{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T18:52:17Z","timestamp":1773773537712,"version":"3.50.1"},"reference-count":32,"publisher":"MDPI AG","issue":"3","license":[{"start":{"date-parts":[[2021,3,16]],"date-time":"2021-03-16T00:00:00Z","timestamp":1615852800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Symmetry"],"abstract":"<jats:p>A vehicular ad-hoc network (VANET) is the basic block in building an intelligent transportation system that improves the traffic flow and makes needed information conveniently accessible. VANET depends on a dense exchange of sensed data between vehicles and Road Side Units (RSUs). A large amount of sensed data requires a huge computation and storage capabilities, which is provided by the vehicular cloud computing (VCC). However, the security problems of data confidentiality, access control, vehicles\u2019 authentication, and conductors\u2019 privacy in VCC are issues that need to be solved. In this paper, we propose an efficient algorithm to ensure VCC security and privacy. We use Pseudo-ID instead of vehicles\u2019 real ID to provide conductors\u2019 privacy, Identifier-Based Signature mechanism is used to guarantee vehicles\u2019 authentication, and Ciphertext-Policy Attribute-Based Encryption (CP-ABE) algorithm is used for key distribution. Our liGhtweight secURe AutheNticaTion and keY distribution scheme for vehicular cloud computing (GUARANTY) ensures a secure keys distribution to minimize the encryption and decryption computation cost. Vehicles use a symmetrical cryptography in their communication. We analyze the security of our algorithm using AVISPA tool. We use this tool to simulate insiders and outsiders attacks. We evaluate our algorithm\u2019s performance in terms of computation delay and reception rate.<\/jats:p>","DOI":"10.3390\/sym13030484","type":"journal-article","created":{"date-parts":[[2021,3,16]],"date-time":"2021-03-16T21:42:41Z","timestamp":1615930961000},"page":"484","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Lightweight Secure Authentication and Key Distribution Scheme for Vehicular Cloud Computing"],"prefix":"10.3390","volume":"13","author":[{"given":"Hadjer","family":"Goumidi","sequence":"first","affiliation":[{"name":"LRSD Laboratory, Computer Science Department, Ferhat Abbas University of Setif 1, Setif 19000, Algeria"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6524-7352","authenticated-orcid":false,"given":"Saad","family":"Harous","sequence":"additional","affiliation":[{"name":"College of Information Technology, United Arab Emirates University, Al-Ain 15551, United Arab Emirates"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1811-6306","authenticated-orcid":false,"given":"Zibouda","family":"Aliouat","sequence":"additional","affiliation":[{"name":"LRSD Laboratory, Computer Science Department, Ferhat Abbas University of Setif 1, Setif 19000, Algeria"}]},{"given":"Abdelhak Mourad","family":"Gueroui","sequence":"additional","affiliation":[{"name":"LI-PaRAD Laboratory, Universit\u00e9 Paris Saclay, University of Versailles Saint-Quentin-en-Yvelines, 78000 Versailles, France"}]}],"member":"1968","published-online":{"date-parts":[[2021,3,16]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"219124","DOI":"10.1109\/ACCESS.2020.3042739","article-title":"Boosting Big Data Streaming Applications in Clouds With BurstFlow","volume":"8","author":"Matteussi","year":"2020","journal-title":"IEEE Access"},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Trubia, S., Severino, A., Curto, S., Arena, F., and Pau, G. (2020). Smart Roads: An Overview of What Future Mobility Will Look Like. Infrastructures, 5.","DOI":"10.3390\/infrastructures5120107"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Zhu, J., and Xu, W. (2021). Real-Time Data Filling and Automatic Retrieval Algorithm of Road Traffic Based on Deep-Learning Method. Symmetry, 13.","DOI":"10.3390\/sym13010001"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"2473","DOI":"10.1007\/s13369-019-04094-0","article-title":"Vehicular cloud computing security: A survey","volume":"45","author":"Goumidi","year":"2020","journal-title":"Arab. J. Sci. Eng."},{"key":"ref_5","first-page":"7","article-title":"VANet security challenges and solutions: A survey","volume":"7","author":"Hasrouny","year":"2017","journal-title":"Veh. Commun."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Bethencourt, J., Sahai, A., and Waters, B. (2007, January 20\u201323). Ciphertext-policy attribute-based encryption. Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, USA.","DOI":"10.1109\/SP.2007.11"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"1024","DOI":"10.1007\/s11227-016-1773-0","article-title":"Secure vehicle traffic data dissemination and analysis protocol in vehicular cloud computing","volume":"74","author":"Nkenyereye","year":"2018","journal-title":"J. Supercomput."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"1861","DOI":"10.1007\/s12652-017-0650-x","article-title":"Efficient identity-based data transmission for VANET","volume":"9","author":"Wan","year":"2018","journal-title":"J. Ambient Intell. Humaniz. Comput."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"45655","DOI":"10.1109\/ACCESS.2018.2864189","article-title":"A privacy-preserving trust model based on blockchain for vanets","volume":"6","author":"Lu","year":"2018","journal-title":"IEEE Access"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Arora, A., and Yadav, S.K. (2018, January 26\u201327). Block chain based security mechanism for internet of vehicles (iov). Proceedings of the 3rd International Conference on Internet of Things and Connected Technologies, (ICIoTCT), Jaipur, India.","DOI":"10.2139\/ssrn.3166721"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"368","DOI":"10.1016\/j.future.2019.02.038","article-title":"PAU: Privacy Assessment method with Uncertainty consideration for cloud-based vehicular networks","volume":"96","author":"Feng","year":"2019","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1016\/j.dsp.2018.06.003","article-title":"A sensor enabled secure vehicular communication for emergency message dissemination using cloud services","volume":"85","author":"SathyaNarayanan","year":"2019","journal-title":"Digit. Signal Process."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"194","DOI":"10.1016\/j.pmcj.2015.07.007","article-title":"Secure and privacy-aware traffic information as a service in VANET-based clouds","volume":"24","author":"Hussain","year":"2015","journal-title":"Pervasive Mob. Comput."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"1383","DOI":"10.1007\/s11277-017-4923-7","article-title":"Secure Vehicular Communication Using ID Based Signature Scheme","volume":"98","author":"Jenefa","year":"2018","journal-title":"Wirel. Pers. Commun."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"1526","DOI":"10.1016\/j.adhoc.2009.04.011","article-title":"ASPE: Attribute-based secure policy enforcement in vehicular ad hoc networks","volume":"7","author":"Huang","year":"2009","journal-title":"Ad Hoc Netw."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"1316","DOI":"10.1016\/j.jcss.2016.05.006","article-title":"SEMD: Secure and efficient message dissemination with policy enforcement in VANET","volume":"82","author":"Liu","year":"2016","journal-title":"J. Comput. Syst. Sci."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1016\/j.csi.2017.09.009","article-title":"Cloud-based security and privacy-aware information dissemination over ubiquitous VANETs","volume":"56","author":"Safi","year":"2018","journal-title":"Comput. Stand. Interfaces"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"170","DOI":"10.1016\/j.ins.2020.07.060","article-title":"Towards secure and practical consensus for blockchain based VANET","volume":"545","author":"Kudva","year":"2021","journal-title":"Inf. Sci."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Sestrem Och\u00f4a, I., Reis Quietinho Leithardt, V., Calbusch, L., De Paz Santana, J.F., Delcio Parreira, W., Oriel Seman, L., and Albenes Zeferino, C. (2021). Performance and Security Evaluation on a Blockchain Architecture for License Plate Recognition Systems. Appl. Sci., 11.","DOI":"10.3390\/app11031255"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Yan, X., Gu, X., Wang, J., Wan, J., and Chen, L. (2021). A kind of event trust model for VANET based on statistical method. Wirel. Pers. Commun., 1\u201315.","DOI":"10.1007\/s11277-020-08027-1"},{"key":"ref_21","unstructured":"Green, M., Hohenberger, S., and Waters, B. (2011, January 11\u201313). Outsourcing the decryption of abe ciphertexts. Proceedings of the USENIX Security Symposium, Washington, DC, USA."},{"key":"ref_22","unstructured":"Parno, B., and Perrig, A. (2005, January 14\u201315). Challenges in securing vehicular networks. Proceedings of the Workshop on hot topics in networks (HotNets-IV), New York, NY, USA."},{"key":"ref_23","unstructured":"Schneier, B. (2012, May 08). The Blowfish Encryption Algorithm. 2008. Available online: https:\/\/doi.org\/http:\/\/www.schneier.journal.com\/blowfish.html."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2015\/745303","article-title":"Vehicular ad hoc networks: Architectures, research issues, methodologies, challenges, and trends","volume":"11","author":"Liang","year":"2015","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Beimel, A. (2011). Secret-sharing schemes: A survey. International Conference on Coding and Cyptology, Oxford, UK, 12\u201315 December 2011, Springer.","DOI":"10.1007\/978-3-642-20901-7_2"},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Ostrovsky, R., Sahai, A., and Waters, B. (2007, January 28\u201331). Attribute-based encryption with non-monotonic access structures. Proceedings of the 14th ACM conference on Computer and communications security, Alexandria, VR, USA.","DOI":"10.1145\/1315245.1315270"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Waters, B. (2011). Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization. International Workshop on Public Key Cryptography, Springer.","DOI":"10.1007\/978-3-642-19379-8_4"},{"key":"ref_28","unstructured":"Shamir, A. (1984). Identity-based cryptosystems and signature schemes. Workshop on the Theory and Application of Cryptographic Techniques, Springer."},{"key":"ref_29","unstructured":"Saroiu, S., and Wolman, A. (, January 23\u201324). Enabling new mobile applications with location proofs. Proceedings of the 10th workshop on Mobile Computing Systems and Applications, Santa Cruz, CA, USA."},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Corless, R.M. (2007). On a generalized companion matrix pencil for matrix polynomials expressed in the Lagrange basis. Symbolic-Numeric Computation, Springer.","DOI":"10.1007\/978-3-7643-7984-1_1"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Armando, A., Basin, D., Boichut, Y., Chevalier, Y., Compagna, L., Cu\u00e9llar, J., Drielsma, P.H., H\u00e9am, P.C., Kouchnarenko, O., and Mantovani, J. (2005). The AVISPA tool for the automated validation of internet security protocols and applications. International Conference on Computer Aided Verification, Springer.","DOI":"10.1007\/11513988_27"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","article-title":"On the security of public key protocols","volume":"29","author":"Dolev","year":"1983","journal-title":"IEEE Trans. Inf. Theor."}],"container-title":["Symmetry"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-8994\/13\/3\/484\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T05:36:44Z","timestamp":1760161004000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-8994\/13\/3\/484"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,16]]},"references-count":32,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2021,3]]}},"alternative-id":["sym13030484"],"URL":"https:\/\/doi.org\/10.3390\/sym13030484","relation":{},"ISSN":["2073-8994"],"issn-type":[{"value":"2073-8994","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,3,16]]}}}