skip to main content
research-article

Blockchain-based Data Sharing System for Sensing-as-a-Service in Smart Cities

Authors Info & Claims
Published:15 March 2021Publication History
Skip Abstract Section

Abstract

The sensing-as-a-service (SaaS) model has been explored to address the challenge of intractability of managing a large number of sensors faced by future smart cities. However, how to effectively share sensor data without compromising confidentiality, privacy protection, and fair trading without third parties is one of critical issues that must be solved in the SaaS in smart cities. While blockchain shows promise in solving these issues, the existing blockchain-based data sharing (BBDS) systems are difficult to apply to SaaS in smart cities because of many unresolved issues such as requiring a customized blockchain, huge storage, communication and computation costs, and dependence on a third party to achieve fair trading. We propose a BBDS system model with its security requirements before we present a concrete construction by combining \(\)-protocol, Paillier encryption scheme, and any secure symmetrical encryption and signature schemes. To demonstrate the utility of our proposed BBDS system, we present a security analysis and compare our system with other solutions. We implement the prototype in Remix to analyze the gas cost, and we conduct experiments to evaluate the communication and computation costs of the BBDS system using symmetric encryption (advanced encryption standard (AES)) and a signature scheme (elliptic curve digital signature algorithm (ECDSA)).

References

  1. Asma Alshehri and Ravi Sandhu. 2017. Access control models for virtual object communication in cloud-enabled IoT. In Proceedings of the IEEE International Conference on Information Reuse and Integration, Chengcui Zhang, Balaji Palanisamy, Latifur Khan, and Sahra Sedigh Sarvestani (Eds.). IEEE Computer Society, 16–25. DOI:https://doi.org/10.1109/IRI.2017.60Google ScholarGoogle ScholarCross RefCross Ref
  2. Mihir Bellare and Phillip Rogaway. 1993. Random oracles are practical: A paradigm for designing efficient protocols. In Proceedings of the 1st ACM Conference on Computer and Communications Security, Dorothy E. Denning, Raymond Pyle, Ravi Ganesan, Ravi S. Sandhu, and Victoria Ashby (Eds.). ACM, 62–73. DOI:https://doi.org/10.1145/168588.168596 Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Francesco Buccafurri, Vincenzo De Angelis, Gianluca Lax, Lorenzo Musarella, and Antonia Russo. 2019. An attribute-based privacy-preserving Ethereum solution for service delivery with accountability requirements. In Proceedings of the 14th International Conference on Availability, Reliability and Security. ACM, 24:1–24:6. DOI:https://doi.org/10.1145/3339252.3339279 Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Matteo Campanelli, Rosario Gennaro, Steven Goldfeder, and Luca Nizzardo. 2017. Zero-knowledge contingent payments revisited: Attacks and payments for services. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, Bhavani M. Thuraisingham, David Evans, Tal Malkin, and Dongyan Xu (Eds.). ACM, 229–243. DOI:https://doi.org/10.1145/3133956.3134060 Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Xiaofeng Chen, Jin Li, Jianfeng Ma, Wenjing Lou, and Duncan S. Wong. 2014. New and efficient conditional e-payment systems with transferability. Fut. Gen. Comput. Syst. 37 (2014), 252–258. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Xiaofeng Chen, Jin Li, and Willy Susilo. 2012. Efficient fair conditional payments for outsourcing computations. IEEE Trans. Inf. Forens. Sec. 7, 6 (2012), 1687–1694. DOI:https://doi.org/10.1109/TIFS.2012.2210880 Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Mohammad Jabed Morshed Chowdhury, Alan Colman, Muhammad Ashad Kabir, Jun Han, and Paul Sarda. 2018. Blockchain as a notarization service for data sharing with personal data store. In Proceedings of the 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and the 12th IEEE International Conference on Big Data Science and Engineering. IEEE, 1330–1335. DOI:https://doi.org/10.1109/TrustCom/BigDataSE.2018.00183Google ScholarGoogle Scholar
  8. Ivan Damgård, Mads Jurik, and Jesper Buus Nielsen. 2010. A generalization of Paillier’s public-key system with applications to electronic voting. Int. J. Inf. Sec. 9, 6 (2010), 371–385. DOI:https://doi.org/10.1007/s10207-010-0119-9 Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Maria Luisa Damiani, Elisa Bertino, Barbara Catania, and Paolo Perlasca. 2007. GEO-RBAC: A spatially aware RBAC. ACM Trans. Inf. Syst. Sec. 10, 1 (2007), 2. DOI:https://doi.org/10.1145/1210263.1210265 Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Stefan Dziembowski, Lisa Eckey, and Sebastian Faust. 2018. FairSwap: How to fairly exchange digital goods. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, David Lie, Mohammad Mannan, Michael Backes, and XiaoFeng Wang (Eds.). ACM, 967–984. DOI:https://doi.org/10.1145/3243734.3243857 Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Mohamed Ali Feki, Fahim Kawsar, Mathieu Boussard, and Lieven Trappeniers. 2013. The Internet of Things: The next technological revolution. IEEE Comput. 46, 2 (2013), 24–25. DOI:https://doi.org/10.1109/MC.2013.63 Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Amos Fiat and Adi Shamir. 1986. How to prove yourself: Practical solutions to identification and signature problems. In Proceedings of the Advances in Cryptology Conference (Lecture Notes in Computer Science), Andrew M. Odlyzko (Ed.), Vol. 263. Springer, 186–194. DOI:https://doi.org/10.1007/3-540-47721-7_12 Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Aditya Gaur, Bryan W. Scotney, Gerard P. Parr, and Sally I. McClean. 2015. Smart city architecture and its applications based on IoT. In Proceedings of the 6th International Conference on Ambient Systems, Networks and Technologies and the 5th International Conference on Sustainable Energy Information Technology (Procedia Computer Science), Elhadi M. Shakshuki (Ed.), Vol. 52. Elsevier, 1089–1094. DOI:https://doi.org/10.1016/j.procs.2015.05.122Google ScholarGoogle Scholar
  14. Badis Hammi, Rida Khatoun, Sherali Zeadally, Achraf Fayad, and Lyes Khoukhi. 2018. IoT technologies for smart cities. IET Netw. 7, 1 (2018), 1–13. DOI:https://doi.org/10.1049/iet-net.2017.0163Google ScholarGoogle ScholarCross RefCross Ref
  15. Juan Antonio Guerrero Ibáñez, Sherali Zeadally, and Juan Contreras-Castillo. 2018. Sensor technologies for intelligent transportation systems. Sensors 18, 4 (2018), 1212. DOI:https://doi.org/10.3390/s18041212Google ScholarGoogle ScholarCross RefCross Ref
  16. Toshiyuki Isshiki, Manh Ha Nguyen, and Keisuke Tanaka. 2013. Proxy re-encryption in a stronger security model extended from CT-RSA2012. In Proceedings of the Topics in Cryptology Conference (Lecture Notes in Computer Science), Ed Dawson (Ed.), Vol. 7779. Springer, 277–292. DOI:https://doi.org/10.1007/978-3-642-36095-4_18 Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Jiawen Kang, Rong Yu, Xumin Huang, Maoqiang Wu, Sabita Maharjan, Shengli Xie, and Yan Zhang. 2019. Blockchain for secure and efficient data sharing in vehicular edge computing and networks. IEEE Internet Things J. 6, 3 (2019), 4660–4670. DOI:https://doi.org/10.1109/JIOT.2018.2875542Google ScholarGoogle ScholarCross RefCross Ref
  18. Rida Khatoun and Sherali Zeadally. 2016. Smart cities: Concepts, architectures, research opportunities. Commun. ACM 59, 8 (2016), 46–57. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Yun-kyung Lee, Jae-Deok Lim, Yong-seong Jeon, and Jeong-Nyeo Kim. 2015. Technology trends of access control in IoT and requirements analysis. In Proceedings of the International Conference on Information and Communication Technology. IEEE, 1031–1033. DOI:https://doi.org/10.1109/ICTC.2015.7354730Google ScholarGoogle Scholar
  20. Kaitai Liang, Liming Fang, Willy Susilo, and Duncan S. Wong. 2013. A ciphertext-policy attribute-based proxy re-encryption with chosen-ciphertext security. In Proceedings of the 5th International Conference on Intelligent Networking and Collaborative Systems. IEEE, 552–559. DOI:https://doi.org/10.1109/INCoS.2013.103 Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Chao Lin, Debiao He, Xinyi Huang, Kim-Kwang Raymond Choo, and Athanasios V. Vasilakos. 2018. BSeIn: A blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0. J. Netw. Comput. Applic. 116 (2018), 42–52. DOI:https://doi.org/10.1016/j.jnca.2018.05.005Google ScholarGoogle ScholarCross RefCross Ref
  22. Ahsan Manzoor, Madhsanka Liyanage, An Braeke, Salil S. Kanhere, and Mika Ylianttila. 2019. Blockchain based proxy re-encryption scheme for secure IoT data sharing. In Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency. IEEE, 99–103.Google ScholarGoogle ScholarCross RefCross Ref
  23. Oscar Novo. 2018. Blockchain meets IoT: An architecture for scalable access management in IoT. IEEE Internet Things J. 5, 2 (2018), 1184–1195. DOI:https://doi.org/10.1109/JIOT.2018.2812239Google ScholarGoogle ScholarCross RefCross Ref
  24. Alex Pazaitis, Primavera De Filippi, and Vasilis Kostakis. 2017. Blockchain and value systems in the sharing economy: The illustrative case of backfeed. Technol. Forecast. Soc. Change 125 (2017), 105–115.Google ScholarGoogle ScholarCross RefCross Ref
  25. Charith Perera, Arkady B. Zaslavsky, Peter Christen, and Dimitrios Georgakopoulos. 2014. Sensing as a service model for smart cities supported by Internet of Things. Trans. Emerg. Telecomm. Technol. 25, 1 (2014), 81–93. DOI:https://doi.org/10.1002/ett.2704 Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Omaji Samuel, Nadeem Javaid, Muhammad Awais, Zeeshan Ahmed, Muhammad Imran, and Mohsen Guizani. 2019. A blockchain model for fair data sharing in deregulated smart grids. In Proceedings of the IEEE Global Communications Conference. IEEE, 1–7. DOI:https://doi.org/10.1109/GLOBECOM38437.2019.9013372Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Hossein Shafagh, Lukas Burkhalter, Anwar Hithnawi, and Simon Duquennoy. 2017. Towards blockchain-based auditable storage and sharing of IoT data. In Proceedings of the 9th Cloud Computing Security Workshop, Bhavani M. Thuraisingham, Ghassan Karame, and Angelos Stavrou (Eds.). ACM, 45–50. DOI:https://doi.org/10.1145/3140649.3140656 Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Amritraj Singh, Kelly Click, Reza M. Parizi, Qi Zhang, Ali Dehghantanha, and Kim-Kwang Raymond Choo. 2020. Sidechain technologies in blockchain networks: An examination and state-of-the-art review. J. Netw. Comput. Applic. 149 (2020). DOI:https://doi.org/10.1016/j.jnca.2019.102471Google ScholarGoogle Scholar
  29. Amritraj Singh, Reza M. Parizi, Qi Zhang, Kim-Kwang Raymond Choo, and Ali Dehghantanha. 2020. Blockchain smart contracts formalization: Approaches and challenges to address vulnerabilities. Comput. Sec. 88 (2020). DOI:https://doi.org/10.1016/j.cose.2019.101654Google ScholarGoogle Scholar
  30. Madhusudan Singh and Shiho Kim. 2017. Blockchain based intelligent vehicle data sharing framework. CoRR abs/1708.09721 (2017).Google ScholarGoogle Scholar
  31. Kehua Su, Jie Li, and Hongbo Fu. 2011. Smart city and the applications. In Proceedings of the International Conference on Electronics, Communications and Control. IEEE, 1028–1031.Google ScholarGoogle ScholarCross RefCross Ref
  32. Mang Su and Liangchen Wang. 2019. PreBAC: A novel access control scheme based proxy re-encryption for cloud computing. ACM Trans. Interact. Intell. Syst. 13, 5 (2019), 2754–2767. DOI:https://doi.org/10.3837/tiis.2019.05.028Google ScholarGoogle Scholar
  33. Don Tapscott and Alex Tapscott. 2016. Blockchain Revolution: How the Technology behind Bitcoin is Changing Money, Business, and the World. Penguin. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Ovidiu Vermesan, Peter Friess, Patrick Guillemin, Sergio Gusmeroli, Harald Sundmaeker, Alessandro Bassi, Ignacio Soler Jubert, Margaretha Mazura, Mark Harrison, Markus Eisenhauer et al. 2011. Internet of things strategic research roadmap. Internet Things—Global Technol. Soc. Trends 1, 2011 (2011), 9–52.Google ScholarGoogle Scholar
  35. Gavin Wood et al. 2014. Ethereum: A secure decentralised generalised transaction ledger. Ether. Proj. Yell. Pap. 151, 2014 (2014), 1–32.Google ScholarGoogle Scholar
  36. Kan Yang, Xiaohua Jia, and Kui Ren. 2013. Attribute-based fine-grained access control with efficient revocation in cloud storage systems. In Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, Kefei Chen, Qi Xie, Weidong Qiu, Ninghui Li, and Wen-Guey Tzeng (Eds.). ACM, 523–528. DOI:https://doi.org/10.1145/2484313.2484383 Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Abbas Yazdinejad, Reza M. Parizi, Ali Dehghantanha, and Kim-Kwang Raymond Choo. 2020. P4-to-blockchain: A secure blockchain-enabled packet parser for software defined networking. Comput. Sec. 88 (2020). DOI:https://doi.org/10.1016/j.cose.2019.101629Google ScholarGoogle Scholar
  38. Arkady B. Zaslavsky, Charith Perera, and Dimitrios Georgakopoulos. 2013. Sensing as a service and big data. CoRR abs/1301.0159 (2013).Google ScholarGoogle Scholar
  39. Y. Zhang, R. Deng, X. Liu, and D. Zheng. 2018. Outsourcing service fair payment based on blockchain and its applications in cloud computing. IEEE Trans. Serv. Comput. (2018), 1–1. DOI:https://doi.org/10.1109/TSC.2018.2864191Google ScholarGoogle Scholar
  40. Yinghui Zhang, Robert H. Deng, Ximeng Liu, and Dong Zheng. 2018. Blockchain based efficient and robust fair payment for outsourcing services in cloud computing. Inf. Sci. 462 (2018), 262–277. DOI:https://doi.org/10.1016/j.ins.2018.06.018Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. Yinghui Zhang, Jin Li, Xiaofeng Chen, and Hui Li. 2016. Anonymous attribute-based proxy re-encryption for access control in cloud computing. Sec. Commun. Netw. 9, 14 (2016), 2397–2411. DOI:https://doi.org/10.1002/sec.1509 Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Blockchain-based Data Sharing System for Sensing-as-a-Service in Smart Cities

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in

            Full Access

            • Published in

              cover image ACM Transactions on Internet Technology
              ACM Transactions on Internet Technology  Volume 21, Issue 2
              June 2021
              599 pages
              ISSN:1533-5399
              EISSN:1557-6051
              DOI:10.1145/3453144
              • Editor:
              • Ling Liu
              Issue’s Table of Contents

              Copyright © 2021 Association for Computing Machinery.

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 15 March 2021
              • Online AM: 7 May 2020
              • Revised: 1 April 2020
              • Accepted: 1 April 2020
              • Received: 1 November 2019
              Published in toit Volume 21, Issue 2

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • research-article
              • Refereed

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader

            HTML Format

            View this article in HTML Format .

            View HTML Format