A Secure and Verifiable Data Sharing Scheme Based on Blockchain in Vehicular Social Networks

被引:121
作者
Fan, Kai [1 ]
Pan, Qiang [1 ]
Zhang, Kuan [2 ]
Bai, Yuhan [1 ]
Sun, Shili [1 ]
Li, Hui [1 ]
Yang, Yintang [3 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
[2] Univ Nebraska, Dept Elect & Comp Engn, Lincoln, NE USA
[3] Xidian Univ, Minist Educ Wide Band Gap Semicond Mat & Devices, Key Lab, Xian 710071, Peoples R China
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
Blockchain; Access control; Social networking (online); Encryption; Data privacy; Vehicular social networks (VSNs); blockchain; CP-ABE; policy hiding; data revocation; AUTHENTICATION SCHEME; ACCESS-CONTROL; CP-ABE; EFFICIENT;
D O I
10.1109/TVT.2020.2968094
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The vehicular social networks (VSNs) supports diverse kinds of services such as traffic management, road safety, and sharing data (videos, audios, roads photos, air quality, and so on). However, its complex, large-scale and dynamic network structure poses new security challenges. Among these challenges, secure data transmission has turned to be a spotlight. Ciphertext-policy attribute-based encryption (CP-ABE) may be adopted to realize one-to-many data sharing in VSNs. In traditional CP-ABE schemes, access policy is stored and granted by the could, which lacks credibility due to centralization. In this article, we propose a secure and verifiable one-to-many data sharing scheme to solve the above problem. We use blockchain to record the access policy, realizing user self-certification and cloud non-repudiation. Considering the computing capabilities of the vehicular user, we propose an effective scheme for certificating. Meanwhile, considering the sensitive information included in the access policy, we propose a policy hiding scheme. Our scheme also supports data revocation when a vehicular user no longer wants to share the data in VSNs. Finally, security analysis and simulation show our scheme is both secure and efficient.
引用
收藏
页码:5826 / 5835
页数:10
相关论文
共 57 条
  • [1] Charm: a framework for rapidly prototyping cryptosystems
    Akinyele, Joseph A.
    Garman, Christina
    Miers, Ian
    Pagano, Matthew W.
    Rushanan, Michael
    Green, Matthew
    Rubin, Aviel D.
    [J]. JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2013, 3 (02) : 111 - 128
  • [2] Amit S., 2005, P INT C THEOR APPL C
  • [3] Amos B., 2011, P INT WORKSH DBLP, P11
  • [4] [Anonymous], 2011, COMPUTER
  • [5] [Anonymous], 2016, BMC CANCER, DOI DOI 10.1186/S12885-016-2294-1
  • [6] [Anonymous], 2016, KSII T INTERNET INF, DOI DOI 10.3837/TIIS.2016.05.024
  • [7] [Anonymous], 2011, LECT NOTES COMPUT SC
  • [8] Beimel A., 1996, THESIS
  • [9] Bethencourt J., 2007, IEEE S SEC PRIV
  • [10] Chase M, 2007, LECT NOTES COMPUT SC, V4392, P515