A Blockchain-based Conditional Privacy-Preserving Traffic Data Sharing in Cloud

被引:12
作者
Liu, Jingwei [1 ]
Zhang, Gaojian [1 ]
Sun, Rong [2 ]
Du, Xiaojiang [3 ]
Guizani, Mohsen [4 ]
机构
[1] Xidian Univ, Shaanxi Key Lab Blockchain & Secure Comp, Xian 710071, Peoples R China
[2] Xidian Univ, State Key Lab ISN, Xian 710071, Peoples R China
[3] Temple Univ, Dept Comp & Informat Sci, Philadelphia, PA 19122 USA
[4] Qatar Univ, Dept Comp Sci & Engn, Doha, Qatar
来源
ICC 2020 - 2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC) | 2020年
关键词
SECURITY MODEL;
D O I
10.1109/icc40277.2020.9148864
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
As a typical application scenarios of Internet of Things (IoT), Internet of Vehicles (IoV) is playing an important role in the field of intelligent transportation. In such a system, vehicles are allowed to collect ambient sensing data and communicate with other vehicles, roadside infrastructure, cloud server, even personal mobile smart devices in order to exchange the relevant traffic information that usually includes the owners' sensitive information, such as geographical location or personally identifiable information. However, in open network environment, different wireless communication technologies make all these information vulnerable to various attacks and compromises. The users' private information is put at the risk of leaking at any time. To address this issue, a blockchain-based privacy-preserving traffic data sharing protocol with cloud storage is proposed based on a novel heterogeneous signcryption scheme between Public Key Infrastructure (PKI) and Certificateless Cryptosystem (CLC). Through theoretical and simulation analysis in terms of security, complexity and time consumption, the proposed traffic data sharing protocol is proved to meet the security requirements of data tamper-proofing, anonymity and traceability with higher efficiency.
引用
收藏
页数:6
相关论文
共 20 条
[1]   A Privacy-Preserving Vehicular Crowdsensing-Based Road Surface Condition Monitoring System Using Fog Computing [J].
Basudan, Sultan ;
Lin, Xiaodong ;
Sankaranarayanan, Karthik .
IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (03) :772-782
[2]  
Cheng X., 2019, ZTE Communications, V17, P44
[3]   A Detection Method for a Novel DDoS Attack against SDN Controllers by Vast New Low-Traffic Flows [J].
Dong, Ping ;
Du, Xiaojiang ;
Zhang, Hongke ;
Xu, Tong .
2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2016,
[4]  
Du X., 2001, 2001 IEEE/IFIP International Symposium on Integrated Network Management Proceedings. Integrated Network Management VII. Integrated Management Strategies for the New Millennium (Cat. No.01EX470), P453, DOI 10.1109/INM.2001.918059
[5]   A routing-driven key management scheme for Heterogeneous Sensor Networks [J].
Du, Xiaojiang ;
Xiao, Yang ;
Ci, Song ;
Guizani, Mohsen ;
Chen, Hsiao-Hwa .
2007 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-14, 2007, :3407-+
[6]   Defending DoS attacks on broadcast authentication in wireless sensor networks [J].
Du, Xiaojiang ;
Xiao, Yang ;
Guizani, Mohsen ;
Chen, Hsiao-Hwa .
2008 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, PROCEEDINGS, VOLS 1-13, 2008, :1653-+
[7]   Certificateless aggregate signcryption: Security model and a concrete construction secure in the random oracle model [J].
Eslami, Ziba ;
Pakniat, Nasrollah .
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2014, 26 (03) :276-286
[8]  
Hani AFM, 2014, 2014 INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCES (ICCOINS)
[9]   LNSC: A Security Model for Electric Vehicle and Charging Pile Management Based on Blockchain Ecosystem [J].
Huang, Xiaohong ;
Xu, Cheng ;
Wang, Pengfei ;
Liu, Hongzhe .
IEEE ACCESS, 2018, 6 :13565-13574
[10]  
Huang XL, 2014, IEEE CONF COMPUT, P512, DOI 10.1109/INFCOMW.2014.6849284