An Attribute-Based Trust Negotiation Protocol for D2D Communication in Smart City Balancing Trust and Privacy

Smart city is an urban development vision to integrate multiple information and communication technology (ICT) solutions in a secure fashion to manage a city's assets. It includes E-home, E-office, E-health, E-traffic and so on. All of these depend on the data collecting from multifarious devic...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Journal of Information Science and Engineering 2017-07, Vol.33 (4), p.1007-1023
Hauptverfasser: 郭晶晶(JINGJING GUO), 马建峰(JIANFENG MA), 李兴华(XINGHUA LI), 张俊伟(JUNWEI ZHANG), 张涛(TAO ZHANG)
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:Smart city is an urban development vision to integrate multiple information and communication technology (ICT) solutions in a secure fashion to manage a city's assets. It includes E-home, E-office, E-health, E-traffic and so on. All of these depend on the data collecting from multifarious devices and the following data processing and analyzing. So, communication between various devices (such as smartphone and so on) will be very frequent. In such an environment, the trust relationship between devices will be an important premise to guarantee an interaction can be carried on successfully. In this paper, we propose an attribute-based trust negotiation scheme for communication between devices (D2D communication) in a smart city. In this paper, we modeled the trust negotiation process as a 0/1 knapsack problem. We adopt the secure two-party computation technique based on the homomorphic encryption to guarantee its security. The proposed protocol can make sure that a device satisfies its counterparty's access policy while disclosing minimal privacy due to the credential disclosing. The theoretical analysis shows that our protocol is complete and secure in the semi-honest environment. Furthermore, there is no disclosure of credentials before both participants can ensure a success negotiation strategy exists. Moreover, devices cannot obtain the policies of their counterparty in the negotiation process. Finally, we did some simulations to analyze the computation cost of our protocol under different credential scales and resource access thresholds.
ISSN:1016-2364
DOI:10.6688/JISE.2017.33.4.10