Back to Search Start Over

Cloud-edge data encryption in the internet of vehicles using Zeckendorf representation

Authors :
Yun Wu
Liangshun Wu
Hengjin Cai
Source :
Journal of Cloud Computing: Advances, Systems and Applications, Vol 12, Iss 1, Pp 1-13 (2023)
Publication Year :
2023
Publisher :
SpringerOpen, 2023.

Abstract

Abstract Cloud-edge data security is a key issue in the internet of vehicles (IoV), as the potential for data breaches increases as more vehicles are connected. As vehicles become smarter and more connected, the risk of unauthorized access to the data generated by the vehicles also increases. Data encryption is a highly effective security measure that is widely used to protect the IoV from malicious actors. By encrypting data, it becomes virtually impossible for unauthorized individuals to access the information. This ensures that only the intended parties can access the data, allowing for secure communication between cloud and edge. Data encryption is a cost-effective and reliable security measure that is essential for any organization that relies on the IoV. The IoV is characterized by the large volume of data that is exchanged between devices in cloud and edge. This necessitates the use of a strong encryption method, such as stream ciphering, which is particularly well-suited to this type of environment. Stream ciphering provides the highest levels of security, making it the ideal choice for securing data transmission in the IoV. Many stream ciphering algorithms use bitwise exclusive or (XOR) to encrypt the data stream, so the core is the generation of a pseudo-random key stream. This paper proves that the probability of the number 1 appearing in the middle part of the Zeckendorf representation is constant, which can be used to generate pseudo-random key stream sequences. The pseudo-random sequence generated by the linear feedback shift register (LSFR) is periodic, and the key sequence will be duplicated. The logistic chaos (LC) sequence is too sensitive to the disturbance of initial value, and its stability is poor. In this paper, our proposed ZPKG (key generator based on Zeckendorf presentation) algorithm solves these two main problems in stream ciphering. The generated key sequence not only has strong randomness, but also is infinitely long, and it is robust to the minor disturbance of the initial value. Graphical Abstract

Details

Language :
English
ISSN :
2192113X
Volume :
12
Issue :
1
Database :
Directory of Open Access Journals
Journal :
Journal of Cloud Computing: Advances, Systems and Applications
Publication Type :
Academic Journal
Accession number :
edsdoj.40d6024b1c2a456489b729711b55de6b
Document Type :
article
Full Text :
https://doi.org/10.1186/s13677-023-00417-7