Abstract
With the development of Blockchain, cloud computing, and artificial intelligence, smart transportation is highly likely to drive urban transportation in the direction of intelligence and digitalization. However, when connected vehicle devices share data in edge networks, there are security and privacy issues, e.g. leakage of sensitive information will cause serious threats. The separation of user data ownership and physical control requires users to impose access control on the outsourced data. Existing privacy protection schemes still suffer from problems such as a lack of supervision of centralized third-party cloud servers, which face the challenge of data leakage. In this paper, Blockchain and proxy re-encryption techniques are used to address these challenges. To enable sharing of the outsourced data in a secure way, Attribute-Based Proxy Re-encryption (ABPRE) is a popular technique. At the same time, verifiability enables the shared user to verify that the re-encrypted ciphertext returned by the server is correct. In addition, the introduction of a decentralized Blockchain provides distributed storage and it is tamper-proof for enhancing the trustworthiness of the connected vehicle devices as well as the security of the communication between the entities. The security and performance analyses demonstrate that our proposed scheme can achieve the desirable security features and it is efficient for protecting data privacy.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inform. Syst. Secur. (TISSEC) 9(1), 1–30 (2006)
Baker, T., Asim, M., Samwini, H., Shamim, N., Alani, M.M., Buyya, R.: A blockchain-based fog-oriented lightweight framework for smart public vehicular transportation systems. Comput. Netw. 203, 108676 (2022). https://doi.org/10.1016/j.comnet.2021.108676
Bao, Y., Qiu, W., Cheng, X., Sun, J.: Fine-grained data sharing with enhanced privacy protection and dynamic users group service for the IoV. IEEE Trans. Intell. Transp. Syst. 1–15 (2022). https://doi.org/10.1109/TITS.2022.3187980
Blaze, Matt, Bleumer, Gerrit, Strauss, Martin: Divertible protocols and atomic proxy cryptography. In: Nyberg, Kaisa (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 127–144. Springer, Heidelberg (1998). https://doi.org/10.1007/BFb0054122
Elagin, V., Spirkina, A., Buinevich, M., Vladyko, A.: Technological aspects of blockchain application for vehicle-to-network. Information 11(10), 465 (2020)
Feng, T., Wang, D., Gong, R.: A blockchain-based efficient and verifiable attribute-based proxy re-encryption cloud sharing scheme. Information 14(5) (2023). https://doi.org/10.3390/info14050281
Gao, Y., Chen, Y., Hu, X., Lin, H., Liu, Y., Nie, L.: Blockchain based IIoT data sharing framework for SDN-enabled pervasive edge computing. IEEE Trans. Industr. Inf. 17(7), 5041–5049 (2021). https://doi.org/10.1109/TII.2020.3012508
Ge, C., Liu, Z., Xia, J., Fang, L.: Revocable identity-based broadcast proxy re-encryption for data sharing in clouds. IEEE Trans. Dependable Secure Comput. 18(3), 1214–1226 (2021). https://doi.org/10.1109/TDSC.2019.2899300
Ge, C., Susilo, W., Baek, J., Liu, Z., Xia, J., Fang, L.: A verifiable and fair attribute-based proxy re-encryption scheme for data sharing in clouds. IEEE Trans. Dependable Secure Comput. 19(5), 2907–2919 (2021)
Green, Matthew, Ateniese, Giuseppe: Identity-based proxy re-encryption. In: Katz, Jonathan, Yung, Moti (eds.) ACNS 2007. LNCS, vol. 4521, pp. 288–306. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-72738-5_19
Hanaoka, G., et al.: Generic construction of chosen ciphertext secure proxy re-encryption. In: Dunkelman, Orr (ed.) CT-RSA 2012. LNCS, vol. 7178, pp. 349–364. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-27954-6_22
Karthikeyan, H., Usha, G.: Real-time DDoS flooding attack detection in intelligent transportation systems. Comput. Electr. Eng. 101, 107995 (2022). https://doi.org/10.1016/j.compeleceng.2022.107995
Kenney, J.B.: Dedicated short-range communications (DSRC) standards in the United States. Proc. IEEE 99(7), 1162–1182 (2011)
Liang, X., Cao, Z., Lin, H., Shao, J.: Attribute based proxy re-encryption with delegating capabilities. In: Proceedings of the 4th International Symposium on Information, Computer, and Communications security, pp. 276–286 (2009)
Liu, J., Zhang, L., Li, C., Bai, J., Lv, H., Lv, Z.: Blockchain-based secure communication of intelligent transportation digital twins system. IEEE Trans. Intell. Transp. Syst. 23(11), 22630–22640 (2022). https://doi.org/10.1109/TITS.2022.3183379
Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. Decentralized business review (2008)
Ohata, S., Kawai, Y., Matsuda, T., Hanaoka, G., Matsuura, K.: Re-encryption verifiability: how to detect malicious activities of a proxy in proxy re-encryption. In: Nyberg, K. (ed.) Topics in Cryptology – CT-RSA 2015, pp. 410–428. Springer, Cham (2015)
Panigrahy, S.K., Emany, H.: A survey and tutorial on network optimization for intelligent transport system using the internet of vehicles. Sensors 23(1), 555 (2023)
Shao, J.: Anonymous id-based proxy re-encryption, pp. 364–375 (2012). https://doi.org/10.1007/978-3-642-31448-3_27
Xu, L., Wu, X., Zhang, X.: CL-PRE: a certificateless proxy re-encryption scheme for secure data sharing with public cloud. In: Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security. pp. 87–88. ASIACCS 2012. Association for Computing Machinery, New York (2012). https://doi.org/10.1145/2414456.2414507
Zavvos, E., Gerding, E.H., Yazdanpanah, V., Maple, C., Stein, S., Schraefel, M.: Privacy and trust in the internet of vehicles. IEEE Trans. Intell. Transp. Syst. 23(8), 10126–10141 (2022). https://doi.org/10.1109/TITS.2021.3121125
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
He, Y., Liang, T., Huang, P., Xia, Z. (2024). Verifiable Attribute-Based Proxy Re-encryption with Non-repudiation Based on Blockchain. In: Chen, J., Xia, Z. (eds) Blockchain Technology and Emerging Applications. BlockTEA 2023. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 577. Springer, Cham. https://doi.org/10.1007/978-3-031-60037-1_7
Download citation
DOI: https://doi.org/10.1007/978-3-031-60037-1_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-60036-4
Online ISBN: 978-3-031-60037-1
eBook Packages: Computer ScienceComputer Science (R0)