4.7 Article

Achieving Privacy-Preserving and Verifiable Data Sharing in Vehicular Fog With Blockchain

Journal

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TITS.2020.2983466

Keywords

Sensors; Data aggregation; Reliability; Cryptography; Data privacy; Location privacy-preservation; permissioned blockchain; verifiability; vehicular sensing

Funding

  1. [2018YFB1800800]
  2. [2018B030338001]
  3. [NSFC61629101]
  4. [ZDSYS201707251409055]
  5. [2017ZT07X152]

Ask authors/readers for more resources

Vehicular sensing, combined with fog computing, allows for efficient and secure data collection and sharing at the network edge. Leveraging a permissioned blockchain ensures privacy protection and verifiability in the sharing of sensory data. Performance evaluations demonstrate improvements in efficiency compared to traditional schemes without blockchain integration.
Vehicular sensing is advocated to perform data collection by exploiting a plethora of vehicular on-board sensors; meanwhile, with the merging of vehicular sensing and fog computing, the deployed road side units (RSUs) can act as fog nodes to collect and share vehicular sensory data at the network edge. However, there are still several problems in terms of the secure and reliable sharing of sensory data in vehicular fog. To resolve these issues, in this paper, we present an efficient, privacy-preserving and verifiable sensory data collection and sharing scheme with a permissioned blockchain in vehicular fog. During the data collection phase, by combining the homomorphic 2-DNF (Disjunctive Normal Form) cryptosystem and an identity-based signcryption scheme, our proposed scheme achieves the secure and verifiable computation of the average and variance of the collected vehicular sensory data. Meanwhile, to achieve efficient and reliable data sharing, we exploit a permissioned blockchain to maintain an immutable and tamper-proof record of the derived sensory data. Security analysis demonstrates the security properties of the proposed scheme, in terms of location privacy preservation, verifiability and immutability. Performance evaluations are conducted to validate the efficiency of the proposed scheme, i.e., improvements in computation and communication efficiency in comparison with a scheme without exploiting blockchain.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available