Efficient and Secure Data Sharing for 5G Flying Drones: A Blockchain-Enabled Approach

被引:142
作者
Feng, Chaosheng [1 ]
Yu, Keping [2 ]
Bashir, Ali Kashif [3 ,4 ]
Al-Otaibi, Yasser D. [5 ]
Lu, Yang [6 ]
Chen, Shengbo [7 ]
Zhang, Di [8 ]
机构
[1] Sichuan Normal Univ, Dept Comp Sci, Chengdu, Peoples R China
[2] Waseda Univ, Tokyo, Japan
[3] Manchester Metropolitan Univ, Dept Comp & Math, Manchester, Lancs, England
[4] Natl Univ Sci & Technol Islamabad NUST, Islamabad, Pakistan
[5] King Abdulaziz Univ, Fac Comp & Informat Technol Rabigh, Dept Informat Syst, Jeddah, Saudi Arabia
[6] Univ Kent, Canterbury, Kent, England
[7] Henan Univ, Sch Comp & Informat Engn, Kaifeng, Peoples R China
[8] Zhengzhou Univ, Zhengzhou, Peoples R China
来源
IEEE NETWORK | 2021年 / 35卷 / 01期
基金
中国国家自然科学基金; 日本学术振兴会;
关键词
Computational modeling; Smart contracts; Authentication; Public key cryptography; Data models; Encryption; Drones; ATTRIBUTE-BASED ENCRYPTION;
D O I
10.1109/MNET.011.2000223
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The drones open and untrusted environment may create problems for authentication and data sharing. To address this issue, we propose a blockchain-enabled efficient and secure data sharing model for 5G flying drones. In this model, blockchain and attribute-based encryption (ABE) are applied to ensure the security of instruction issues and data sharing. The authentication mechanism in the model employs a smart contract for authentication and access control, public key cryptography for providing accounts and ensuring accounts security, and a distributed ledger for security audit. In addition, to speed up out-sourced computations and reduce electricity consumption, an ABE model with parallel outsourced computation (ABEM-POC) is constructed, and a generic parallel computation method for ABE is proposed. The analysis of the experimental results shows that parallel computation significantly improves the speed of outsourced encryption and decryption compared to serial computation.
引用
收藏
页码:130 / 137
页数:8
相关论文
共 15 条
  • [1] Ahuja R., 2017, IEEE T CLOUD COMP
  • [2] Ciphertext-policy attribute-based encryption
    Bethencourt, John
    Sahai, Amit
    Waters, Brent
    [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +
  • [3] Chen JH, 2019, 2019 IEEE MTT-S INTERNATIONAL WIRELESS SYMPOSIUM (IWS 2019), DOI [10.1109/ieee-iws.2019.8803964, 10.1109/TITS.2018.2889746]
  • [4] A Blockchain-Based Privacy-Preserving Payment Mechanism for Vehicle-to-Grid Networks
    Gao, Feng
    Zhu, Liehuang
    Shen, Meng
    Sharif, Kashif
    Wan, Zhiguo
    Ren, Kui
    [J]. IEEE NETWORK, 2018, 32 (06): : 184 - 192
  • [5] Goyal V., 2006, P 13 ACM C COMP COMM, P89, DOI DOI 10.1145/1180405.1180418
  • [6] Revisiting Attribute-Based Encryption With Verifiable Outsourced Decryption
    Lin, Suqing
    Zhang, Rui
    Ma, Hui
    Wang, Mingsheng
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (10) : 2119 - 2130
  • [7] Generic and Efficient Constructions of Attribute-Based Encryption with Verifiable Outsourced Decryption
    Mao, Xianping
    Lai, Junzuo
    Mei, Qixiang
    Chen, Kefei
    Weng, Jian
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2016, 13 (05) : 533 - 546
  • [8] Attribute-Based Encryption With Efficient Verifiable Outsourced Decryption
    Qin, Baodong
    Deng, Robert H.
    Liu, Shengli
    Ma, Siqi
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (07) : 1384 - 1393
  • [9] Blockchain-Enabled Reliable Osmotic Computing for Cloud of Things: Applications and Challenges
    Rasool, Saqib
    Saleem, Afshan
    Iqbal, Muddessar
    Dagiuklas, Tasos
    Bashir, Ali Kashif
    Mumtaz, Shahid
    Otaibi, Sattam Al
    [J]. IEEE Internet of Things Magazine, 2020, 3 (02): : 63 - 67
  • [10] Security Challenges for the Public Cloud
    Ren, Kui
    Wang, Cong
    Wang, Qian
    [J]. IEEE INTERNET COMPUTING, 2012, 16 (01) : 69 - 73