Blockchain-Assisted Personalized Car Insurance With Privacy Preservation and Fraud Resistance

被引:22
作者
Huang, Cheng [1 ]
Wang, Wei [2 ]
Liu, Dongxiao [1 ]
Lu, Rongxing [3 ]
Shen, Xuemin [1 ]
机构
[1] Univ Waterloo, Dept Elect & Comp Engn, Waterloo, ON N2L 3G1, Canada
[2] Nanjing Univ Aeronaut & Astronaut, Coll Elect & Informat Engn, Nanjing 210016, Peoples R China
[3] Univ New Brunswick, Fac Comp Sci, Fredericton, NB E3B 5A3, Canada
基金
加拿大自然科学与工程研究理事会; 中国国家自然科学基金;
关键词
Vehicles; Insurance; Behavioral sciences; Integrated circuit modeling; Blockchains; Safety; Privacy; Blockchain; data auditing; fraud resistance; personalized car insurance; privacy preservation; KEY GENERATION; MANAGEMENT; SYSTEM;
D O I
10.1109/TVT.2022.3215811
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
It is well known that auto insurance companies (ICs) use personalized car insurance (PCI) to continuously track drivers' behavior to determine their auto premiums. However, drivers inevitably have concerns about the transparency of data collection/processing and the potential privacy leakage. In this paper, we propose a new PCI scheme to achieve privacy preservation and transparency with the assistance of a consortium blockchain. Specifically, a blockchain is first established by a group of consortium members, and each IC can deploy insurance contracts on the blockchain to support public verification of data collection/processing and thus fulfill the transparency requirement. Then a verifiable and privacy-preserving driving behavior evaluation protocol is designed by tailoring partially homomorphic encryption and zero-knowledge proof techniques. Drivers can use the protocol to interact with ICs through the contracts, and ICs can learn drivers' behavior and set corresponding auto premiums by analyzing encrypted driving data. Furthermore, a third-party auditor (TPA) is authorized by drivers and ICs to audit encrypted driving data on the contracts and resist fraud attacks. We model the contract-based auditing as a recursive inspection game where TPA can minimize the number of audits to detect data fraud and penalize malicious drivers according to Nash equilibrium. Therefore, the proposed PCI scheme can guarantee that most of the collected driving data are not biased. Formal simulation-based security analysis is given to prove the security of the proposed scheme, and a proof-of-concept prototype is also developed on an open-source blockchain to demonstrate the feasibility.
引用
收藏
页码:3777 / 3792
页数:16
相关论文
共 42 条
[1]   Hyperledger Fabric: A Distributed Operating System for Permissioned Blockchains [J].
Androulaki, Elli ;
Barger, Artem ;
Bortnikov, Vita ;
Cachin, Christian ;
Christidis, Konstantinos ;
De Caro, Angelo ;
Enyeart, David ;
Ferris, Christopher ;
Laventman, Gennady ;
Manevich, Yacov ;
Muralidharan, Srinivasan ;
Murthy, Chet ;
Binh Nguyen ;
Sethi, Manish ;
Singh, Gari ;
Smith, Keith ;
Sorniotti, Alessandro ;
Stathakopoulou, Chrysoula ;
Vukolic, Marko ;
Cocco, Sharon Weed ;
Yellick, Jason .
EUROSYS '18: PROCEEDINGS OF THE THIRTEENTH EUROSYS CONFERENCE, 2018,
[2]   Privacy-Preserving Blockchain-Based Energy Trading Schemes for Electric Vehicles [J].
Baza, Mohamed ;
Sherif, Ahmed ;
Mahmoud, Mohamed M. E. A. ;
Bakiras, Spiridon ;
Alasmary, Waleed ;
Abdallah, Mohamed ;
Lin, Xiaodong .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2021, 70 (09) :9369-9384
[3]   Good drivers pay less: A study of usage-based vehicle insurance models [J].
Bian, Yiyang ;
Yang, Chen ;
Zhao, J. Leon ;
Liang, Liang .
TRANSPORTATION RESEARCH PART A-POLICY AND PRACTICE, 2018, 107 :20-34
[4]   Privacy Regulations, Smart Roads, Blockchain, and Liability Insurance: Putting Technologies to Work [J].
Campanile, Lelio ;
Iacono, Mauro ;
Levis, Alexander H. ;
Marulli, Fiammetta ;
Mastroianni, Michele .
IEEE SECURITY & PRIVACY, 2021, 19 (01) :34-43
[5]   A Blockchain Assisted Vehicular Pseudonym Issuance and Management System for Conditional Privacy Enhancement [J].
Chulerttiyawong, Donpiti ;
Jamalipour, Abbas .
IEEE ACCESS, 2021, 9 :127305-127319
[6]   Removing the Strong RSA Assumption from Arguments over the Integers [J].
Couteau, Geoffroy ;
Peters, Thomas ;
Pointcheval, David .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2017, PT II, 2017, 10211 :321-350
[7]  
Damgård I, 2002, LECT NOTES COMPUT SC, V2501, P125
[8]   Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing [J].
Dong, Changyu ;
Wang, Yilei ;
Aldweesh, Amjad ;
McCorry, Patrick ;
van Moorsel, Aad .
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, :211-227
[9]   BlockChain: A Distributed Solution to Automotive Security and Privacy [J].
Dorri, Ali ;
Steger, Marco ;
Kanhere, Salil S. ;
Jurdak, Raja .
IEEE COMMUNICATIONS MAGAZINE, 2017, 55 (12) :119-125
[10]   Privacy-Preserving k-means Clustering: an Application to Driving Style Recognition [J].
El Omri, Othmane ;
Boudguiga, Aymen ;
Izabachene, Malika ;
Klaudel, Witold .
NETWORK AND SYSTEM SECURITY, NSS 2019, 2019, 11928 :685-696