the areas of computer science, software engineering, and information systems.
期刊最新文献
Reviewer Acknowledgements for Computer and Information Science, Vol. 16, No. 3 Drawbacks of Traditional Environmental Monitoring Systems Improving the Classification Ability of Delegating Classifiers Using Different Supervised Machine Learning Algorithms Reinforcement learning - based adaptation and scheduling methods for multi-source DASH On the Convergence of Hypergeometric to Binomial Distributions
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1