DAPA: A Decentralized, Accountable, and Privacy-Preserving Architecture for Car Sharing Services

被引:19
作者
Huang, Cheng [1 ]
Lu, Rongxing [2 ]
Ni, Jianbing [3 ]
Shen, Xuemin [1 ]
机构
[1] Univ Waterloo, Dept Elect & Comp Engn, Waterloo, ON N2L 3G1, Canada
[2] Univ New Brunswick, Fac Comp Sci, Fredericton, NB E3B 5A3, Canada
[3] Queens Univ, Dept Elect & Comp Engn, Kingston, ON K7L 3N6, Canada
关键词
Car sharing; decentralization; accountability; privacy preservation; identity management; SECURITY;
D O I
10.1109/TVT.2020.2980777
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Car sharing offers a flexible peer-to-peer or station based car rental service to customers. On one hand, it requires customers to expose identifications (e.g., valid driving licenses) to car sharing service providers (CSSPs) for accountability, i.e., the driving qualification of customers can be verified and misbehaving customers can be traced by CSSPs. On the other hand, privacy concerns arise when customers identities are exposed as honest-but-curious CSSPs may secretly extract customers privacy information by linking their car rental records to their identities. To resolve this contradiction, we propose a decentralized, accountable, and privacy-preserving architecture for car sharing services, named DAPA. In specific, to overcome the limitation of the single point of failure, multiple dynamic validation servers are employed to substitute a single trusted third-party authority and assist in building decentralized trust for customers. In addition, to protect customers' privacy and achieve accountability simultaneously under the decentralized architecture, a new privacy-preserving identity management (PPIM) scheme is introduced as a basic module for DAPA. Customers' identities are protected in a distributed and dynamic manner but publicly verified based on a well-designed zero-knowledge proof protocol. Only the misbehaving customers' identities can be recovered by a majority of validation servers using adaptive verifiable secret sharing/redistribution techniques. Detailed security analysis shows that DAPA can minimize privacy breaches and guarantee the accountability. Performance evaluations via extensive simulations demonstrate that DAPA is efficient in terms of computational costs and communication overheads.
引用
收藏
页码:4869 / 4882
页数:14
相关论文
共 41 条
[1]   Non-Interactive Zero-Knowledge Proofs for Composite Statements [J].
Agrawal, Shashank ;
Ganesh, Chaya ;
Mohassel, Payman .
ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT III, 2018, 10993 :643-673
[2]   Round-Optimal Secure Multiparty Computation with Honest Majority [J].
Ananth, Prabhanjan ;
Choudhuri, Arka Rai ;
Goel, Aarushi ;
Jain, Abhishek .
ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT II, 2018, 10992 :395-424
[3]  
[Anonymous], 2017, LECT NOTES COMPUT SC, DOI DOI 10.1007/978-3-319-68637-0_7
[4]  
[Anonymous], 2009, LECT NOTES COMPUT SC
[5]  
[Anonymous], 2018, IEEE PERVAS COMPUT
[6]  
[Anonymous], 2018, 2018 JOINT IEEE INT
[7]  
Au M. H., 2012, P ANN NETW DISTR SYS, P1
[8]   Zerocash: Decentralized Anonymous Payments from Bitcoin [J].
Ben-Sasson, Eli ;
Chiesa, Alessandro ;
Garmant, Christina ;
Green, Matthew ;
Miers, Ian ;
Tromer, Eran ;
Virza, Madars .
2014 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2014), 2014, :459-474
[9]   Short group signatures [J].
Boneh, D ;
Boyen, X ;
Shacham, H .
ADVANCES IN CRYPTOLOGY - CRYPTO 2004, PROCEEDINGS, 2004, 3152 :41-55
[10]   Short signatures from the Weil pairing [J].
Boneh, D ;
Lynn, B ;
Shacham, H .
JOURNAL OF CRYPTOLOGY, 2004, 17 (04) :297-319