Accountable Attribute-Based Data-Sharing Scheme Based on Blockchain for Vehicular Ad Hoc Network

被引:16
作者
Guo, Zhenzhen [1 ,2 ]
Wang, Gaoli [1 ,2 ]
Li, Yingxin [1 ]
Ni, Jianqiang [1 ]
Du, Runmeng [1 ]
Wang, Miao [1 ]
机构
[1] East China Normal Univ, Software Engn Inst, Shanghai Key Lab Trustworthy Comp, Shanghai 200062, Peoples R China
[2] State Key Lab Cryptol, Beijing 100878, Peoples R China
基金
中国国家自然科学基金;
关键词
Vehicular ad hoc networks; Blockchains; Encryption; Cloud computing; Glass box; Privacy; Fans; Blockchain; ciphertext-policy attribute-based encryption (CP-ABE); data sharing; user revocation; white-box traceability; ACCESS-CONTROL SCHEME; MULTI-AUTHORITY; ENCRYPTION; SYSTEM;
D O I
10.1109/JIOT.2022.3228550
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Vehicular ad hoc network (VANET), as one of the bases of intelligent transport systems, plays an essential role in improving road traffic safety. Nevertheless, in such a complicated, distributed, and highly mobile network structure, how to achieve secure data sharing is a great challenge. The ciphertext-policy attribute-based encryption (CP-ABE) is a potential method to realize one-to-many data sharing for VANET. However, the key abuse problems of users and attribute authorities (AAs) incur many security concerns for VANET. Both issues are extremely important because the attribute keys directly affect users' access to shared data. To solve the above issues, we propose an accountable attribute-based data-sharing scheme with the blockchain technology (AT-DS-VAHN, in short). For AAs key abuse, we use the consortium blockchain maintained by AAs to achieve distributed key storage and distribution. The attribute keys generated by each AA and its key distribution records are recorded on the blockchain in the form of transactions. Based on the traceability of blockchain, the key abuse behavior of AAs can be caught and prosecuted. For user key abuse, we achieve white-box traceability and efficient user revocation. Based on the principle of traceable-then-revocable, malicious users can be tracked and then revoked directly from the system without complex operations. Besides, to reduce the computation burden on users, our proposal supports online/offline encryption and verifiable outsourced decryption. Security and efficiency analyses show that our proposal is secure and efficient, with high practicability and reliability for VANET.
引用
收藏
页码:7011 / 7026
页数:16
相关论文
共 47 条
[1]   Charm: a framework for rapidly prototyping cryptosystems [J].
Akinyele, Joseph A. ;
Garman, Christina ;
Miers, Ian ;
Pagano, Matthew W. ;
Rushanan, Michael ;
Green, Matthew ;
Rubin, Aviel D. .
JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2013, 3 (02) :111-128
[2]   Private blockchain-envisioned multi-authority CP-ABE-based user access control scheme in IIoT [J].
Banerjee, Soumya ;
Bera, Basudeb ;
Das, Ashok Kumar ;
Chattopadhyay, Samiran ;
Khan, Muhammad Khurram ;
Rodrigues, Joel J. P. C. .
COMPUTER COMMUNICATIONS, 2021, 169 :99-113
[3]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[4]   Server-Aided Revocable Attribute-Based Encryption [J].
Cui, Hui ;
Deng, Robert H. ;
Li, Yingjiu ;
Qin, Baodong .
COMPUTER SECURITY - ESORICS 2016, PT II, 2016, 9879 :570-587
[5]   Efficient Decentralized Attribute Based Access Control for Mobile Clouds [J].
De, Sourya Joyee ;
Ruj, Sushmita .
IEEE TRANSACTIONS ON CLOUD COMPUTING, 2020, 8 (01) :124-137
[6]   STEAC: Towards secure, traceable, and efficient cryptographic access control scheme in smart healthcare [J].
Deng, Weiwei ;
Xiang, Tao ;
Liao, Xiaofeng .
MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (21) :30069-30092
[7]   Blockchain-Based Secured IPFS-Enable Event Storage Technique With Authentication Protocol in VANET [J].
Dwivedi, Sanjeev Kumar ;
Amin, Ruhul ;
Vollala, Satyanarayana .
IEEE-CAA JOURNAL OF AUTOMATICA SINICA, 2021, 8 (12) :1913-1922
[8]   A Secure and Verifiable Data Sharing Scheme Based on Blockchain in Vehicular Social Networks [J].
Fan, Kai ;
Pan, Qiang ;
Zhang, Kuan ;
Bai, Yuhan ;
Sun, Shili ;
Li, Hui ;
Yang, Yintang .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (06) :5826-5835
[9]   Cloud-based RFID mutual authentication scheme for efficient privacy preserving in IoV [J].
Fan, Kai ;
Jiang, Wei ;
Luo, Qi ;
Li, Hui ;
Yang, Yintang .
JOURNAL OF THE FRANKLIN INSTITUTE-ENGINEERING AND APPLIED MATHEMATICS, 2021, 358 (01) :193-209
[10]   Efficient and privacy preserving access control scheme for fog-enabled IoT [J].
Fan, Kai ;
Xu, Huiyue ;
Gao, Longxiang ;
Li, Hui ;
Yang, Yintang .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 99 :134-142