Journal of Systems Architecture最新文献

筛选
英文 中文
RAFL: Reputation-Aware Federated Learning with hierarchical aggregation in LEO satellite networks 低轨道卫星网络中具有层次聚合的声誉感知联邦学习
IF 4.1 2区 计算机科学
Journal of Systems Architecture Pub Date : 2025-08-30 DOI: 10.1016/j.sysarc.2025.103565
Xiuli Xu, Yanping Li, Laifeng Lu
{"title":"RAFL: Reputation-Aware Federated Learning with hierarchical aggregation in LEO satellite networks","authors":"Xiuli Xu,&nbsp;Yanping Li,&nbsp;Laifeng Lu","doi":"10.1016/j.sysarc.2025.103565","DOIUrl":"10.1016/j.sysarc.2025.103565","url":null,"abstract":"<div><div>The dynamic observation data of the Earth from Low Earth Orbit (LEO) satellites can be used for weather analysis, urban planning, etc. The existing satellite federated learning (FL) schemes have two main drawbacks. First, most of schemes rely on frequent communication between satellites and ground station. Due to the transient and unstable communication links, significant convergence delays are observed. Second, the possibility of unreliable and malicious participants preventing model convergence and degrading performance is not considered. To address the above issues, a secure and efficient FL scheme RAFL for LEO constellations is proposed. RAFL employs aerial networking and hierarchical FL to reduce interactions between satellites and ground station, thereby enhances training efficiency and model performance. A self-adaptive reputation evaluation system is designed that incorporates malicious behavior detection, historical behavior analysis, and performance and contribution assessments of LEO satellites. This system can detect and resist the actions of unreliable and malicious participants, and select appropriate leaders, thereby enhancing the robustness of FL. Extensive experiments show that RAFL not only effectively resists poisoning attacks but also improves the convergence time of FL while maintaining the accuracy of the global model.</div></div>","PeriodicalId":50027,"journal":{"name":"Journal of Systems Architecture","volume":"168 ","pages":"Article 103565"},"PeriodicalIF":4.1,"publicationDate":"2025-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144922448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An authenticated key agreement method for secure big data analytics in next-generation wireless networks-enabled smart farming 一种用于下一代无线网络智能农业安全大数据分析的认证密钥协议方法
IF 4.1 2区 计算机科学
Journal of Systems Architecture Pub Date : 2025-08-29 DOI: 10.1016/j.sysarc.2025.103552
Akshita Patwal , Mohammad Wazid , Jaskaran Singh , Devesh Pratap Singh , Ashok Kumar Das
{"title":"An authenticated key agreement method for secure big data analytics in next-generation wireless networks-enabled smart farming","authors":"Akshita Patwal ,&nbsp;Mohammad Wazid ,&nbsp;Jaskaran Singh ,&nbsp;Devesh Pratap Singh ,&nbsp;Ashok Kumar Das","doi":"10.1016/j.sysarc.2025.103552","DOIUrl":"10.1016/j.sysarc.2025.103552","url":null,"abstract":"<div><div>It is anticipated that next-generation wireless networks will be exceedingly complicated and dynamic. Applications like autonomous vehicles, smart farming, smart healthcare systems and more are all possible uses for them. Smart farming is a form of agricultural management that makes use of contemporary information and communication technologies (ICTs) in order to improve both the amount and quality of the products that are produced. Next-generation wireless networks facilitate smart farming. The primary goals of smart farming are to supply the agricultural industry with the infrastructure that is required to track, monitor, automate, and analyze processes utilizing cutting-edge techniques such as machine learning, big data, cloud computing, and the Internet of Things (IoT). These are some of the technologies that are being utilized in smart farming. Smart farming employs techniques to create varied forecasts. From a descriptive dashboard, such as a mobile app or Web app, the farmers can keep an eye on their crops and make selections based on their findings. However, such a system may be vulnerable to various cyber threats and attacks as the devices and servers exchange their data through an insecure medium (i.e., the Internet). In this study, we present an authenticated key agreement technique for secure big data analytics in next-generation wireless networks-enabled smart farming (in short, AKM-BDSF) to protect the transferred and stored data of smart farming. The detailed security analysis and comparative study reveal that the proposed AKM-BDSF outperforms other existing schemes in terms of essential security and functionality elements. Moreover, AKM-BDSF is demonstrated practically to see the effects on its performance.</div></div>","PeriodicalId":50027,"journal":{"name":"Journal of Systems Architecture","volume":"168 ","pages":"Article 103552"},"PeriodicalIF":4.1,"publicationDate":"2025-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144922449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fast revocable attribute-based encryption with data integrity for Internet of Things 快速可撤销的基于属性的物联网数据完整性加密
IF 4.1 2区 计算机科学
Journal of Systems Architecture Pub Date : 2025-08-28 DOI: 10.1016/j.sysarc.2025.103551
Yongjiao Li , Liang Zhu , Yalin Deng , Qikun Zhang , Zhenlei Wang , Zhu Cao
{"title":"Fast revocable attribute-based encryption with data integrity for Internet of Things","authors":"Yongjiao Li ,&nbsp;Liang Zhu ,&nbsp;Yalin Deng ,&nbsp;Qikun Zhang ,&nbsp;Zhenlei Wang ,&nbsp;Zhu Cao","doi":"10.1016/j.sysarc.2025.103551","DOIUrl":"10.1016/j.sysarc.2025.103551","url":null,"abstract":"<div><div>Efficient and secure revocable attribute-based encryption (RABE) is vital for ensuring flexible and fine-grained access control and data sharing in cloud storage and outsourced data environments within the Internet of Things (IoT). However, current RABE schemes often struggle to achieve an optimal balance between efficiency, security, dynamic scalability, and other important features, which hampers their practical application. To overcome these limitations, we propose a fast RABE scheme with data integrity for IoT that achieves adaptive security with multiple challenge ciphertexts. Our scheme supports the revocation of authorized users and transfers the computationally heavy revocation processes to the cloud, thereby easing the computational burden on IoT devices. Moreover, it consistently guarantees the integrity and correctness of data. We have demonstrated its adaptive security within the defined security model with multiple challenge ciphertexts and optimized its performance. Experimental results indicate that our scheme provides better performance than existing solutions. Under the same access policy, our scheme reduces computational consumption by 7 to 9 times compared to previous schemes.</div></div>","PeriodicalId":50027,"journal":{"name":"Journal of Systems Architecture","volume":"168 ","pages":"Article 103551"},"PeriodicalIF":4.1,"publicationDate":"2025-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144931858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-factor single-registration authentication and key exchange protocol for IIoT 工业物联网多因素单注册认证和密钥交换协议
IF 4.1 2区 计算机科学
Journal of Systems Architecture Pub Date : 2025-08-28 DOI: 10.1016/j.sysarc.2025.103542
Hao Xiao , Xiaomin Zhao , Qi Jiang , Zengwen Yu , Xindi Ma , Xinghua Li
{"title":"Multi-factor single-registration authentication and key exchange protocol for IIoT","authors":"Hao Xiao ,&nbsp;Xiaomin Zhao ,&nbsp;Qi Jiang ,&nbsp;Zengwen Yu ,&nbsp;Xindi Ma ,&nbsp;Xinghua Li","doi":"10.1016/j.sysarc.2025.103542","DOIUrl":"10.1016/j.sysarc.2025.103542","url":null,"abstract":"<div><div>Industrial Internet of Things (IIoT), an integral part of smart society, delivers new and diverse services through interconnected platforms and devices. Authentication is a fundamental pillar to ensure trust of users and secure access to digital services in IIoT. In this paper, we propose a single registration authentication and key exchange (SRAKE) protocol based on SM9 identity-based signature (SM9-IBS) to simplify the authentication processes among service providers. In SRAKE, each user and service provider first acquires a private key for SM9-IBS generated by the key generation center (KGC). Then identity-based oblivious pseudorandom function (IBOPRF) is employed to protect storage and retrieval of private keys of users, in which a unique value is generated by associating user identity, password, and biometrics with the secret key of KGC. Therefore, users can only securely access legitimate service providers in a single registration by presenting both passwords and biometrics. The provable security analysis and performance comparison demonstrate that the protocol is provably secure and achieves more comprehensive security goals with an acceptable computational and communication performance. NS-3 simulation results further confirm that SRAKE is suitable for IIoT environments.</div></div>","PeriodicalId":50027,"journal":{"name":"Journal of Systems Architecture","volume":"168 ","pages":"Article 103542"},"PeriodicalIF":4.1,"publicationDate":"2025-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144925660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ORQ-ViT: Outlier resilient Post Training Quantization for vision transformers via outlier decomposition ORQ-ViT:基于离群值分解的视觉变压器训练后离群值弹性量化
IF 4.1 2区 计算机科学
Journal of Systems Architecture Pub Date : 2025-08-27 DOI: 10.1016/j.sysarc.2025.103530
Xinyu He , Ye Lu , Hang Liu , Cheng Gong , Wenxuan He
{"title":"ORQ-ViT: Outlier resilient Post Training Quantization for vision transformers via outlier decomposition","authors":"Xinyu He ,&nbsp;Ye Lu ,&nbsp;Hang Liu ,&nbsp;Cheng Gong ,&nbsp;Wenxuan He","doi":"10.1016/j.sysarc.2025.103530","DOIUrl":"10.1016/j.sysarc.2025.103530","url":null,"abstract":"<div><div>Post-training quantization (PTQ) is critical for deploying Vision Transformers (ViTs) on resource-constrained devices. However, outliers clustered in activation channels tend to dominate the quantization range and induce significant accuracy degradation. To address the outlier challenge, this paper proposes an outlier resilient PTQ method through outlier decomposition, namely ORQ-ViT. Its core idea is to decompose outliers clustered in outlier channels into isolated outliers, so that they can be easily excluded, thus alleviating their adverse impact. Specifically, we decompose activations along the patch token dimension. Since there are very few outlier channels, decomposed rows after outlier decomposition usually cover several isolated outliers, which can be easily identified and filtered. We further design an adaptive quantization range determination strategy during quantization parameters initialization to prevent outliers from serving as boundary values of the quantization range. ORQ-ViT can improve quantization levels utilization to generate activations with higher quantization resolution, thereby achieving higher accuracy. Additionally, ORQ-ViT supports pure integer matrix multiplications to ensure the inference efficiency of quantized ViTs on edge hardware. Extensive experiments demonstrate that our method achieves state-of-the-art (SOTA) accuracy across various ViT variants under multiple low bit-width scenarios. For image classification, the top-1 accuracy of ORQ-ViT outperforms that of the SOTA methods by an average of 2.26% at W4A4. Even for object detection and instance segmentation, ORQ-ViT also delivers highly competitive results. We also evaluate the inference efficiency of pure integer matrix multiplications and the results show that our method can achieve up to 2.1× speedup.</div></div>","PeriodicalId":50027,"journal":{"name":"Journal of Systems Architecture","volume":"168 ","pages":"Article 103530"},"PeriodicalIF":4.1,"publicationDate":"2025-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144908217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
VFBoost-MO: Scable vertical federated gradient boosting decision tree for multi-class problem VFBoost-MO:多类问题的可缩放垂直联合梯度提升决策树
IF 4.1 2区 计算机科学
Journal of Systems Architecture Pub Date : 2025-08-26 DOI: 10.1016/j.sysarc.2025.103545
Bo Yu, Huajie Shen, Yuhan Yang, Qian Xu, Wei He
{"title":"VFBoost-MO: Scable vertical federated gradient boosting decision tree for multi-class problem","authors":"Bo Yu,&nbsp;Huajie Shen,&nbsp;Yuhan Yang,&nbsp;Qian Xu,&nbsp;Wei He","doi":"10.1016/j.sysarc.2025.103545","DOIUrl":"10.1016/j.sysarc.2025.103545","url":null,"abstract":"<div><div>As a key technology to protect data privacy, vertical federated learning has recently been developed fast in both academia and industry. Notable works such as secureboost and secureboost+, which are all additive ensemble models that use a gradient boosting tree have been widely used in many applications. This paper proposes VFBoost-MO, a novel vertical federated learning (VFL) framework for multi-class classification using gradient boosting decision trees (GBDTs). Existing VFL methods for GBDTs are primarily limited to binary classification, while multi-class methods suffer from high computational and communication complexity. VFBoost-MO addresses these challenges by introducing a class-pair selection algorithm that constructs a single vector tree per iteration, significantly reducing complexity. Additionally, the framework employs local differential privacy (LDP) to protect data privacy without relying on computationally expensive encryption techniques. We present a theoretical analysis and experimental evaluation on eight public datasets demonstrating that VFBoost-MO achieves comparable accuracy to state-of-the-art methods while offering <em>2-3x</em> performance improvement in training speed and convergence rate.</div></div>","PeriodicalId":50027,"journal":{"name":"Journal of Systems Architecture","volume":"168 ","pages":"Article 103545"},"PeriodicalIF":4.1,"publicationDate":"2025-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144908215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DSSE-DMVS: A blockchain-based dynamic searchable symmetric encryption supporting multi-keyword queries and data deduplication DSSE-DMVS:基于区块链的动态可搜索对称加密,支持多关键字查询和重复数据删除
IF 4.1 2区 计算机科学
Journal of Systems Architecture Pub Date : 2025-08-26 DOI: 10.1016/j.sysarc.2025.103540
Chunhua Jin , Jiaojiao Li , Youwang Sun , Ling Ji , Xinying Liu , Haiyang Chen , Lei Zhou , Zhonghao Zhai , Hao Zhang , Jian Weng
{"title":"DSSE-DMVS: A blockchain-based dynamic searchable symmetric encryption supporting multi-keyword queries and data deduplication","authors":"Chunhua Jin ,&nbsp;Jiaojiao Li ,&nbsp;Youwang Sun ,&nbsp;Ling Ji ,&nbsp;Xinying Liu ,&nbsp;Haiyang Chen ,&nbsp;Lei Zhou ,&nbsp;Zhonghao Zhai ,&nbsp;Hao Zhang ,&nbsp;Jian Weng","doi":"10.1016/j.sysarc.2025.103540","DOIUrl":"10.1016/j.sysarc.2025.103540","url":null,"abstract":"<div><div>Dynamic Searchable Symmetric Encryption (DSSE) allows users to search for encrypted data and supports dynamic updating of data. In recent years, DSSE has become a research hotspot because it can address privacy and security issues when storing and retrieving encrypted data in cloud environments. However, most of the existing DSSE schemes suffer from inefficiencies in updating data and do not take into account data redundancy due to users misuse. These schemes only support the verification of search result and lack mechanisms to penalize malicious servers as well as ensure fairness to users. To address these issues, we design a blockchain-based dynamic searchable symmetric encryption scheme called DSSE-DMVS. Firstly, we adopt the bitmap as the index data structure to efficiently implement multi-keyword queries and index updates through logical operators AND and XOR. Then, we introduce a data deduplication mechanism to enhance retrieval efficiency and reduce the waste of cloud storage resources. To further penalize malicious servers and ensure fairness for users, we store the actual encrypted files and indexes on the server and blockchain, respectively. Additionally, we use the smart contract to manage the monetary rewards. Formalized safety analysis and experimental results show that DSSE-DMVS is safe and effective in practical applications.</div></div>","PeriodicalId":50027,"journal":{"name":"Journal of Systems Architecture","volume":"168 ","pages":"Article 103540"},"PeriodicalIF":4.1,"publicationDate":"2025-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144908216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SHC-DP: Software–hardware collaborative in-network data placement for hybrid storage systems SHC-DP:用于混合存储系统的软硬件协同网络内数据放置
IF 4.1 2区 计算机科学
Journal of Systems Architecture Pub Date : 2025-08-26 DOI: 10.1016/j.sysarc.2025.103564
Wenjie Wang , Bo Peng , Jianguo Yao , Haibing Guan
{"title":"SHC-DP: Software–hardware collaborative in-network data placement for hybrid storage systems","authors":"Wenjie Wang ,&nbsp;Bo Peng ,&nbsp;Jianguo Yao ,&nbsp;Haibing Guan","doi":"10.1016/j.sysarc.2025.103564","DOIUrl":"10.1016/j.sysarc.2025.103564","url":null,"abstract":"<div><div>Hybrid storage systems increasingly adopt strategic data placement to deliver heterogeneous storage resources at low disk I/O latency for diverse applications. Modern adaptive algorithms with exceptional accuracy, adaptability, and scalability have gradually emerged as one of the mainstream algorithms for data placement. However, existing research predominantly focuses on exploring adaptive data placement algorithms with high placement accuracy, often neglecting the overhead introduced by these algorithms. It significantly compromises the end-to-end latency, a critical factor in determining the quality of service (QoS) for hybrid storage systems. To address this challenge, we introduce SHC-DP, a novel software–hardware collaborative in-network data placement framework. It is proposed to optimize the end-to-end latency for hybrid storage systems by leveraging modern SmartNIC technology. We first analyze the overheads associated with adaptive data placement in detail. Then, a comprehensive hardware/software co-optimization solution is proposed based on the observed insights. It incorporates algorithm acceleration, data transmission and processing optimization, computing and communication task overlapping, and concurrency optimization. Finally, we introduce detailed design and implementation for software/hardware modules and analyze SHC-DP’s performance bounds. Experimental results demonstrate that SHC-DP significantly optimizes end-to-end latency for hybrid storage systems, outperforming the state-of-the-art (SOTA) solution Sibyl by 1.54<span><math><mo>×</mo></math></span> <span><math><mrow><mo>∼</mo><mn>15</mn><mo>.</mo><mn>18</mn><mo>×</mo></mrow></math></span>.</div></div>","PeriodicalId":50027,"journal":{"name":"Journal of Systems Architecture","volume":"168 ","pages":"Article 103564"},"PeriodicalIF":4.1,"publicationDate":"2025-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144916501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hardware/Software Co-design for spike communication optimization: Leveraging neuron-level communication patterns 尖峰通信优化的硬件/软件协同设计:利用神经元级通信模式
IF 4.1 2区 计算机科学
Journal of Systems Architecture Pub Date : 2025-08-25 DOI: 10.1016/j.sysarc.2025.103553
Chao Xiao , Yi Wei , Yuanfeng Luo , Zhijie Yang , Rui Gong , Weixia Xu , Lei Wang
{"title":"Hardware/Software Co-design for spike communication optimization: Leveraging neuron-level communication patterns","authors":"Chao Xiao ,&nbsp;Yi Wei ,&nbsp;Yuanfeng Luo ,&nbsp;Zhijie Yang ,&nbsp;Rui Gong ,&nbsp;Weixia Xu ,&nbsp;Lei Wang","doi":"10.1016/j.sysarc.2025.103553","DOIUrl":"10.1016/j.sysarc.2025.103553","url":null,"abstract":"<div><div>Neuromorphic hardware is specifically designed to accelerate Spiking Neural Network (SNN) computations through multiple computing cores interconnected via network-on-chip (NoC) infrastructure. However, spike communication has emerged as a significant bottleneck, limiting the overall performance of neuromorphic systems. By analyzing the communication characteristics of SNNs, we identify two dominant neuron-level communication patterns: spatially consistent local communication and many-to-same communication. To address these challenges, we present a co-optimization framework comprising (1) at the software level, we leverage the spatially consistent local communication to introduce a novel cross-layer topological sorting algorithm, which improves the initial SNN placement, followed by a lightweight fine-tuning algorithm to further optimize the placement, and (2) at the hardware level, inspired by the many-to-same communication, we introduce a novel spike event merge routing mechanism that consolidates multiple spike events into unified packets, effectively reducing NoC traffic density through packet aggregation. Comprehensive evaluation across six SNN benchmarks demonstrates significant improvements in communication latency and energy consumption.</div></div>","PeriodicalId":50027,"journal":{"name":"Journal of Systems Architecture","volume":"168 ","pages":"Article 103553"},"PeriodicalIF":4.1,"publicationDate":"2025-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144911955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RPC-MPKET: Location-based revocable encryption with ciphertext equality test for multi-user Internet of Vehicles RPC-MPKET:多用户车联网中基于位置的可撤销加密和密文等价性检验
IF 4.1 2区 计算机科学
Journal of Systems Architecture Pub Date : 2025-08-23 DOI: 10.1016/j.sysarc.2025.103554
Pan Yang , Junzuo Lai , Lianguan Huang , Tian Yang , Qiong Huang , Guomin Yang
{"title":"RPC-MPKET: Location-based revocable encryption with ciphertext equality test for multi-user Internet of Vehicles","authors":"Pan Yang ,&nbsp;Junzuo Lai ,&nbsp;Lianguan Huang ,&nbsp;Tian Yang ,&nbsp;Qiong Huang ,&nbsp;Guomin Yang","doi":"10.1016/j.sysarc.2025.103554","DOIUrl":"10.1016/j.sysarc.2025.103554","url":null,"abstract":"<div><div>Internet of Vehicles (IoV) systems can improve urban traffic efficiency. However, cloud-based IoV systems also introduce numerous security challenges. In particular, securely searching IoV’s encrypted sensor data (e.g., traffic flows, GPS coordinates) demands specialized <em>Searchable Encryption (SE)</em> schemes to balance retrievability and security. Therefore, SE has become an important research area. <em>Public Key Encryption with Equality Test (PKEET)</em> offers a simple yet useful mechanism that not only encrypts data, but also allows equality tests on ciphertexts. However, existing multi-user PKEET techniques cannot achieve authorization revocation. Once a cloud server obtains the authorization trapdoor, it can permanently test ciphertext without permission at any time. In this paper, we introduce a new concept of <em>Multi-User Public Key Encryption with Equality Test supporting Revocation in Public Channel (RPC-MPKET)</em> to adapt to cloud-based multi-vehicle IoV environments. The revocation mechanism from identity-based encryption is introduced into our scheme. The time-based private key is updated periodically and supports public channel transmission, reducing the establishment cost while ensuring privacy and security. Our scheme satisfies <em>ciphertext one-wayness under chosen ciphertext attack (OW-CCA)</em> and <em>ciphertext indistinguishability (IND-CCA)</em> against different adversaries in the random oracle model. In terms of efficiency, our scheme achieves encryption, decryption, and testing through the root-finding method of Vandermonde matrices without bilinear pairing operations, enhancing computational efficiency. Finally, we demonstrate its practicality in a cloud-based vehicular network environment through a series of experiments conducted on cloud servers.</div></div>","PeriodicalId":50027,"journal":{"name":"Journal of Systems Architecture","volume":"168 ","pages":"Article 103554"},"PeriodicalIF":4.1,"publicationDate":"2025-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144908214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信