Advanced Search
Turn off MathJax
Article Contents
YU Huifang, WANG Qinggui, WANG Zihao. Edge-Cloud Collaborative Searchable Attribute-Based Signcryption Approach for Internet of Vehicles[J]. Journal of Electronics & Information Technology. doi: 10.11999/JEIT250750
Citation: YU Huifang, WANG Qinggui, WANG Zihao. Edge-Cloud Collaborative Searchable Attribute-Based Signcryption Approach for Internet of Vehicles[J]. Journal of Electronics & Information Technology. doi: 10.11999/JEIT250750

Edge-Cloud Collaborative Searchable Attribute-Based Signcryption Approach for Internet of Vehicles

doi: 10.11999/JEIT250750 cstr: 32379.14.JEIT250750
Funds:  The Natural Science Basis Research Projects of Shannxi Province (2025JC-YBMS-652, 2025 JC-YBMS-676), The Open Project of the State Key Laboratory of Blockchain and Data Security, Zhejiang University (A2510)
  • Received Date: 2025-08-07
  • Accepted Date: 2025-12-12
  • Rev Recd Date: 2025-10-31
  • Available Online: 2025-12-19
  •   Objective   Dynamic and open environment of IoV brings the challenges for data security and real-time performance. Massive data interactions are vulnerable to malicious eavesdropping, tampering, forgery and replay attacks. Traditional cloud computing has inherent high latency and fails to meet millisecond-level real-time IoV demands, this leads to inefficient data transmission and potential traffic accident. Balancing of data security and real-time performance is critical bottleneck for large-scale deployment of IoV.  Methods   Edge-cloud collaborative searchable attribute-based signcryption method is proposed for IoV, it establishes multi-layer architecture including the cloud servers, edge servers and in-vehicle terminal devices. Access control is enforced by hybrid key and ciphertext policy from attribute-based signcryption and LSSS. To mitigate local decryption burden, bilinear operations are outsourced to edge nodes. SM9 is employed for trapdoor generation and signature authentication. Proposed method has the confidentiality, signature unforgeability and trapdoor unforgeability.  Results and Discussions   Our method has the superiority in IoV edge-cloud collaborative architecture for searchable attribute-based signcryption (Tables 1 and 4). Functional characteristics are in Table 1. Figure 2 shows the change trend of total time as the number of attributes increases; total time of our method increases slightly but the growth rate is very slow; for effective outsourcing of intensive computing tasks to edge nodes, our method reduces local computing burden on user terminals. This calculation optimization is quantified by OE exceeding 96% (Table 4, Fig.5). Our method achieves an instantaneous retrieval capability by optimizing the search complexity to O(1) (Fig.4) using hash index. E2E search latency is controlled to acceptable level in IoV applications (Table 6), verifying its applicability for real-time data access. Known from Figure 3, with the increase of the number of attributes, the variation range of ciphertext size of our method is the smallest.  Conclusions   Our method achieves fine-grained access control, data confidentiality, integrity, and unforgeability, and it exhibits the advantages in computation and communication efficiency. By computation offloading mechanism, our method effectively addresses the resource constraints of on-board devices for dynamic, resource-sensitive and real-time IoV environments.
  • loading
  • [1]
    LIU Jianhang, XUE Kunlei, MIAO Qinghai, et al. MCVCO: Multi-MEC cooperative vehicular computation offloading[J]. IEEE Transactions on Intelligent Vehicles, 2024, 9(1): 813–826. doi: 10.1109/TIV.2023.3299381.
    [2]
    HADDAJI A, AYED S, and CHAARI FOURATI L. IoV security and privacy survey: Issues, countermeasures, and challenges[J]. The Journal of Supercomputing, 2024, 80(15): 23018–23082. doi: 10.1007/s11227-024-06269-5.
    [3]
    TANG Chaogang, CHEN Wei, ZHU Chunsheng, et al. When cache meets vehicular edge computing: Architecture, key issues, and challenges[J]. IEEE Wireless Communications, 2022, 29(4): 56–62. doi: 10.1109/MWC.202.2100159.
    [4]
    QUAN Haoyu, ZHANG Qingmiao, and ZHAO Junhui. Federated learning assisted intelligent IoV mobile edge computing[J]. IEEE Transactions on Green Communications and Networking, 2025, 9(1): 228–241. doi: 10.1109/TGCN.2024.3421357.
    [5]
    DAMSGAARD H J, OMETOV A, and NURMI J. Approximation opportunities in edge computing hardware: A systematic literature review[J]. ACM Computing Surveys, 2023, 55(12): 252. doi: 10.1145/3572772.
    [6]
    董裕民, 张静, 谢昌佐, 等. 云边端架构下边缘智能计算关键问题综述: 计算优化与计算卸载[J]. 电子与信息学报, 2024, 46(3): 765–776. doi: 10.11999/JEIT230390.

    DONG Yumin, ZHANG Jing, XIE Changzuo, et al. A survey of key issues in edge intelligent computing under cloud-edge-terminal architecture: Computing optimization and computing offloading[J]. Journal of Electronics & Information Technology, 2024, 46(3): 765–776. doi: 10.11999/JEIT230390.
    [7]
    DENG Ningzhi, DENG Shaojiang, HU Chunqiang, et al. An efficient revocable attribute-based signcryption scheme with outsourced unsigncryption in cloud computing[J]. IEEE Access, 2020, 8: 42805–42815. doi: 10.1109/ACCESS.2019.2963233.
    [8]
    YU Huifang and BAI Xiaoping. Identity-based searchable attribute signcryption in lattice for a blockchain-based medical system[J]. Frontiers of Information Technology & Electronic Engineering, 2024, 25(3): 461–471. doi: 10.1631/FITEE.2300248.
    [9]
    牛淑芬, 王卫芳, 董润园, 等. 云边协同下支持等值测试的属性基广播签密方案[J]. 计算机科学与探索, 2025, 19(8): 2241–2250. doi: 10.3778/j.issn.1673-9418.2410023.

    NIU Shufen, WANG Weifang, DONG Runyuan, et al. Attribute-based broadcast signcryption scheme with equivalence testing support under cloud-edge collaboration[J]. Journal of Frontiers of Computer Science and Technology, 2025, 19(8): 2241–2250. doi: 10.3778/j.issn.1673-9418.2410023.
    [10]
    牛淑芬, 周思玮, 吕锐曦, 等. 医疗社交网络中基于云计算的属性基签密方案[J]. 电子与信息学报, 2023, 45(3): 884–893. doi: 10.11999/JEIT220070.

    NIU Shufen, ZHOU Siwei, LÜ Ruixi, et al. Attribute-base signcryption scheme based on cloud computing in mobile medical social network[J]. Journal of Electronics & Information Technology, 2023, 45(3): 884–893. doi: 10.11999/JEIT220070.
    [11]
    ELTAYIEB N, ELHABOB R, HASSAN A, et al. A blockchain-based attribute-based signcryption scheme to secure data sharing in the cloud[J]. Journal of Systems Architecture, 2020, 102: 101653. doi: 10.1016/j.sysarc.2019.101653.
    [12]
    万云飞, 彭长根, 谭伟杰, 等. 基于国密SM9的边云协同属性基签密方案[J]. 信息安全研究, 2025, 11(2): 115–121. doi: 10.12379/j.issn.2096-1057.2025.02.03.

    WAN Yunfei, PENG Changgen, TAN Weijie, et al. Edge cloud collaborative attribute-based signcryption scheme based on state secret SM9[J]. Journal of Information Security Research, 2025, 11(2): 115–121. doi: 10.12379/j.issn.2096-1057.2025.02.03.
    [13]
    王惠, 王峥. 工业物联网中基于区块链的属性基签密方案[J]. 计算机工程与设计, 2024, 45(10): 2888–2896. doi: 10.16208/j.issn1000-7024.2024.10.002.

    WANG Hui and WANG Zheng. Attribute based signcryption scheme based on blockchain in industrial internet of things[J]. Computer Engineering and Design, 2024, 45(10): 2888–2896. doi: 10.16208/j.issn1000-7024.2024.10.002.
    [14]
    赖建昌, 黄欣沂, 何德彪, 等. 国密SM9数字签名和密钥封装算法的安全性分析[J]. 中国科学: 信息科学, 2021, 51(11): 1900–1913. doi: 10.1360/SSI-2021-0049.

    LAI Jianchang, HUANG Xinyi, HE Debiao, et al. Security analysis of SM9 digital signature and key encapsulation[J]. Scientia Sinica Informationis, 2021, 51(11): 1900–1913. doi: 10.1360/SSI-2021-0049.
    [15]
    QIAO Zirui, CAO Lei, ZHU Yasi, et al. DADD: Direct authentication with vehicles from different domains[J]. IEEE Transactions on Intelligent Transportation Systems, 2025, 26(10): 16811–16825. doi: 10.1109/TITS.2025.3575535.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(5)  / Tables(5)

    Article Metrics

    Article views (60) PDF downloads(10) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return