A Secure and Efficient Decentralized Access Control Scheme Based on Blockchain for Vehicular Social Networks

被引:17
作者
Zhang, Leyou [1 ]
Zhang, Ye [1 ]
Wu, Qing [2 ]
Mu, Yi [3 ]
Rezaeibagha, Fatemeh [4 ]
机构
[1] Xidian Univ, Sch Math & Stat, Xian 710126, Peoples R China
[2] Xian Univ Posts & Commun, Sch Automat, Xian 710121, Peoples R China
[3] City Univ Macau, Inst Data Sci, Macau, Peoples R China
[4] Murdoch Univ, Discipline Informat Technol Math & Stat, Perth, WA 6150, Australia
基金
中国国家自然科学基金;
关键词
Blockchain; ciphertext-policy attribute-based encryption (CP-ABE); privacy preserving; smart contract; vehicle ad hoc network (VANET); vehicular social network (VSN); ATTRIBUTE-BASED-ENCRYPTION; AD-HOC NETWORKS; MULTI-AUTHORITY; POLICY; HIDDEN;
D O I
10.1109/JIOT.2022.3161047
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The vehicular social network (VSN) is an emerging mobile communication system combining a vehicle ad hoc network (VANET) with a social network. It provides a new means of sharing, disseminating, and delivering data for passengers, drivers, and vehicles. However, a VSN may expose users' private information, such as identities, location information, and trajectories, and tampering with shared data may lead to security and safety problems in vehicle systems. Considering the security and privacy preservation of shared data, we propose a lightweight decentralized multiauthority access control scheme based on ciphertext-policy attribute-based encryption (CP-ABE) and blockchain, by which a decentralized multiauthorization node supports vehicle users by performing lightweight calculations with the assistance of the vehicle cloud service provider (VCSP). We use blockchain to record storage and access transactions, achieving self-verification by users and tamper-resistance of ciphertexts. An improved smart contract reduces the workload of verification by users and achieves privacy preservation by hiding the policy. It supports user revocation and outsourced decryption, enabling more flexibility and better performance. A security and performance analysis shows that our scheme has clear advantages over existing schemes.
引用
收藏
页码:17938 / 17952
页数:15
相关论文
共 57 条
[1]  
Alphand O, 2018, IEEE WCNC
[2]  
[Anonymous], 2021, OPEN SOURCE ADDRESS
[3]  
Beimel A., 1996, Ph.D. Thesis
[4]   PHOABE: Securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted IoT [J].
Belguith, Sana ;
Kaaniche, Nesrine ;
Laurent, Maryline ;
Jemai, Abderrazak ;
Attia, Rabah .
COMPUTER NETWORKS, 2018, 133 :141-156
[5]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[6]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[7]  
Chase M, 2007, LECT NOTES COMPUT SC, V4392, P515
[8]   Trust Assessment in Vehicular Social Network Based on Three-Valued Subjective Logic [J].
Cheng, Tong ;
Liu, Guangchi ;
Yang, Qing ;
Sun, Jianguo .
IEEE TRANSACTIONS ON MULTIMEDIA, 2019, 21 (03) :652-663
[9]   An Efficient and Expressive Ciphertext-Policy Attribute-Based Encryption Scheme with Partially Hidden Access Structures [J].
Cui, Hui ;
Deng, Robert H. ;
Wu, Guowei ;
Lai, Junzuo .
PROVABLE SECURITY, (PROVSEC 2016), 2016, 10005 :19-38
[10]  
De Caro A, 2011, IEEE SYMP COMP COMMU