2020
DOI: 10.3390/s20020514
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Privacy-Preserving Data Sharing for Fog-Assisted Vehicular Sensor Networks

Abstract: Vehicular sensor networks (VSNs) have emerged as a paradigm for improving traffic safety in urban cities. However, there are still several issues with VSNs. Vehicles equipped with sensing devices usually upload large amounts of data reports to a remote cloud center for processing and analyzing, causing heavy computation and communication costs. Additionally, to choose an optimal route, it is required for vehicles to query the remote cloud center to obtain road conditions of the potential moving route, leading … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
2
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(4 citation statements)
references
References 39 publications
0
2
0
Order By: Relevance
“…It can be seen from Figure 5 that the educational resource sharing model is a hierarchical structure, including concept sharing, technology sharing, and content sharing. Among Security and Communication Networks them, concept sharing is realized by creating an educational resource ontology, while RDF model achieves technology sharing; element data mapping is implemented together with XML [31]. In Figure 5, it can be seen that the RDF and metadata layer have both syntactic and semantic interoperability functions.…”
Section: Educational Resource Sharing Modelmentioning
confidence: 99%
“…It can be seen from Figure 5 that the educational resource sharing model is a hierarchical structure, including concept sharing, technology sharing, and content sharing. Among Security and Communication Networks them, concept sharing is realized by creating an educational resource ontology, while RDF model achieves technology sharing; element data mapping is implemented together with XML [31]. In Figure 5, it can be seen that the RDF and metadata layer have both syntactic and semantic interoperability functions.…”
Section: Educational Resource Sharing Modelmentioning
confidence: 99%
“…It is not linked to data and infrastructure characteristics [192] Combining a super-increasing sequence and modified oblivious transfer Privacy, secure data sharing It efficiently provides secure data sharing and anonymity It is centralized [193] Encryption outsourcing and fine-grained access control Secure data sharing, access control…”
Section: Ref Methods Characteristics Provided Security Requirementmentioning
confidence: 99%
“…Ming et al [192] presented an efficient technique providing data privacy protection and secure data sharing, which can be deployed to protect devices that use fog computing services and resources. The proposed approach adopts an enhanced inadvertent transfer algorithm and utilizes edge low-latency services to enable vehicles to query the optimal driving route while providing these vehicles with location privacy protection and anonymity.…”
Section: Perception Layer Securitymentioning
confidence: 99%
“…In the contemporary mobile internet era, individuals increasingly depend on mobile devices and applications for activities such as information access, social networking, and online shopping, all facilitated by the collection and utilization of location data. Furthermore, the advancements in big data, artificial intelligence, and related technologies enable the utilization of users’ location data for purposes like optimization of traffic flows [ 1 ] and advertising [ 2 ], as well as intelligent medical systems [ 3 ]. However, collecting location data also raises many security and privacy concerns.…”
Section: Introductionmentioning
confidence: 99%