Abstract
While IoT devices provide people with richer and more complete services, they also generate a large amount of device data. The potential value of these data has spawned IoT data transactions. In the blockchain environment, due to its decentralization characteristics, the validity of transactions can be guaranteed, but the transaction information of the blockchain will be stored and visible by all nodes. The use of asymmetric encryption to realize data sharing on the blockchain faces the challenge of privacy. The risk of key leakage and flexible data sharing cannot be achieved. Aiming at this problem, this paper proposes an IoT data transaction model in the blockchain environment, realizes multi-party IoT data sharing with the help of proxy re-encryption, and uses zero-knowledge proof to realize the identity verification mechanism. Finally, experiments show that the model is effective and feasible in terms of cost and efficiency.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Ganzha, M., Paprzycki, M., Pawlowski, W.: Semantic technologies for the IoT - an inter- IoT perspective. In: IEEE First International Conference on Internet-of-Things Design and Im- plementation (IoTDI) (2016)
Kim, H., Ahmad, A., Hwang, J.Y.: IoT-TaaS: towards a prospective IoT testing framework. IEEE Access 2018, 1 (2018)
Guo, W., Xiong, N., Vasilakos, A.V., Chen, H., Cheng, H.: Multi-source temporal data aggregation in wireless sensor networks. Wirel. Pers. Commun. 56(3), 359–370 (2011)
Cheng, J., Yang, Y., Tang, X., Xiong, N., Zhang, Y., Lei, F.: Generative adversarial net- works: a literature review. KSII Trans. Internet Inf. Syst. 14(12), 4625–4647 (2020)
Cheng, J., Liu, J., Xu, X., Xia, D., Liu, L., Sheng, V.: A review of Chinese named entity recognition. KSII Trans. Internet Inf. Syst. 15(6), 2012–2030 (2012)
Lei, F., Cheng, J., Yang, Y., Tang, X., Sheng, V., Huang, C.: Improving heterogeneous net- work knowledge transfer based on the principle of generative adversarial. Electronics 10(13), 1525 (2021)
Huang, S., Liu, A., Zhang, S., Wang, T., Xiong, N.: BD-VTE: a novel baseline data based verifiable trust evaluation scheme for smart network systems. IEEE Trans. Netw. Sci. Eng. 8, 2087–2105 (2020)
Wang, Q., Zhu, X., Ni, Y.: Blockchain for the IoT and Industrial IoT: a review. Internet of Things 10, 100081 (2020)
Tang, X., Tu, W., Li, K., Cheng, J.: DFFNet: an iot-perceptive dual feature fusion network for general real-time semantic segmentation. Inf. Sci. 565, 326–343 (2021)
Rathod, A.Y., Pandya, S., Doshi, N.: IoT and modern marketing: its social. In: 22nd International Conference on Advanced Communication Technology (ICACT) (2020)
Tu, M., Lim, M.K., Yang, F.M.: IoT-based production logistics and supply chain system - part 1: modeling IoT-based manufacturing IoT supply chain. Ind. Manag. Data Syst. 118(1), 65–95 (2018)
Steichen, M., Pontiveros, B., Norvill, R.: Blockchain-based, decentralized access control for. In: 2018 IEEE International Conference on Blockchain (Blockchain-2018) (2018)
Zheng, Q., Yi, L., Ping, C.: An innovative IPFS-based storage model for blockchain. In: ACM International Conference on Web Intelligence (WI) (2018)
Zaghloul, E., Li, T., Mutka, M.W.: Bitcoin and blockchain: security and privacy. IEEE Internet Things J. 2020(99), 1 (2020)
Notra, S., Siddiqi, M., Gharakheili, H.H.: An experimental study of security and privacy risks with emerging household appliances. In: 2014 IEEE Conference on Communications and Network Security, pp. 79–84 (2014)
Byabazaire, J., Ohare, G., Delaney, D.: Data quality and trust: review of challenges and opportunities for data sharing in IoT. Electronics 9(12), 2083 (2020)
Manzoor, A., Liyanage, M., An, B., Kanhere, S.S., Lianttila, M.: Blockchain based proxy re-encryption scheme for secure IoT data sharing. In: IEEE International Conference on Blockchain and Cryptocurrency (2019)
Sun, Y., Yin, L., Sun, Z.: An IoT data sharing privacy preserving scheme. In: IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS (2020)
Hou, M., Kang, T., Guo, L.: A blockchain based architecture for IoT data sharing systems. In: 2020 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops) (2020)
Hossain, S.K.A., Rahman, M.A., Hossain, M.A.: Edge computing framework for enabling situation awareness in IoT based smart city. J. Parallel Distrib. Comput. 122, 226–237 (2018)
Liu, C.H., Lin, Q., Wen, S.: Blockchain-enabled data collection and sharing for industrial iot with deep reinforcement learning. IEEE Trans. Ind. Inf. 15, 3516–3526 (2019)
Xu, R., Chen, Y., Blasch, E.: A federated capability-based access control mechanism for internet of things (IoTs). In: Sensors and Systems for Space Applications XI, vol. 10641, p. 106410U. International Society for Optics and Photonics (2018)
Dinh, T., Liu, R., Zhang, M.: Untangling blockchain: a data processing view of blockchain systems. IEEE Trans. Knowl. Data Eng. 30(7), 1366–1385 (2017)
Kaushik, A., Choudhary, A., Ektare, C.: Blockchain - literature survey. In: 2nd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT) (2017)
Lai, J.Z., Zhu, W.T., Deng, R.H.: New constructions for identity-based unidirectional proxy re-encryption. J. Comput. Sci. Technol. 25(4), 793–806 (2010)
Kim, S.H., Lee, I.Y.: IoT device security based on proxy re-encryption. J. Ambient Intell. Humanized Comput. 9, 1–7 (2017)
Ge, C., Susilo, W., Wang, J.: Identity-based conditional proxy re-encryption with fine grain policy. Comput. Stand. Interfaces 52, 1–9 (2017)
Zhu, Y., Wang, H., Hu, Z., Ahn, G.J., Hu, H.: Zero-knowledge proofs of retrievability. Sci. China Inf. Sci. 54(8), 1608–1617 (2011)
Pop, C.D., Antal, M., Cioara, T., Anghel, I., Salomie, I.: Blockchain and demand response: Zero-knowledge proofs for energy transactions privacy. Sensors 20(19), 5678 (2020)
Mitani, T., Otsuka, A.: Traceability in permissioned blockchain. In: IEEE International Conference on Blockchain (Blockchain) (2019)
Acknowledgement
This work was supported by National Natural Science Foundation of China (Grant No. 62162022 and 62162024), Key Projects in Hainan Province (Grant ZDYF2021GXJS003 and Grant ZDYF2020040), the Major science and technology project of Hainan Province (Grant No. ZDKJ2020012).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Guo, H. et al. (2022). IoT Data Blockchain-Based Transaction Model Using Zero-Knowledge Proofs and Proxy Re-encryption. In: Sun, X., Zhang, X., Xia, Z., Bertino, E. (eds) Artificial Intelligence and Security. ICAIS 2022. Lecture Notes in Computer Science, vol 13339. Springer, Cham. https://doi.org/10.1007/978-3-031-06788-4_48
Download citation
DOI: https://doi.org/10.1007/978-3-031-06788-4_48
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-06787-7
Online ISBN: 978-3-031-06788-4
eBook Packages: Computer ScienceComputer Science (R0)