Open Access
ARTICLE
Trusted Certified Auditor Using Cryptography for Secure Data Outsourcing and Privacy Preservation in Fog-Enabled VANETs
School of Computer Science and Engineering, VIT-AP University, Amaravati, Andhra Pradesh, 522237, India
* Corresponding Author: K. Srinivasa Reddy. Email:
(This article belongs to the Special Issue: Security, Privacy, and Robustness for Trustworthy AI Systems)
Computers, Materials & Continua 2024, 79(2), 3089-3110. https://doi.org/10.32604/cmc.2024.048133
Received 28 November 2023; Accepted 22 March 2024; Issue published 15 May 2024
Abstract
With the recent technological developments, massive vehicular ad hoc networks (VANETs) have been established, enabling numerous vehicles and their respective Road Side Unit (RSU) components to communicate with one another. The best way to enhance traffic flow for vehicles and traffic management departments is to share the data they receive. There needs to be more protection for the VANET systems. An effective and safe method of outsourcing is suggested, which reduces computation costs by achieving data security using a homomorphic mapping based on the conjugate operation of matrices. This research proposes a VANET-based data outsourcing system to fix the issues. To keep data outsourcing secure, the suggested model takes cryptography models into account. Fog will keep the generated keys for the purpose of vehicle authentication. For controlling and overseeing the outsourced data while preserving privacy, the suggested approach considers the Trusted Certified Auditor (TCA). Using the secret key, TCA can identify the genuine identity of VANETs when harmful messages are detected. The proposed model develops a TCA-based unique static vehicle labeling system using cryptography (TCA-USVLC) for secure data outsourcing and privacy preservation in VANETs. The proposed model calculates the trust of vehicles in 16 ms for an average of 180 vehicles and achieves 98.6% accuracy for data encryption to provide security. The proposed model achieved 98.5% accuracy in data outsourcing and 98.6% accuracy in privacy preservation in fog-enabled VANETs. Elliptical curve cryptography models can be applied in the future for better encryption and decryption rates with lightweight cryptography operations.Keywords
Cite This Article
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.