Abstract
The sensing-as-a-service (SaaS) model has been explored to address the challenge of intractability of managing a large number of sensors faced by future smart cities. However, how to effectively share sensor data without compromising confidentiality, privacy protection, and fair trading without third parties is one of critical issues that must be solved in the SaaS in smart cities. While blockchain shows promise in solving these issues, the existing blockchain-based data sharing (BBDS) systems are difficult to apply to SaaS in smart cities because of many unresolved issues such as requiring a customized blockchain, huge storage, communication and computation costs, and dependence on a third party to achieve fair trading. We propose a BBDS system model with its security requirements before we present a concrete construction by combining \(\)-protocol, Paillier encryption scheme, and any secure symmetrical encryption and signature schemes. To demonstrate the utility of our proposed BBDS system, we present a security analysis and compare our system with other solutions. We implement the prototype in Remix to analyze the gas cost, and we conduct experiments to evaluate the communication and computation costs of the BBDS system using symmetric encryption (advanced encryption standard (AES)) and a signature scheme (elliptic curve digital signature algorithm (ECDSA)).
- Asma Alshehri and Ravi Sandhu. 2017. Access control models for virtual object communication in cloud-enabled IoT. In Proceedings of the IEEE International Conference on Information Reuse and Integration, Chengcui Zhang, Balaji Palanisamy, Latifur Khan, and Sahra Sedigh Sarvestani (Eds.). IEEE Computer Society, 16–25. DOI:https://doi.org/10.1109/IRI.2017.60Google ScholarCross Ref
- Mihir Bellare and Phillip Rogaway. 1993. Random oracles are practical: A paradigm for designing efficient protocols. In Proceedings of the 1st ACM Conference on Computer and Communications Security, Dorothy E. Denning, Raymond Pyle, Ravi Ganesan, Ravi S. Sandhu, and Victoria Ashby (Eds.). ACM, 62–73. DOI:https://doi.org/10.1145/168588.168596 Google ScholarDigital Library
- Francesco Buccafurri, Vincenzo De Angelis, Gianluca Lax, Lorenzo Musarella, and Antonia Russo. 2019. An attribute-based privacy-preserving Ethereum solution for service delivery with accountability requirements. In Proceedings of the 14th International Conference on Availability, Reliability and Security. ACM, 24:1–24:6. DOI:https://doi.org/10.1145/3339252.3339279 Google ScholarDigital Library
- Matteo Campanelli, Rosario Gennaro, Steven Goldfeder, and Luca Nizzardo. 2017. Zero-knowledge contingent payments revisited: Attacks and payments for services. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, Bhavani M. Thuraisingham, David Evans, Tal Malkin, and Dongyan Xu (Eds.). ACM, 229–243. DOI:https://doi.org/10.1145/3133956.3134060 Google ScholarDigital Library
- Xiaofeng Chen, Jin Li, Jianfeng Ma, Wenjing Lou, and Duncan S. Wong. 2014. New and efficient conditional e-payment systems with transferability. Fut. Gen. Comput. Syst. 37 (2014), 252–258. Google ScholarDigital Library
- Xiaofeng Chen, Jin Li, and Willy Susilo. 2012. Efficient fair conditional payments for outsourcing computations. IEEE Trans. Inf. Forens. Sec. 7, 6 (2012), 1687–1694. DOI:https://doi.org/10.1109/TIFS.2012.2210880 Google ScholarDigital Library
- Mohammad Jabed Morshed Chowdhury, Alan Colman, Muhammad Ashad Kabir, Jun Han, and Paul Sarda. 2018. Blockchain as a notarization service for data sharing with personal data store. In Proceedings of the 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and the 12th IEEE International Conference on Big Data Science and Engineering. IEEE, 1330–1335. DOI:https://doi.org/10.1109/TrustCom/BigDataSE.2018.00183Google Scholar
- Ivan Damgård, Mads Jurik, and Jesper Buus Nielsen. 2010. A generalization of Paillier’s public-key system with applications to electronic voting. Int. J. Inf. Sec. 9, 6 (2010), 371–385. DOI:https://doi.org/10.1007/s10207-010-0119-9 Google ScholarDigital Library
- Maria Luisa Damiani, Elisa Bertino, Barbara Catania, and Paolo Perlasca. 2007. GEO-RBAC: A spatially aware RBAC. ACM Trans. Inf. Syst. Sec. 10, 1 (2007), 2. DOI:https://doi.org/10.1145/1210263.1210265 Google ScholarDigital Library
- Stefan Dziembowski, Lisa Eckey, and Sebastian Faust. 2018. FairSwap: How to fairly exchange digital goods. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, David Lie, Mohammad Mannan, Michael Backes, and XiaoFeng Wang (Eds.). ACM, 967–984. DOI:https://doi.org/10.1145/3243734.3243857 Google ScholarDigital Library
- Mohamed Ali Feki, Fahim Kawsar, Mathieu Boussard, and Lieven Trappeniers. 2013. The Internet of Things: The next technological revolution. IEEE Comput. 46, 2 (2013), 24–25. DOI:https://doi.org/10.1109/MC.2013.63 Google ScholarDigital Library
- Amos Fiat and Adi Shamir. 1986. How to prove yourself: Practical solutions to identification and signature problems. In Proceedings of the Advances in Cryptology Conference (Lecture Notes in Computer Science), Andrew M. Odlyzko (Ed.), Vol. 263. Springer, 186–194. DOI:https://doi.org/10.1007/3-540-47721-7_12 Google ScholarDigital Library
- Aditya Gaur, Bryan W. Scotney, Gerard P. Parr, and Sally I. McClean. 2015. Smart city architecture and its applications based on IoT. In Proceedings of the 6th International Conference on Ambient Systems, Networks and Technologies and the 5th International Conference on Sustainable Energy Information Technology (Procedia Computer Science), Elhadi M. Shakshuki (Ed.), Vol. 52. Elsevier, 1089–1094. DOI:https://doi.org/10.1016/j.procs.2015.05.122Google Scholar
- Badis Hammi, Rida Khatoun, Sherali Zeadally, Achraf Fayad, and Lyes Khoukhi. 2018. IoT technologies for smart cities. IET Netw. 7, 1 (2018), 1–13. DOI:https://doi.org/10.1049/iet-net.2017.0163Google ScholarCross Ref
- Juan Antonio Guerrero Ibáñez, Sherali Zeadally, and Juan Contreras-Castillo. 2018. Sensor technologies for intelligent transportation systems. Sensors 18, 4 (2018), 1212. DOI:https://doi.org/10.3390/s18041212Google ScholarCross Ref
- Toshiyuki Isshiki, Manh Ha Nguyen, and Keisuke Tanaka. 2013. Proxy re-encryption in a stronger security model extended from CT-RSA2012. In Proceedings of the Topics in Cryptology Conference (Lecture Notes in Computer Science), Ed Dawson (Ed.), Vol. 7779. Springer, 277–292. DOI:https://doi.org/10.1007/978-3-642-36095-4_18 Google ScholarDigital Library
- Jiawen Kang, Rong Yu, Xumin Huang, Maoqiang Wu, Sabita Maharjan, Shengli Xie, and Yan Zhang. 2019. Blockchain for secure and efficient data sharing in vehicular edge computing and networks. IEEE Internet Things J. 6, 3 (2019), 4660–4670. DOI:https://doi.org/10.1109/JIOT.2018.2875542Google ScholarCross Ref
- Rida Khatoun and Sherali Zeadally. 2016. Smart cities: Concepts, architectures, research opportunities. Commun. ACM 59, 8 (2016), 46–57. Google ScholarDigital Library
- Yun-kyung Lee, Jae-Deok Lim, Yong-seong Jeon, and Jeong-Nyeo Kim. 2015. Technology trends of access control in IoT and requirements analysis. In Proceedings of the International Conference on Information and Communication Technology. IEEE, 1031–1033. DOI:https://doi.org/10.1109/ICTC.2015.7354730Google Scholar
- Kaitai Liang, Liming Fang, Willy Susilo, and Duncan S. Wong. 2013. A ciphertext-policy attribute-based proxy re-encryption with chosen-ciphertext security. In Proceedings of the 5th International Conference on Intelligent Networking and Collaborative Systems. IEEE, 552–559. DOI:https://doi.org/10.1109/INCoS.2013.103 Google ScholarDigital Library
- Chao Lin, Debiao He, Xinyi Huang, Kim-Kwang Raymond Choo, and Athanasios V. Vasilakos. 2018. BSeIn: A blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0. J. Netw. Comput. Applic. 116 (2018), 42–52. DOI:https://doi.org/10.1016/j.jnca.2018.05.005Google ScholarCross Ref
- Ahsan Manzoor, Madhsanka Liyanage, An Braeke, Salil S. Kanhere, and Mika Ylianttila. 2019. Blockchain based proxy re-encryption scheme for secure IoT data sharing. In Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency. IEEE, 99–103.Google ScholarCross Ref
- Oscar Novo. 2018. Blockchain meets IoT: An architecture for scalable access management in IoT. IEEE Internet Things J. 5, 2 (2018), 1184–1195. DOI:https://doi.org/10.1109/JIOT.2018.2812239Google ScholarCross Ref
- Alex Pazaitis, Primavera De Filippi, and Vasilis Kostakis. 2017. Blockchain and value systems in the sharing economy: The illustrative case of backfeed. Technol. Forecast. Soc. Change 125 (2017), 105–115.Google ScholarCross Ref
- Charith Perera, Arkady B. Zaslavsky, Peter Christen, and Dimitrios Georgakopoulos. 2014. Sensing as a service model for smart cities supported by Internet of Things. Trans. Emerg. Telecomm. Technol. 25, 1 (2014), 81–93. DOI:https://doi.org/10.1002/ett.2704 Google ScholarDigital Library
- Omaji Samuel, Nadeem Javaid, Muhammad Awais, Zeeshan Ahmed, Muhammad Imran, and Mohsen Guizani. 2019. A blockchain model for fair data sharing in deregulated smart grids. In Proceedings of the IEEE Global Communications Conference. IEEE, 1–7. DOI:https://doi.org/10.1109/GLOBECOM38437.2019.9013372Google ScholarDigital Library
- Hossein Shafagh, Lukas Burkhalter, Anwar Hithnawi, and Simon Duquennoy. 2017. Towards blockchain-based auditable storage and sharing of IoT data. In Proceedings of the 9th Cloud Computing Security Workshop, Bhavani M. Thuraisingham, Ghassan Karame, and Angelos Stavrou (Eds.). ACM, 45–50. DOI:https://doi.org/10.1145/3140649.3140656 Google ScholarDigital Library
- Amritraj Singh, Kelly Click, Reza M. Parizi, Qi Zhang, Ali Dehghantanha, and Kim-Kwang Raymond Choo. 2020. Sidechain technologies in blockchain networks: An examination and state-of-the-art review. J. Netw. Comput. Applic. 149 (2020). DOI:https://doi.org/10.1016/j.jnca.2019.102471Google Scholar
- Amritraj Singh, Reza M. Parizi, Qi Zhang, Kim-Kwang Raymond Choo, and Ali Dehghantanha. 2020. Blockchain smart contracts formalization: Approaches and challenges to address vulnerabilities. Comput. Sec. 88 (2020). DOI:https://doi.org/10.1016/j.cose.2019.101654Google Scholar
- Madhusudan Singh and Shiho Kim. 2017. Blockchain based intelligent vehicle data sharing framework. CoRR abs/1708.09721 (2017).Google Scholar
- Kehua Su, Jie Li, and Hongbo Fu. 2011. Smart city and the applications. In Proceedings of the International Conference on Electronics, Communications and Control. IEEE, 1028–1031.Google ScholarCross Ref
- Mang Su and Liangchen Wang. 2019. PreBAC: A novel access control scheme based proxy re-encryption for cloud computing. ACM Trans. Interact. Intell. Syst. 13, 5 (2019), 2754–2767. DOI:https://doi.org/10.3837/tiis.2019.05.028Google Scholar
- Don Tapscott and Alex Tapscott. 2016. Blockchain Revolution: How the Technology behind Bitcoin is Changing Money, Business, and the World. Penguin. Google ScholarDigital Library
- Ovidiu Vermesan, Peter Friess, Patrick Guillemin, Sergio Gusmeroli, Harald Sundmaeker, Alessandro Bassi, Ignacio Soler Jubert, Margaretha Mazura, Mark Harrison, Markus Eisenhauer et al. 2011. Internet of things strategic research roadmap. Internet Things—Global Technol. Soc. Trends 1, 2011 (2011), 9–52.Google Scholar
- Gavin Wood et al. 2014. Ethereum: A secure decentralised generalised transaction ledger. Ether. Proj. Yell. Pap. 151, 2014 (2014), 1–32.Google Scholar
- Kan Yang, Xiaohua Jia, and Kui Ren. 2013. Attribute-based fine-grained access control with efficient revocation in cloud storage systems. In Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, Kefei Chen, Qi Xie, Weidong Qiu, Ninghui Li, and Wen-Guey Tzeng (Eds.). ACM, 523–528. DOI:https://doi.org/10.1145/2484313.2484383 Google ScholarDigital Library
- Abbas Yazdinejad, Reza M. Parizi, Ali Dehghantanha, and Kim-Kwang Raymond Choo. 2020. P4-to-blockchain: A secure blockchain-enabled packet parser for software defined networking. Comput. Sec. 88 (2020). DOI:https://doi.org/10.1016/j.cose.2019.101629Google Scholar
- Arkady B. Zaslavsky, Charith Perera, and Dimitrios Georgakopoulos. 2013. Sensing as a service and big data. CoRR abs/1301.0159 (2013).Google Scholar
- Y. Zhang, R. Deng, X. Liu, and D. Zheng. 2018. Outsourcing service fair payment based on blockchain and its applications in cloud computing. IEEE Trans. Serv. Comput. (2018), 1–1. DOI:https://doi.org/10.1109/TSC.2018.2864191Google Scholar
- Yinghui Zhang, Robert H. Deng, Ximeng Liu, and Dong Zheng. 2018. Blockchain based efficient and robust fair payment for outsourcing services in cloud computing. Inf. Sci. 462 (2018), 262–277. DOI:https://doi.org/10.1016/j.ins.2018.06.018Google ScholarDigital Library
- Yinghui Zhang, Jin Li, Xiaofeng Chen, and Hui Li. 2016. Anonymous attribute-based proxy re-encryption for access control in cloud computing. Sec. Commun. Netw. 9, 14 (2016), 2397–2411. DOI:https://doi.org/10.1002/sec.1509 Google ScholarDigital Library
Index Terms
- Blockchain-based Data Sharing System for Sensing-as-a-Service in Smart Cities
Recommendations
A pairing-free certificate-based proxy re-encryption scheme for secure data sharing in public clouds
To assure the confidentiality of the sensitive data stored in public cloud storages, the data owners should encrypt their data before submitting them to the clouds. However, it brings new challenge for us to effectively share the encrypted data in the ...
Blockchain-Aided Hierarchical Attribute-Based Encryption for Data Sharing
Wireless Algorithms, Systems, and ApplicationsAbstractCiphertext-policy attribute-based encryption (CP-ABE) is widely used in access control to achieve secure data sharing over different cloud platforms. However, most of the existing CP-ABE data sharing schemes perform one-time encryption on the ...
Cloud-Based Data-Sharing Scheme Using Verifiable and CCA-Secure Re-encryption from Indistinguishability Obfuscation
Information Security and CryptologyAbstractA cloud-based re-encryption scheme allows a semi-trusted cloud proxy to convert a ciphertext under delegator’s public-key into a ciphertext of delegatee’s. However, for an untrusted cloud proxy, as the re-encryption program was outsourced on the ...
Comments