Blockchain-Based Privacy-Aware Content Caching in Cognitive Internet of Vehicles

被引:52
作者
Qian, Yongfeng [1 ]
Jiang, Yingying [2 ]
Hu, Long [3 ]
Hossain, M. Shamim [4 ]
Alrashoud, Mubarak [4 ]
Al-Hammadi, Muneer [5 ]
机构
[1] China Univ Geosci, Wuhan 430074, Peoples R China
[2] Huazhong Univ Sci & Technol, Sch Comp Sci & Technol, Embedded & Pervas Comp EPIC Lab, Wuhan, Peoples R China
[3] Huazhong Univ Sci & Technol, Sch Comp Sci & Technol, Wuhan, Peoples R China
[4] King Saud Univ, Coll Comp & Informat Sci, Dept Software Engn, Riyadh, Saudi Arabia
[5] King Saud Univ, Coll Comp & Informat Sci, Dept Comp Engn, Riyadh, Saudi Arabia
来源
IEEE NETWORK | 2020年 / 34卷 / 02期
关键词
Engines; Privacy; Blockchain; Artificial intelligence; Internet; Data privacy; Vehicular ad hoc networks; SCHEME;
D O I
10.1109/MNET.001.1900161
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The Cognitive Internet of Vehicles (CIoV) introduces a cognitive engine in the traditional Internet of Vehicles, which can realize more intelligent functions such as vehicle deployment and resource allocation. Especially in terms of content caching, the cognitive engine can perceive the content requirements of users and match the content providers and content requesters to improve the caching hit rate. However, during this process, users may worry that their privacy data may be leaked. Content requesters need to submit data about points of interest in contents, which is part of their sensitive information. In addition, in terms of rapid speed of vehicles, the connection time is limited, such as vehicle-to-vehicle and vehicle-to-roadside unit (RSU), which leads to limited transaction time during obtaining contents. In order to solve these problems, in this article, we propose a blockchain-based privacy-aware content caching architecture in CIoV. In general, when vehicles need contents, in order to protect the privacy of vehicles, it is no longer necessary to submit a request to an RSU, but through broadcasting contents from an RSU or surrounding vehicles, where vehicles can selectively obtain contents. To improve the cache hit rate, the cognitive engine will perceive content requirements and recommend relevant content requirements to an RSU or content-providing vehicles based on machine learning or deep learning methods. However, this method of content acquisition will connect different vehicles, which brings the untrusted problem. Both content requesters and providers may worry about untrusted users connected with them. To this end, we adopt the blockchain technology to record the completed content transactions, which are written into the block after the consensus mechanism is completed, thus solving the problem of distrust between vehicles. Experiments demonstrate the privacy-aware content caching architecture based on blockchains effectiveness.
引用
收藏
页码:46 / 51
页数:6
相关论文
共 15 条
  • [1] Cognitive information measurements: A new perspective
    Chen, Min
    Hao, Yixue
    Gharavi, Hamid
    Leung, Victor C. M.
    [J]. INFORMATION SCIENCES, 2019, 505 : 487 - 497
  • [2] Label-less Learning for Emotion Cognition
    Chen, Min
    Hao, Yixue
    [J]. IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2020, 31 (07) : 2430 - 2440
  • [3] Opportunistic Task Scheduling over Co-Located Clouds in Mobile Environment
    Chen, Min
    Hao, Yixue
    Lai, Chin-Feng
    Wu, Di
    Li, Yong
    Hwang, Kai
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2018, 11 (03) : 549 - 561
  • [4] Cognitive Computing: Architecture,Technologies and Intelligent Applications
    Chen, Min
    Herrera, Francisco
    Hwang, Kai
    [J]. IEEE ACCESS, 2018, 6 : 19774 - 19783
  • [5] Graph Data Anonymization, De-Anonymization Attacks, and De-Anonymizability Quantification: A Survey
    Ji, Shouling
    Mittal, Prateek
    Beyah, Raheem
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2017, 19 (02): : 1305 - 1326
  • [6] Robust Privacy-Utility Tradeoffs Under Differential Privacy and Hamming Distortion
    Kalantari, Kousha
    Sankar, Lalitha
    Sarwate, Anand D.
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (11) : 2816 - 2830
  • [7] Consortium Blockchain for Secure Energy Trading in Industrial Internet of Things
    Li, Zhetao
    Kang, Jiawen
    Yu, Rong
    Ye, Dongdong
    Deng, Qingyong
    Zhang, Yan
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (08) : 3690 - 3700
  • [8] Blockchain-Enabled Security in Electric Vehicles Cloud and Edge Computing
    Liu, Hong
    Zhang, Yan
    Yang, Tao
    [J]. IEEE NETWORK, 2018, 32 (03): : 78 - 83
  • [9] A Latency and Reliability Guaranteed Resource Allocation Scheme for LTE V2V Communication Systems
    Mei, Jie
    Zheng, Kan
    Zhao, Long
    Teng, Yong
    Wang, Xianbin
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2018, 17 (06) : 3850 - 3860
  • [10] Secure Enforcement in Cognitive Internet of Vehicles
    Qian, Yongfeng
    Chen, Min
    Chen, Jing
    Hossain, M. Shamim
    Alamri, Atif
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (02): : 1242 - 1250