A Secure and Verifiable Data Sharing Scheme Based on Blockchain in Vehicular Social Networks

被引:121
作者
Fan, Kai [1 ]
Pan, Qiang [1 ]
Zhang, Kuan [2 ]
Bai, Yuhan [1 ]
Sun, Shili [1 ]
Li, Hui [1 ]
Yang, Yintang [3 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
[2] Univ Nebraska, Dept Elect & Comp Engn, Lincoln, NE USA
[3] Xidian Univ, Minist Educ Wide Band Gap Semicond Mat & Devices, Key Lab, Xian 710071, Peoples R China
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
Blockchain; Access control; Social networking (online); Encryption; Data privacy; Vehicular social networks (VSNs); blockchain; CP-ABE; policy hiding; data revocation; AUTHENTICATION SCHEME; ACCESS-CONTROL; CP-ABE; EFFICIENT;
D O I
10.1109/TVT.2020.2968094
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The vehicular social networks (VSNs) supports diverse kinds of services such as traffic management, road safety, and sharing data (videos, audios, roads photos, air quality, and so on). However, its complex, large-scale and dynamic network structure poses new security challenges. Among these challenges, secure data transmission has turned to be a spotlight. Ciphertext-policy attribute-based encryption (CP-ABE) may be adopted to realize one-to-many data sharing in VSNs. In traditional CP-ABE schemes, access policy is stored and granted by the could, which lacks credibility due to centralization. In this article, we propose a secure and verifiable one-to-many data sharing scheme to solve the above problem. We use blockchain to record the access policy, realizing user self-certification and cloud non-repudiation. Considering the computing capabilities of the vehicular user, we propose an effective scheme for certificating. Meanwhile, considering the sensitive information included in the access policy, we propose a policy hiding scheme. Our scheme also supports data revocation when a vehicular user no longer wants to share the data in VSNs. Finally, security analysis and simulation show our scheme is both secure and efficient.
引用
收藏
页码:5826 / 5835
页数:10
相关论文
共 57 条
[51]  
Yang K., 2012, P IEEE INT C DISTR C
[52]  
[袁勇 Yuan Yong], 2016, [自动化学报, Acta Automatica Sinica], V42, P481
[53]   Exploiting Social Network to Enhance Human-to-Human Infection Analysis without Privacy Leakage [J].
Zhang, Kuan ;
Liang, Xiaohui ;
Ni, Jianbing ;
Yang, Kan ;
Shen, Xuemin .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2018, 15 (04) :607-620
[54]  
[张宁 Zhang Ning], 2016, [中国电机工程学报, Proceedings of the Chinese Society of Electrical Engineering], V36, P4011
[55]   Achieving Privacy-Friendly Storage and Secure Statistics for Smart Meter Data on Outsourced Clouds [J].
Zhang, Zijian ;
Dong, Mianxiong ;
Zhu, Liehuang ;
Guan, Zhitao ;
Chen, Ruoyu ;
Xu, Rixin ;
Ota, Kaoru .
IEEE TRANSACTIONS ON CLOUD COMPUTING, 2019, 7 (03) :638-649
[56]  
Zheng K., 2018, 9 INT C INF TECHN ME
[57]   Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage [J].
Zhong, Hong ;
Zhu, Wenlong ;
Xu, Yan ;
Cui, Jie .
SOFT COMPUTING, 2018, 22 (01) :243-251