{"id":"https://openalex.org/W2904379567","doi":"https://doi.org/10.1109/tifs.2018.2885277","title":"Privacy-Preserving Cloud-Based Road Condition Monitoring With Source Authentication in VANETs","display_name":"Privacy-Preserving Cloud-Based Road Condition Monitoring With Source Authentication in VANETs","publication_year":2018,"publication_date":"2018-12-06","ids":{"openalex":"https://openalex.org/W2904379567","doi":"https://doi.org/10.1109/tifs.2018.2885277","mag":"2904379567"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2018.2885277","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2018.2885277","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101925904","display_name":"Yujue Wang","orcid":"https://orcid.org/0000-0002-6759-6094"},"institutions":[{"id":"https://openalex.org/I5343935","display_name":"Guilin University of Electronic Technology","ror":"https://ror.org/05arjae42","country_code":"CN","type":"education","lineage":["https://openalex.org/I5343935"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yujue Wang","raw_affiliation_strings":["Guangxi Key Laboratory of Cryptography and Information Security, School of Computer Science and Information Security, Guilin University of Electronic Technology, Guilin, China"],"affiliations":[{"raw_affiliation_string":"Guangxi Key Laboratory of Cryptography and Information Security, School of Computer Science and Information Security, Guilin University of Electronic Technology, Guilin, China","institution_ids":["https://openalex.org/I5343935"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078775578","display_name":"Yong Ding","orcid":"https://orcid.org/0000-0002-3571-7576"},"institutions":[{"id":"https://openalex.org/I5343935","display_name":"Guilin University of Electronic Technology","ror":"https://ror.org/05arjae42","country_code":"CN","type":"education","lineage":["https://openalex.org/I5343935"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yong Ding","raw_affiliation_strings":["Guangxi Key Laboratory of Cryptography and Information Security, School of Computer Science and Information Security, Guilin University of Electronic Technology, Guilin, China"],"affiliations":[{"raw_affiliation_string":"Guangxi Key Laboratory of Cryptography and Information Security, School of Computer Science and Information Security, Guilin University of Electronic Technology, Guilin, China","institution_ids":["https://openalex.org/I5343935"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022955566","display_name":"Qianhong Wu","orcid":"https://orcid.org/0000-0002-6407-4194"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qianhong Wu","raw_affiliation_strings":["School of Electronic and Information Engineering, Beihang University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Electronic and Information Engineering, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027674774","display_name":"Yongzhuang Wei","orcid":"https://orcid.org/0000-0002-3371-4865"},"institutions":[{"id":"https://openalex.org/I5343935","display_name":"Guilin University of Electronic Technology","ror":"https://ror.org/05arjae42","country_code":"CN","type":"education","lineage":["https://openalex.org/I5343935"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yongzhuang Wei","raw_affiliation_strings":["Guangxi Key Laboratory of Cryptography and Information Security, School of Computer Science and Information Security, Guilin University of Electronic Technology, Guilin, China"],"affiliations":[{"raw_affiliation_string":"Guangxi Key Laboratory of Cryptography and Information Security, School of Computer Science and Information Security, Guilin University of Electronic Technology, Guilin, China","institution_ids":["https://openalex.org/I5343935"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111808632","display_name":"Bo Qin","orcid":"https://orcid.org/0000-0001-6015-7788"},"institutions":[{"id":"https://openalex.org/I78988378","display_name":"Renmin University of China","ror":"https://ror.org/041pakw92","country_code":"CN","type":"education","lineage":["https://openalex.org/I78988378"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bo Qin","raw_affiliation_strings":["Key Laboratory of Data Engineering and Knowledge Engineering, Ministry of Education, School of Information, Renmin University of China, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Data Engineering and Knowledge Engineering, Ministry of Education, School of Information, Renmin University of China, Beijing, China","institution_ids":["https://openalex.org/I78988378"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5018915353","display_name":"Huiyong Wang","orcid":"https://orcid.org/0000-0001-5886-9647"},"institutions":[{"id":"https://openalex.org/I5343935","display_name":"Guilin University of Electronic Technology","ror":"https://ror.org/05arjae42","country_code":"CN","type":"education","lineage":["https://openalex.org/I5343935"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Huiyong Wang","raw_affiliation_strings":["School of Mathematics and Computing Science, Guilin University of Electronic Technology, Guilin, China"],"affiliations":[{"raw_affiliation_string":"School of Mathematics and Computing Science, Guilin University of Electronic Technology, Guilin, China","institution_ids":["https://openalex.org/I5343935"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5101925904"],"corresponding_institution_ids":["https://openalex.org/I5343935"],"apc_list":null,"apc_paid":null,"fwci":9.5421,"has_fulltext":false,"cited_by_count":136,"citation_normalized_percentile":{"value":0.98332552,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":"14","issue":"7","first_page":"1779","last_page":"1790"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.8445985317230225},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8362467288970947},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6705511808395386},{"id":"https://openalex.org/keywords/vehicular-ad-hoc-network","display_name":"Vehicular ad hoc network","score":0.6302698850631714},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.6159183979034424},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5652764439582825},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5471162796020508},{"id":"https://openalex.org/keywords/upload","display_name":"Upload","score":0.5407509803771973},{"id":"https://openalex.org/keywords/wireless-ad-hoc-network","display_name":"Wireless ad hoc network","score":0.424709290266037},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.41710150241851807},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.4137355089187622},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.40523451566696167},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.13403764367103577},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.11565348505973816},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.09495130181312561}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.8445985317230225},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8362467288970947},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6705511808395386},{"id":"https://openalex.org/C192448918","wikidata":"https://www.wikidata.org/wiki/Q682677","display_name":"Vehicular ad hoc network","level":4,"score":0.6302698850631714},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.6159183979034424},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5652764439582825},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5471162796020508},{"id":"https://openalex.org/C71901391","wikidata":"https://www.wikidata.org/wiki/Q7126699","display_name":"Upload","level":2,"score":0.5407509803771973},{"id":"https://openalex.org/C94523657","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Wireless ad hoc network","level":3,"score":0.424709290266037},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.41710150241851807},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.4137355089187622},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.40523451566696167},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.13403764367103577},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.11565348505973816},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.09495130181312561},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2018.2885277","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2018.2885277","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2967933097","display_name":null,"funder_award_id":"61572148","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3108144242","display_name":null,"funder_award_id":"61872103","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4853295142","display_name":null,"funder_award_id":"2018GXNSFAA281232","funder_id":"https://openalex.org/F4320322768","funder_display_name":"Natural Science Foundation of Guangxi Province"},{"id":"https://openalex.org/G6130843704","display_name":null,"funder_award_id":"61421120305162112006","funder_id":"https://openalex.org/F4320327655","funder_display_name":"Foundation of Science and Technology on Information Assurance Laboratory"},{"id":"https://openalex.org/G6546932133","display_name":null,"funder_award_id":"U1711263","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8698608195","display_name":null,"funder_award_id":"U1501252","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8887100631","display_name":null,"funder_award_id":"61572146","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321133","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35"},{"id":"https://openalex.org/F4320321925","display_name":"Guilin University of Technology","ror":"https://ror.org/03z391397"},{"id":"https://openalex.org/F4320322499","display_name":"Renmin University of China","ror":"https://ror.org/041pakw92"},{"id":"https://openalex.org/F4320322768","display_name":"Natural Science Foundation of Guangxi Province","ror":null},{"id":"https://openalex.org/F4320323266","display_name":"Guilin University of Electronic Technology","ror":"https://ror.org/05arjae42"},{"id":"https://openalex.org/F4320324497","display_name":"Universitat Rovira i Virgili","ror":"https://ror.org/00g5sqv46"},{"id":"https://openalex.org/F4320327655","display_name":"Foundation of Science and Technology on Information Assurance Laboratory","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":41,"referenced_works":["https://openalex.org/W959307196","https://openalex.org/W1469064452","https://openalex.org/W1581001589","https://openalex.org/W1802540854","https://openalex.org/W1996832206","https://openalex.org/W2013940778","https://openalex.org/W2015454706","https://openalex.org/W2031533839","https://openalex.org/W2038704326","https://openalex.org/W2059160950","https://openalex.org/W2079493184","https://openalex.org/W2089607820","https://openalex.org/W2102881299","https://openalex.org/W2114296561","https://openalex.org/W2114574164","https://openalex.org/W2116696792","https://openalex.org/W2137218567","https://openalex.org/W2149581428","https://openalex.org/W2160480139","https://openalex.org/W2180055784","https://openalex.org/W2182641399","https://openalex.org/W2218489740","https://openalex.org/W2310212673","https://openalex.org/W2346653774","https://openalex.org/W2466821819","https://openalex.org/W2467820268","https://openalex.org/W2470568993","https://openalex.org/W2512827174","https://openalex.org/W2525841751","https://openalex.org/W2541793999","https://openalex.org/W2543054874","https://openalex.org/W2546649706","https://openalex.org/W2562735951","https://openalex.org/W2579975022","https://openalex.org/W2603130609","https://openalex.org/W2610747349","https://openalex.org/W2622634204","https://openalex.org/W2789659149","https://openalex.org/W2972507722","https://openalex.org/W4238256444","https://openalex.org/W6729174842"],"related_works":["https://openalex.org/W2027636740","https://openalex.org/W2062688728","https://openalex.org/W2061231656","https://openalex.org/W2771454953","https://openalex.org/W3046762796","https://openalex.org/W3202102306","https://openalex.org/W3046260513","https://openalex.org/W2998294818","https://openalex.org/W45347327","https://openalex.org/W2020269557"],"abstract_inverted_index":{"The":[0],"connected":[1],"vehicular":[2],"ad":[3],"hoc":[4],"network":[5],"(VANET)":[6],"and":[7,20,43,148,206,242],"cloud":[8,26,75,113,153,162,178,204],"computing":[9,21],"technology":[10],"allows":[11],"entities":[12],"in":[13,126,145,171,191],"VANET":[14,47],"to":[15,65,84,107,111,132,151,156,183,211,217],"enjoy":[16],"the":[17,30,54,62,71,117,129,146,152,158,161,164,177,185,195,203,213,220,244],"advantageous":[18],"storage":[19],"services":[22],"offered":[23],"by":[24,116,135,225],"some":[25,89,96,136],"service":[27],"provider.":[28],"However,":[29],"advantages":[31],"do":[32],"not":[33],"come":[34],"free,":[35],"since":[36],"their":[37,200],"combination":[38],"brings":[39],"many":[40],"new":[41],"security":[42],"privacy":[44,159],"requirements":[45],"for":[46,194],"applications.":[48],"In":[49],"this":[50],"paper,":[51],"we":[52,232],"investigate":[53],"cloud-based":[55],"road":[56,68,91,142,165,221],"condition":[57,92,143,166],"monitoring":[58],"(RCoM)":[59],"scenario,":[60],"where":[61],"authority":[63,207],"needs":[64],"monitor":[66],"real-time":[67],"conditions":[69,222],"with":[70],"help":[72],"of":[73],"a":[74,112,141],"server":[76,114,179,205],"so":[77],"that":[78,176],"it":[79,150],"could":[80],"make":[81],"sound":[82],"responses":[83],"emergency":[85],"cases":[86],"timely.":[87],"When":[88],"bad":[90],"is":[93],"detected,":[94],"e.g.,":[95],"geologic":[97],"hazard":[98],"or":[99],"accident":[100],"happens,":[101],"vehicles":[102,130,190],"on":[103,121],"site":[104],"are":[105,223],"able":[106,182,210],"report":[108,144,214],"such":[109],"information":[110,167],"engaged":[115],"authority.":[118],"We":[119],"focus":[120],"addressing":[122],"three":[123],"key":[124],"issues":[125],"RCoM.":[127],"First,":[128],"have":[131],"be":[133,169,181,209],"authorized":[134],"roadside":[137],"unit":[138],"before":[139],"generating":[140],"domain":[147],"uploading":[149],"server.":[154],"Second,":[155],"guarantee":[157],"against":[160],"server,":[163],"should":[168,180,208],"reported":[170,186,224],"ciphertext":[172,192],"format,":[173],"which":[174],"requires":[175],"distinguish":[184],"data":[187],"from":[188],"different":[189],"format":[193],"same":[196],"place":[197],"without":[198],"compromising":[199],"confidentiality.":[201],"Third,":[202],"validate":[212],"source,":[215],"i.e.,":[216],"check":[218],"whether":[219],"legitimate":[226],"vehicles.":[227],"To":[228],"address":[229],"these":[230],"issues,":[231],"present":[233],"an":[234],"efficient":[235],"RCoM":[236],"scheme,":[237],"analyze":[238],"its":[239],"efficiency":[240],"theoretically,":[241],"demonstrate":[243],"practicality":[245],"through":[246],"experiments.":[247]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":14},{"year":2024,"cited_by_count":20},{"year":2023,"cited_by_count":20},{"year":2022,"cited_by_count":25},{"year":2021,"cited_by_count":28},{"year":2020,"cited_by_count":19},{"year":2019,"cited_by_count":9}],"updated_date":"2026-04-01T17:29:45.350535","created_date":"2025-10-10T00:00:00"}
