skip to main content
research-article

Blockchain-based Data Sharing System for Sensing-as-a-Service in Smart Cities

Published: 15 March 2021 Publication History

Abstract

The sensing-as-a-service (SaaS) model has been explored to address the challenge of intractability of managing a large number of sensors faced by future smart cities. However, how to effectively share sensor data without compromising confidentiality, privacy protection, and fair trading without third parties is one of critical issues that must be solved in the SaaS in smart cities. While blockchain shows promise in solving these issues, the existing blockchain-based data sharing (BBDS) systems are difficult to apply to SaaS in smart cities because of many unresolved issues such as requiring a customized blockchain, huge storage, communication and computation costs, and dependence on a third party to achieve fair trading. We propose a BBDS system model with its security requirements before we present a concrete construction by combining -protocol, Paillier encryption scheme, and any secure symmetrical encryption and signature schemes. To demonstrate the utility of our proposed BBDS system, we present a security analysis and compare our system with other solutions. We implement the prototype in Remix to analyze the gas cost, and we conduct experiments to evaluate the communication and computation costs of the BBDS system using symmetric encryption (advanced encryption standard (AES)) and a signature scheme (elliptic curve digital signature algorithm (ECDSA)).

References

[1]
Asma Alshehri and Ravi Sandhu. 2017. Access control models for virtual object communication in cloud-enabled IoT. In Proceedings of the IEEE International Conference on Information Reuse and Integration, Chengcui Zhang, Balaji Palanisamy, Latifur Khan, and Sahra Sedigh Sarvestani (Eds.). IEEE Computer Society, 16–25.
[2]
Mihir Bellare and Phillip Rogaway. 1993. Random oracles are practical: A paradigm for designing efficient protocols. In Proceedings of the 1st ACM Conference on Computer and Communications Security, Dorothy E. Denning, Raymond Pyle, Ravi Ganesan, Ravi S. Sandhu, and Victoria Ashby (Eds.). ACM, 62–73.
[3]
Francesco Buccafurri, Vincenzo De Angelis, Gianluca Lax, Lorenzo Musarella, and Antonia Russo. 2019. An attribute-based privacy-preserving Ethereum solution for service delivery with accountability requirements. In Proceedings of the 14th International Conference on Availability, Reliability and Security. ACM, 24:1–24:6.
[4]
Matteo Campanelli, Rosario Gennaro, Steven Goldfeder, and Luca Nizzardo. 2017. Zero-knowledge contingent payments revisited: Attacks and payments for services. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, Bhavani M. Thuraisingham, David Evans, Tal Malkin, and Dongyan Xu (Eds.). ACM, 229–243.
[5]
Xiaofeng Chen, Jin Li, Jianfeng Ma, Wenjing Lou, and Duncan S. Wong. 2014. New and efficient conditional e-payment systems with transferability. Fut. Gen. Comput. Syst. 37 (2014), 252–258.
[6]
Xiaofeng Chen, Jin Li, and Willy Susilo. 2012. Efficient fair conditional payments for outsourcing computations. IEEE Trans. Inf. Forens. Sec. 7, 6 (2012), 1687–1694.
[7]
Mohammad Jabed Morshed Chowdhury, Alan Colman, Muhammad Ashad Kabir, Jun Han, and Paul Sarda. 2018. Blockchain as a notarization service for data sharing with personal data store. In Proceedings of the 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and the 12th IEEE International Conference on Big Data Science and Engineering. IEEE, 1330–1335.
[8]
Ivan Damgård, Mads Jurik, and Jesper Buus Nielsen. 2010. A generalization of Paillier’s public-key system with applications to electronic voting. Int. J. Inf. Sec. 9, 6 (2010), 371–385.
[9]
Maria Luisa Damiani, Elisa Bertino, Barbara Catania, and Paolo Perlasca. 2007. GEO-RBAC: A spatially aware RBAC. ACM Trans. Inf. Syst. Sec. 10, 1 (2007), 2.
[10]
Stefan Dziembowski, Lisa Eckey, and Sebastian Faust. 2018. FairSwap: How to fairly exchange digital goods. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, David Lie, Mohammad Mannan, Michael Backes, and XiaoFeng Wang (Eds.). ACM, 967–984.
[11]
Mohamed Ali Feki, Fahim Kawsar, Mathieu Boussard, and Lieven Trappeniers. 2013. The Internet of Things: The next technological revolution. IEEE Comput. 46, 2 (2013), 24–25.
[12]
Amos Fiat and Adi Shamir. 1986. How to prove yourself: Practical solutions to identification and signature problems. In Proceedings of the Advances in Cryptology Conference (Lecture Notes in Computer Science), Andrew M. Odlyzko (Ed.), Vol. 263. Springer, 186–194.
[13]
Aditya Gaur, Bryan W. Scotney, Gerard P. Parr, and Sally I. McClean. 2015. Smart city architecture and its applications based on IoT. In Proceedings of the 6th International Conference on Ambient Systems, Networks and Technologies and the 5th International Conference on Sustainable Energy Information Technology (Procedia Computer Science), Elhadi M. Shakshuki (Ed.), Vol. 52. Elsevier, 1089–1094.
[14]
Badis Hammi, Rida Khatoun, Sherali Zeadally, Achraf Fayad, and Lyes Khoukhi. 2018. IoT technologies for smart cities. IET Netw. 7, 1 (2018), 1–13.
[15]
Juan Antonio Guerrero Ibáñez, Sherali Zeadally, and Juan Contreras-Castillo. 2018. Sensor technologies for intelligent transportation systems. Sensors 18, 4 (2018), 1212.
[16]
Toshiyuki Isshiki, Manh Ha Nguyen, and Keisuke Tanaka. 2013. Proxy re-encryption in a stronger security model extended from CT-RSA2012. In Proceedings of the Topics in Cryptology Conference (Lecture Notes in Computer Science), Ed Dawson (Ed.), Vol. 7779. Springer, 277–292.
[17]
Jiawen Kang, Rong Yu, Xumin Huang, Maoqiang Wu, Sabita Maharjan, Shengli Xie, and Yan Zhang. 2019. Blockchain for secure and efficient data sharing in vehicular edge computing and networks. IEEE Internet Things J. 6, 3 (2019), 4660–4670.
[18]
Rida Khatoun and Sherali Zeadally. 2016. Smart cities: Concepts, architectures, research opportunities. Commun. ACM 59, 8 (2016), 46–57.
[19]
Yun-kyung Lee, Jae-Deok Lim, Yong-seong Jeon, and Jeong-Nyeo Kim. 2015. Technology trends of access control in IoT and requirements analysis. In Proceedings of the International Conference on Information and Communication Technology. IEEE, 1031–1033.
[20]
Kaitai Liang, Liming Fang, Willy Susilo, and Duncan S. Wong. 2013. A ciphertext-policy attribute-based proxy re-encryption with chosen-ciphertext security. In Proceedings of the 5th International Conference on Intelligent Networking and Collaborative Systems. IEEE, 552–559.
[21]
Chao Lin, Debiao He, Xinyi Huang, Kim-Kwang Raymond Choo, and Athanasios V. Vasilakos. 2018. BSeIn: A blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0. J. Netw. Comput. Applic. 116 (2018), 42–52.
[22]
Ahsan Manzoor, Madhsanka Liyanage, An Braeke, Salil S. Kanhere, and Mika Ylianttila. 2019. Blockchain based proxy re-encryption scheme for secure IoT data sharing. In Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency. IEEE, 99–103.
[23]
Oscar Novo. 2018. Blockchain meets IoT: An architecture for scalable access management in IoT. IEEE Internet Things J. 5, 2 (2018), 1184–1195.
[24]
Alex Pazaitis, Primavera De Filippi, and Vasilis Kostakis. 2017. Blockchain and value systems in the sharing economy: The illustrative case of backfeed. Technol. Forecast. Soc. Change 125 (2017), 105–115.
[25]
Charith Perera, Arkady B. Zaslavsky, Peter Christen, and Dimitrios Georgakopoulos. 2014. Sensing as a service model for smart cities supported by Internet of Things. Trans. Emerg. Telecomm. Technol. 25, 1 (2014), 81–93.
[26]
Omaji Samuel, Nadeem Javaid, Muhammad Awais, Zeeshan Ahmed, Muhammad Imran, and Mohsen Guizani. 2019. A blockchain model for fair data sharing in deregulated smart grids. In Proceedings of the IEEE Global Communications Conference. IEEE, 1–7.
[27]
Hossein Shafagh, Lukas Burkhalter, Anwar Hithnawi, and Simon Duquennoy. 2017. Towards blockchain-based auditable storage and sharing of IoT data. In Proceedings of the 9th Cloud Computing Security Workshop, Bhavani M. Thuraisingham, Ghassan Karame, and Angelos Stavrou (Eds.). ACM, 45–50.
[28]
Amritraj Singh, Kelly Click, Reza M. Parizi, Qi Zhang, Ali Dehghantanha, and Kim-Kwang Raymond Choo. 2020. Sidechain technologies in blockchain networks: An examination and state-of-the-art review. J. Netw. Comput. Applic. 149 (2020).
[29]
Amritraj Singh, Reza M. Parizi, Qi Zhang, Kim-Kwang Raymond Choo, and Ali Dehghantanha. 2020. Blockchain smart contracts formalization: Approaches and challenges to address vulnerabilities. Comput. Sec. 88 (2020).
[30]
Madhusudan Singh and Shiho Kim. 2017. Blockchain based intelligent vehicle data sharing framework. CoRR abs/1708.09721 (2017).
[31]
Kehua Su, Jie Li, and Hongbo Fu. 2011. Smart city and the applications. In Proceedings of the International Conference on Electronics, Communications and Control. IEEE, 1028–1031.
[32]
Mang Su and Liangchen Wang. 2019. PreBAC: A novel access control scheme based proxy re-encryption for cloud computing. ACM Trans. Interact. Intell. Syst. 13, 5 (2019), 2754–2767.
[33]
Don Tapscott and Alex Tapscott. 2016. Blockchain Revolution: How the Technology behind Bitcoin is Changing Money, Business, and the World. Penguin.
[34]
Ovidiu Vermesan, Peter Friess, Patrick Guillemin, Sergio Gusmeroli, Harald Sundmaeker, Alessandro Bassi, Ignacio Soler Jubert, Margaretha Mazura, Mark Harrison, Markus Eisenhauer et al. 2011. Internet of things strategic research roadmap. Internet Things—Global Technol. Soc. Trends 1, 2011 (2011), 9–52.
[35]
Gavin Wood et al. 2014. Ethereum: A secure decentralised generalised transaction ledger. Ether. Proj. Yell. Pap. 151, 2014 (2014), 1–32.
[36]
Kan Yang, Xiaohua Jia, and Kui Ren. 2013. Attribute-based fine-grained access control with efficient revocation in cloud storage systems. In Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, Kefei Chen, Qi Xie, Weidong Qiu, Ninghui Li, and Wen-Guey Tzeng (Eds.). ACM, 523–528.
[37]
Abbas Yazdinejad, Reza M. Parizi, Ali Dehghantanha, and Kim-Kwang Raymond Choo. 2020. P4-to-blockchain: A secure blockchain-enabled packet parser for software defined networking. Comput. Sec. 88 (2020).
[38]
Arkady B. Zaslavsky, Charith Perera, and Dimitrios Georgakopoulos. 2013. Sensing as a service and big data. CoRR abs/1301.0159 (2013).
[39]
Y. Zhang, R. Deng, X. Liu, and D. Zheng. 2018. Outsourcing service fair payment based on blockchain and its applications in cloud computing. IEEE Trans. Serv. Comput. (2018), 1–1.
[40]
Yinghui Zhang, Robert H. Deng, Ximeng Liu, and Dong Zheng. 2018. Blockchain based efficient and robust fair payment for outsourcing services in cloud computing. Inf. Sci. 462 (2018), 262–277.
[41]
Yinghui Zhang, Jin Li, Xiaofeng Chen, and Hui Li. 2016. Anonymous attribute-based proxy re-encryption for access control in cloud computing. Sec. Commun. Netw. 9, 14 (2016), 2397–2411.

Cited By

View all
  • (2025)Reliable and cost-efficient session provisioning in CRNs using spectrum sensing as a serviceAd Hoc Networks10.1016/j.adhoc.2024.103716168(103716)Online publication date: Mar-2025
  • (2024)SFOM-DT: A Secure and Fair One-to-Many Data Trading Scheme Based on BlockchainIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.347581619(10029-10042)Online publication date: 1-Jan-2024
  • (2024)Generic Quantum Blockchain-Envisioned Security Framework for IoT Environment: Architecture, Security Benefits and Future ResearchIEEE Open Journal of the Computer Society10.1109/OJCS.2024.33973075(248-267)Online publication date: 2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Transactions on Internet Technology
ACM Transactions on Internet Technology  Volume 21, Issue 2
June 2021
599 pages
ISSN:1533-5399
EISSN:1557-6051
DOI:10.1145/3453144
  • Editor:
  • Ling Liu
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 15 March 2021
Online AM: 07 May 2020
Accepted: 01 April 2020
Revised: 01 April 2020
Received: 01 November 2019
Published in TOIT Volume 21, Issue 2

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Fairness
  2. data sharing
  3. pseudonymity
  4. Sensor-as-a-Service
  5. smart cities

Qualifiers

  • Research-article
  • Refereed

Funding Sources

  • National Natural Science Foundation of China
  • Natural Science Foundation of Hubei Province of China

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)47
  • Downloads (Last 6 weeks)1
Reflects downloads up to 16 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2025)Reliable and cost-efficient session provisioning in CRNs using spectrum sensing as a serviceAd Hoc Networks10.1016/j.adhoc.2024.103716168(103716)Online publication date: Mar-2025
  • (2024)SFOM-DT: A Secure and Fair One-to-Many Data Trading Scheme Based on BlockchainIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.347581619(10029-10042)Online publication date: 1-Jan-2024
  • (2024)Generic Quantum Blockchain-Envisioned Security Framework for IoT Environment: Architecture, Security Benefits and Future ResearchIEEE Open Journal of the Computer Society10.1109/OJCS.2024.33973075(248-267)Online publication date: 2024
  • (2024)Hybrid optimization enabled secure privacy preserved data sharing based on blockchainWireless Networks10.1007/s11276-023-03588-y30:3(1553-1574)Online publication date: 1-Apr-2024
  • (2023)Blockchain-Based Privacy-Preserving Sensor Data Sharing with Fine-Grained Authorization in MicrogridSecurity and Communication Networks10.1155/2023/96218392023Online publication date: 1-Jan-2023
  • (2023)A Blockchain-Based Privacy-Preserving Model for Consent and Transparency in Human-Centered Internet of ThingsProceedings of the 8th ACM/IEEE Conference on Internet of Things Design and Implementation10.1145/3576842.3582379(301-314)Online publication date: 9-May-2023
  • (2023)User-centric privacy preserving models for a new era of the Internet of ThingsJournal of Network and Computer Applications10.1016/j.jnca.2023.103695217:COnline publication date: 1-Aug-2023
  • (2022)A Blockchain-Based Machine Learning Framework for Edge Services in IIoTIEEE Transactions on Industrial Informatics10.1109/TII.2021.309713118:3(1918-1929)Online publication date: Mar-2022
  • (2022)State-of-the-art solutions of blockchain technology for data dissemination in smart citiesComputer Communications10.1016/j.comcom.2022.03.013189:C(120-147)Online publication date: 23-May-2022
  • (2021)Recent Advances in Wearable Sensing TechnologiesSensors10.3390/s2120682821:20(6828)Online publication date: 14-Oct-2021
  • Show More Cited By

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media