DSVN: A Flexible and Secure Data-Sharing Model for VANET Based on Blockchain

被引:3
作者
Chen, Xiaoxuan [1 ]
Chen, Yineng [2 ]
Wang, Xiayu [1 ]
Zhu, Xinghui [1 ]
Fang, Kui [1 ]
机构
[1] Hunan Agr Univ, Coll Informat & Intelligence, Changsha 410128, Peoples R China
[2] Hunan Womens Univ, Sch Informat Sci & Engn, Changsha 410004, Peoples R China
来源
APPLIED SCIENCES-BASEL | 2023年 / 13卷 / 01期
关键词
VANET; data sharing; CP-ABE; blockchain; attribute revocation;
D O I
10.3390/app13010217
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
Vehicular Ad Hoc Network (VANET) is an important part of the modern intelligent transportation system, which can provide vehicle communication at a certain distance. More importantly, VANET can provide route planning and autonomous driving for drivers by analyzing data. However, VANET's data privacy and security are a huge challenge when serving drivers. In this paper, we propose a VANET data-sharing model (DSVN) that combines ciphertext-based attribute encryption (CP-ABE), blockchain, and InterPlanetary File System (IPFS). DSVN uses an outsourced and revocable ciphertext policy attribute-based encryption (ORCP-ABE) scheme, which is improved based on CP-ABE. ORCP-ABE uses key encryption key (KEK) trees to manage user attribute groups and revoke user-level attributes. It eliminates redundant attributes in the access policy by attribute-weighted access trees. Moreover, DSVN has no single point of failure. We demonstrate the indistinguishability under the chosen-plaintext attack (IND-CPA) security of DSVN by a game based on the computational Diffie-Hellman (CDH) assumption. Experimental results show that DSVN can store and share data with low overhead. Additionally, it can revoke attributes of users safely.
引用
收藏
页数:17
相关论文
共 43 条
  • [1] A comprehensive survey on vehicular Ad Hoc network
    Al-Sultan, Saif
    Al-Doori, Moath M.
    Al-Bayatti, Ali H.
    Zedan, Hussien
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2014, 37 : 380 - 392
  • [2] BloCkEd: Blockchain-Based Secure Data Processing Framework in Edge Envisioned V2X Environment
    Aujla, Gagangeet Singh
    Singh, Amritpal
    Singh, Maninderpal
    Sharma, Sumit
    Kumar, Neeraj
    Choo, Kim-Kwang Raymond
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (06) : 5850 - 5863
  • [3] Benet J, 2014, ARXIV
  • [4] Ciphertext-policy attribute-based encryption
    Bethencourt, John
    Sahai, Amit
    Waters, Brent
    [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +
  • [5] Blockchain for Industry 4.0: A Comprehensive Review
    Bodkhe, Umesh
    Tanwar, Sudeep
    Parekh, Karan
    Khanpara, Pimal
    Tyagi, Sudhanshu
    Kumar, Neeraj
    Alazab, Mamoun
    [J]. IEEE ACCESS, 2020, 8 : 79764 - 79800
  • [6] Practical byzantine fault tolerance and proactive recovery
    Castro, M
    Liskov, B
    [J]. ACM TRANSACTIONS ON COMPUTER SYSTEMS, 2002, 20 (04): : 398 - 461
  • [7] Privacy-Preserving Deep Learning Model for Decentralized VANETs Using Fully Homomorphic Encryption and Blockchain
    Chen, Jianguo
    Li, Kenli
    Yu, Philip S.
    [J]. IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2022, 23 (08) : 11633 - 11642
  • [8] Daemen J., 2002, DESIGN RIJNDAEL
  • [9] Tectonic-magmatic-metallogenic system, Tongling ore cluster region, Anhui Province, China
    Deng, Jun
    Wang, Qingfei
    Xiao, Changhao
    Yang, Liqiang
    Liu, Huan
    Gong, Qingjie
    Zhang, Jing
    [J]. INTERNATIONAL GEOLOGY REVIEW, 2011, 53 (5-6) : 449 - 476
  • [10] PAS: Privacy-Preserving Authentication Scheme Based on SDN for VANETs
    Deng, Xinyang
    Gao, Tianhan
    Guo, Nan
    Qi, Jiayu
    Zhao, Cong
    [J]. APPLIED SCIENCES-BASEL, 2022, 12 (09):