Design of Safety Assurance System of Specific Vehicle Information using ABPRE in the Fog Computing Environment

There would be high demand for technology that monitors illegal activity and detects risk with respect to vehicles on the road in a future urban traffic system, for accident prevention. However, there may be substantial overheads from the massive amount of data that would be required for the surveil...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Tehnički vjesnik 2019-02, Vol.26 (1), p.95-101
Hauptverfasser: Cha, Hyun-Jong, Yang, Ho-Kyung, Kim, Jin-Mook, Song, You-Jin
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:There would be high demand for technology that monitors illegal activity and detects risk with respect to vehicles on the road in a future urban traffic system, for accident prevention. However, there may be substantial overheads from the massive amount of data that would be required for the surveillance system as it would be automatically operated and used, as further advancements are made in sensor network technology and IoT (Internet of Things). In the transportation field, systems were mainly studied to measure the driver's drowsiness or mobile phone use. These systems will collect information from several mobile devices at the same time, resulting in overhead of data. Fog computing reduces the overhead of data because it uses distributed proxy servers. However, security aspects were not considered. Encryption can be done to ensure the privacy of the information on the moving vehicles. However, in order to track a specific vehicle the data of the moving vehicles should be provided decrypted or decrypted by the secondary user. In this paper, to solve security aspects, we provide a new DSS model that utilizes ABPRE (Attribute Based Proxy Re-Encryption). The proposed system encrypts data sensed from moving vehicles. The cipher is configured to re-encrypt quickly at the proxy. The proposed method allows only users with access authority via secondary user's properties to access data with attribute-based re-encryption. Therefore, safety is secured.
ISSN:1330-3651
1848-6339
DOI:10.17559/TV-20170827155412