Blockchain-based efficient privacy preserving and data sharing scheme of content-centric network in 5G

被引:103
作者
Fan, Kai [1 ]
Ren, Yanhui [1 ]
Wang, Yue [2 ]
Li, Hui [1 ]
Yang, Yingtang [3 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks, 2 South Taibai Rd, Xian, Shaanxi, Peoples R China
[2] Xian Univ, Sch Informat Engn, Xian, Shaanxi, Peoples R China
[3] Xidian Univ, Key Lab, Minist Educ Wide Band Gap Semicond Mat & Devices, 2 South Taibai Rd, Xian, Shaanxi, Peoples R China
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
5G mobile communication; data privacy; Internet; computer network security; authorisation; block chain-based efficient privacy preserving; data sharing scheme; content-centric network; information protection; content-centric mobile networks; 5G networks; blockchain ledger; access control; public ledger; network delay; green communication; ACCESS-CONTROL;
D O I
10.1049/iet-com.2017.0619
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Now, the authors' life is full of vast amount of information, the era of information has arrived. So the content-centric networks face severe challenges in dealing with a huge range of content requests, bringing protection and sharing concerns of the content. How to protect information in the network efficiently and securely for the upcoming 5G era has become a problem. The authors propose a scheme based on a blockchain to solve the privacy issues in content-centric mobile networks for 5G. The authors implement the mutual trust between content providers and users. Besides, the openness and tamper-resistant of the blockchain ledger ensure the access control and privacy of the provider. With the help of a miner, selected from users, the authors can maintain the public ledger expediently. Also, in return, the authors share the interesting data with low overhead, network delay and congestion, and then achieve green communication.
引用
收藏
页码:527 / 532
页数:6
相关论文
共 20 条
[1]   Design Considerations for a 5G Network Architecture [J].
Agyapong, Patrick Kwadwo ;
Iwamura, Mikio ;
Staehle, Dirk ;
Kiess, Wolfgang ;
Benjebbour, Anass .
IEEE COMMUNICATIONS MAGAZINE, 2014, 52 (11) :65-75
[2]  
Akinyele JosephA., 2011, P 1 ACM WORKSHOP SEC, P75, DOI DOI 10.1145/2046614.2046628
[3]  
[Anonymous], 2012, P ANN FOR P AHS INT, DOI DOI 10.1109/DEST.2012.6227909
[4]   Secure, efficient and revocable data sharing scheme for vehicular fogs [J].
Fan, Kai ;
Wang, Junxiong ;
Wang, Xin ;
Li, Hui ;
Yang, Yintang .
PEER-TO-PEER NETWORKING AND APPLICATIONS, 2018, 11 (04) :766-777
[5]  
Gilbert H, 2004, LECT NOTES COMPUT SC, V3006, P175
[6]  
Goyal V., 2006, 13 ACM CONFCOMPUT CO, P89, DOI DOI 10.1145/1180405.1180418
[7]   Joint Caching and Pricing Strategies for Popular Content in Information Centric Networks [J].
Hajimirsadeghi, Mohammad ;
Mandayam, Narayan B. ;
Reznik, Alex .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2017, 35 (03) :654-667
[8]   Privacy Access Control Model for Aggregated e-Health Services [J].
Hung, Patrick C. K. ;
Zheng, Yi .
2007 11TH IEEE INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE WORKSHOPS, 2007, :12-19
[9]   Toward Content-Centric Privacy in ICN: Attribute-based Encryption and Routing [J].
Ion, Mihaela ;
Zhang, Jianqing ;
Schooler, Eve M. .
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2013, 43 (04) :513-514
[10]  
King S., 2012, self-published paper, V19