首页 | 本学科首页   官方微博 | 高级检索  
     

一种使用区块链保护车联网数据隐私的方法
引用本文:杨颜博,张嘉伟,马建峰. 一种使用区块链保护车联网数据隐私的方法[J]. 西安电子科技大学学报(自然科学版), 2021, 48(3): 21-30. DOI: 10.19665/j.issn1001-2400.2021.03.003
作者姓名:杨颜博  张嘉伟  马建峰
摘    要:随着物联网的快速发展和成熟,汽车工业领域的应用正经历着从早期的车辆Ad-Hoc网络到车联网的快速转变,数以万计的车辆及其搭载的各种车载设备都将通过车联网实现车辆或驾驶数据的共享和交互,而这些海量的数据的存储以及其中的大量用户隐私和数据安全问题带来巨大的挑战,尤其是访问控制、信任和密钥托管问题.针对该问题提出了一种基于区...

关 键 词:区块链  属性基加密  策略部分隐藏  分布式存储  可验证外包解密
收稿时间:2020-12-14

Method for using the blockchain to protect data privacy of IoV
YANG Yanbo,ZHANG Jiawei,MA Jianfeng. Method for using the blockchain to protect data privacy of IoV[J]. Journal of Xidian University, 2021, 48(3): 21-30. DOI: 10.19665/j.issn1001-2400.2021.03.003
Authors:YANG Yanbo  ZHANG Jiawei  MA Jianfeng
Affiliation:1. School of Information Engineering,Inner Mongolia University of Science & Technology,Baotou 014040,China;2. School of Cyber Engineering,Xidian University,Xi’an 710071,China
Abstract:With the rapid development of the Internet of Things,vehicle industry is undergoing a rapid transformation from the early vehicle Ad-Hoc network to the Internet of Vehicles (IoV) in which massive vehicles and on-board smart devices can realize data sharing and interaction.However,this brings about a big challenge for the security of shared data in a huge volume containing a lot of user privacy,especially the issues of access control,trust and key escrow.To address these problems,we propose an efficient blockchain-based distributed data sharing method in IoV.In our scheme,blockchain transactions are utilized for trustworthily data storage and access as well as user revocation.To realize end device verification,we introduce certificateless cryptography for transaction verification of blockchain nodes and the ease of the key escrow problem.Moreover,we propose an efficient partial policy-hidden CP-ABE scheme for data fine-grained access control with efficient user revocation.Security analysis and experiments demonstrate that our scheme is secure,efficient and practical.
Keywords:blockchain  attribute-based encryption  strategy partial hiding  distributed storage  verifiable outsourcing decryption  
点击此处可从《西安电子科技大学学报(自然科学版)》浏览原始摘要信息
点击此处可从《西安电子科技大学学报(自然科学版)》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号