Advanced Search
Turn off MathJax
Article Contents
YU Huifang, WANG Qinggui, WANG Zihao. Edge-Cloud Collaborative Searchable Attribute-Based Signcryption Approach for Internet of Vehicles[J]. Journal of Electronics & Information Technology. doi: 10.11999/JEIT250750
Citation: YU Huifang, WANG Qinggui, WANG Zihao. Edge-Cloud Collaborative Searchable Attribute-Based Signcryption Approach for Internet of Vehicles[J]. Journal of Electronics & Information Technology. doi: 10.11999/JEIT250750

Edge-Cloud Collaborative Searchable Attribute-Based Signcryption Approach for Internet of Vehicles

doi: 10.11999/JEIT250750 cstr: 32379.14.JEIT250750
Funds:  The Natural Science Basis Research Projects of Shannxi Province (2025JC-YBMS-652, 2025 JC-YBMS-676), The Open Project of the State Key Laboratory of Blockchain and Data Security, Zhejiang University (A2510)
  • Received Date: 2025-08-07
  • Accepted Date: 2025-12-12
  • Rev Recd Date: 2025-10-31
  • Available Online: 2025-12-19
  •   Objective   The dynamic and open environment of the Internet of Vehicles (IoV) poses substantial challenges to data security and real-time performance. Large-scale data interactions are vulnerable to eavesdropping, tampering, forgery, and replay attacks. Conventional cloud computing architectures exhibit inherent latency and cannot satisfy millisecond-level real-time requirements in IoV applications, which results in inefficient data transmission and an increased risk of traffic accidents. Therefore, balancing data security and real-time performance represents a critical bottleneck for large-scale IoV deployment.  Methods   An edge-cloud collaborative searchable attribute-based signcryption method is proposed for IoV applications. A multi-layer architecture is constructed, consisting of cloud servers, edge servers, and in-vehicle terminal devices. Access control is enforced through a hybrid key-policy and ciphertext-policy mechanism derived from attribute-based signcryption and a Linear Secret Sharing Scheme (LSSS). To reduce local decryption overhead, bilinear pairing operations are outsourced to edge nodes. SM9 is adopted for trapdoor generation and signature authentication. The proposed method provides data confidentiality, signature unforgeability, and trapdoor unforgeability.  Results and Discussions   The proposed method demonstrates superior performance in an IoV edge-cloud collaborative architecture for searchable attribute-based signcryption (Tables 1 and 4). Functional characteristics are summarized in (Table 1). (Fig. 2) illustrates the variation in total computation time as the number of attributes increases. Although the total time increases slightly, the growth rate remains low. By offloading computation-intensive tasks to edge nodes, the local computational burden on user terminals is substantially reduced. This optimization is quantified by an outsourcing efficiency exceeding 96% (Table 4, Fig. 5). Instantaneous retrieval is achieved by reducing the search complexity to O(1) through a hash-based index (Fig. 4). End-to-end search latency is maintained within an acceptable range for IoV applications (Table 6), which confirms suitability for real-time data access. As shown in (Fig. 3), with an increasing number of attributes, the ciphertext size variation of the proposed method remains the smallest among the compared schemes.  Conclusions   The proposed method achieves fine-grained access control, data confidentiality, data integrity, and unforgeability, while maintaining advantages in computational and communication efficiency. Through a computation offloading mechanism, the method effectively addresses resource constraints of on-board devices in dynamic, resource-sensitive, and real-time IoV environments.
  • loading
  • [1]
    LIU Jianhang, XUE Kunlei, MIAO Qinghai, et al. MCVCO: Multi-MEC cooperative vehicular computation offloading[J]. IEEE Transactions on Intelligent Vehicles, 2024, 9(1): 813–826. doi: 10.1109/TIV.2023.3299381.
    [2]
    HADDAJI A, AYED S, and CHAARI FOURATI L. IoV security and privacy survey: Issues, countermeasures, and challenges[J]. The Journal of Supercomputing, 2024, 80(15): 23018–23082. doi: 10.1007/s11227-024-06269-5.
    [3]
    TANG Chaogang, CHEN Wei, ZHU Chunsheng, et al. When cache meets vehicular edge computing: Architecture, key issues, and challenges[J]. IEEE Wireless Communications, 2022, 29(4): 56–62. doi: 10.1109/MWC.202.2100159.
    [4]
    QUAN Haoyu, ZHANG Qingmiao, and ZHAO Junhui. Federated learning assisted intelligent IoV mobile edge computing[J]. IEEE Transactions on Green Communications and Networking, 2025, 9(1): 228–241. doi: 10.1109/TGCN.2024.3421357.
    [5]
    DAMSGAARD H J, OMETOV A, and NURMI J. Approximation opportunities in edge computing hardware: A systematic literature review[J]. ACM Computing Surveys, 2023, 55(12): 252. doi: 10.1145/3572772.
    [6]
    董裕民, 张静, 谢昌佐, 等. 云边端架构下边缘智能计算关键问题综述: 计算优化与计算卸载[J]. 电子与信息学报, 2024, 46(3): 765–776. doi: 10.11999/JEIT230390.

    DONG Yumin, ZHANG Jing, XIE Changzuo, et al. A survey of key issues in edge intelligent computing under cloud-edge-terminal architecture: Computing optimization and computing offloading[J]. Journal of Electronics & Information Technology, 2024, 46(3): 765–776. doi: 10.11999/JEIT230390.
    [7]
    DENG Ningzhi, DENG Shaojiang, HU Chunqiang, et al. An efficient revocable attribute-based signcryption scheme with outsourced unsigncryption in cloud computing[J]. IEEE Access, 2020, 8: 42805–42815. doi: 10.1109/ACCESS.2019.2963233.
    [8]
    YU Huifang and BAI Xiaoping. Identity-based searchable attribute signcryption in lattice for a blockchain-based medical system[J]. Frontiers of Information Technology & Electronic Engineering, 2024, 25(3): 461–471. doi: 10.1631/FITEE.2300248.
    [9]
    牛淑芬, 王卫芳, 董润园, 等. 云边协同下支持等值测试的属性基广播签密方案[J]. 计算机科学与探索, 2025, 19(8): 2241–2250. doi: 10.3778/j.issn.1673-9418.2410023.

    NIU Shufen, WANG Weifang, DONG Runyuan, et al. Attribute-based broadcast signcryption scheme with equivalence testing support under cloud-edge collaboration[J]. Journal of Frontiers of Computer Science and Technology, 2025, 19(8): 2241–2250. doi: 10.3778/j.issn.1673-9418.2410023.
    [10]
    牛淑芬, 周思玮, 吕锐曦, 等. 医疗社交网络中基于云计算的属性基签密方案[J]. 电子与信息学报, 2023, 45(3): 884–893. doi: 10.11999/JEIT220070.

    NIU Shufen, ZHOU Siwei, LÜ Ruixi, et al. Attribute-base signcryption scheme based on cloud computing in mobile medical social network[J]. Journal of Electronics & Information Technology, 2023, 45(3): 884–893. doi: 10.11999/JEIT220070.
    [11]
    ELTAYIEB N, ELHABOB R, HASSAN A, et al. A blockchain-based attribute-based signcryption scheme to secure data sharing in the cloud[J]. Journal of Systems Architecture, 2020, 102: 101653. doi: 10.1016/j.sysarc.2019.101653.
    [12]
    万云飞, 彭长根, 谭伟杰, 等. 基于国密SM9的边云协同属性基签密方案[J]. 信息安全研究, 2025, 11(2): 115–121. doi: 10.12379/j.issn.2096-1057.2025.02.03.

    WAN Yunfei, PENG Changgen, TAN Weijie, et al. Edge cloud collaborative attribute-based signcryption scheme based on state secret SM9[J]. Journal of Information Security Research, 2025, 11(2): 115–121. doi: 10.12379/j.issn.2096-1057.2025.02.03.
    [13]
    王惠, 王峥. 工业物联网中基于区块链的属性基签密方案[J]. 计算机工程与设计, 2024, 45(10): 2888–2896. doi: 10.16208/j.issn1000-7024.2024.10.002.

    WANG Hui and WANG Zheng. Attribute based signcryption scheme based on blockchain in industrial internet of things[J]. Computer Engineering and Design, 2024, 45(10): 2888–2896. doi: 10.16208/j.issn1000-7024.2024.10.002.
    [14]
    赖建昌, 黄欣沂, 何德彪, 等. 国密SM9数字签名和密钥封装算法的安全性分析[J]. 中国科学: 信息科学, 2021, 51(11): 1900–1913. doi: 10.1360/SSI-2021-0049.

    LAI Jianchang, HUANG Xinyi, HE Debiao, et al. Security analysis of SM9 digital signature and key encapsulation[J]. Scientia Sinica Informationis, 2021, 51(11): 1900–1913. doi: 10.1360/SSI-2021-0049.
    [15]
    QIAO Zirui, CAO Lei, ZHU Yasi, et al. DADD: Direct authentication with vehicles from different domains[J]. IEEE Transactions on Intelligent Transportation Systems, 2025, 26(10): 16811–16825. doi: 10.1109/TITS.2025.3575535.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(5)  / Tables(5)

    Article Metrics

    Article views (97) PDF downloads(13) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return