Journal on Communications ›› 2023, Vol. 44 ›› Issue (3): 186-197.doi: 10.11959/j.issn.1000-436x.2023031
• Papers • Previous Articles Next Articles
Xuejiao LIU1, Tiancong CAO1, Yingjie XIA2,3
Revised:
2022-11-14
Online:
2023-03-25
Published:
2023-03-01
Supported by:
CLC Number:
Xuejiao LIU, Tiancong CAO, Yingjie XIA. Research on efficient and secure cross-domain data sharing of IoV under blockchain architecture[J]. Journal on Communications, 2023, 44(3): 186-197.
[20] | YANG K , HAN Q , LI H ,et al. An efficient and fine-grained big data access control scheme with privacy-preserving policy[J]. IEEE Internet of Things Journal, 2017,4(2): 563-571. |
[21] | RAMU G . A secure cloud framework to share EHRs using modified CP-ABE and the attribute bloom filter[J]. Education and Information Technologies, 2018,23(5): 2213-2233. |
[22] | HAN Q , ZHANG Y H , LI H . Efficient and robust attribute-based encryption supporting access policy hiding in Internet of things[J]. Future Generation Computer Systems, 2018,83: 269-277. |
[23] | BETHENCOURT J , SAHAI A , WATERS B . Ciphertext-policy attribute-based encryption[C]// Proceedings of 2007 IEEE Symposium on Security and Privacy. Piscataway:IEEE Press, 2007: 321-334. |
[24] | DONG C Y , CHEN L Q , WEN Z K . When private set intersection meets big data:an efficient and scalable protocol[C]// Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security. New York:ACM Press, 2013: 789-800. |
[25] | ZHOU H B , LIU B , LUAN T H ,et al. ChainCluster:engineering a cooperative content distribution framework for highway vehicular communications[J]. IEEE Transactions on Intelligent Transportation Systems, 2014,15(6): 2644-2657. |
[26] | MA X T , ZHAO J H , GONG Y ,et al. Carrier sense multiple access with collision avoidance-aware connectivity quality of downlink broadcast in vehicular relay networks[J]. IET Microwaves,Antennas& Propagation, 2019,13(8): 1096-1103. |
[27] | NGUYEN B L , NGO D T , TRAN N H ,et al. Dynamic V2I/V2V cooperative scheme for connectivity and throughput enhancement[J]. IEEE Transactions on Intelligent Transportation Systems, 2022,23(2): 1236-1246. |
[28] | GREEN M , HOHENBERGER S , WATERS B . Outsourcing the decryption of ABE ciphertexts[C]// Proceedings of the 20th USENIX Conference on Security. New York:ACM Press, 2011: 34-50. |
[29] | CANETTI R , KRAWCZYK H , NIELSEN J B . Relaxing chosen-ciphertext security[C]// Annual International Cryptology Conference. Berlin:Springer, 2003: 565-582. |
[30] | DANIEL E , TSCHORSCH F . IPFS and friends:a qualitative comparison of next generation peer-to-peer data networks[J]. IEEE Communications Surveys & Tutorials, 2022,24(1): 31-52. |
[31] | CASTRO M , LISKOV B . Practical Byzantine fault tolerance and proactive recovery[J]. ACM Transactions on Computer Systems, 2002,20(4): 398-461. |
[1] | TAN H W , CHUNG I . RSU-aided remote V2V message dissemination employing secure group association for UAV-assisted VANETs[J]. Electronics, 2021,10(5): 548-570. |
[2] | SUN J F , XIONG H , ZHANG S F ,et al. A secure flexible and tampering-resistant data sharing system for vehicular social networks[J]. IEEE Transactions on Vehicular Technology, 2020,69(11): 12938-12950. |
[3] | TSUKAMOTO K , TAMURA H , TAENAKA Y ,et al. Geolocation-centric information platform for resilient spatio-temporal content management[J]. IEICE Transactions on Communications, 2021,104(3): 199-209. |
[4] | LU Z J , QU G , LIU Z L . A survey on recent advances in vehicular network security,trust,and privacy[J]. IEEE Transactions on Intelligent Transportation Systems, 2019,20(2): 760-776. |
[5] | ZHANG X H , CHEN X F . Data security sharing and storage based on a consortium blockchain in a vehicular ad-hoc network[J]. IEEE Access, 2019,7: 58241-58254. |
[6] | JIANG D D , WANG Z H , HUO L W ,et al. A performance measurement and analysis method for software-defined networking of IoV[J]. IEEE Transactions on Intelligent Transportation Systems, 2021,22(6): 3707-3719. |
[7] | KANG J W , YU R , HUANG X M ,et al. Blockchain for secure and efficient data sharing in vehicular edge computing and networks[J]. IEEE Internet of Things Journal, 2019,6(3): 4660-4670. |
[8] | GROVER J . Security of vehicular ad hoc networks using blockchain:a comprehensive review[J]. Vehicular Communications, 2022,34: 100458-100477. |
[9] | ZHONG H , WEN J Y , CUI J ,et al. Efficient conditional privacy-preserving and authentication scheme for secure service provision in VANET[J]. Tsinghua Science and Technology, 2016,21(6): 620-629. |
[10] | MA Z F , WANG L Y , ZHAO W Z . Blockchain-driven trusted data sharing with privacy protection in IoT sensor network[J]. IEEE Sensors Journal, 2021,21(22): 25472-25479. |
[11] | WU J , DONG M X , OTA K ,et al. A fine-grained cross-domain access control mechanism for social Internet of things[C]// Proceedings of 2014 IEEE 11th International Conference on Ubiquitous Intelligence and Computing and 2014 IEEE 11th International Conference on Autonomic and Trusted Computing and 2014 IEEE 14th International Conference on Scalable Computing and Communications and Its Associated Workshops. Piscataway:IEEE Press, 2015: 666-671. |
[12] | MENG Y F , LI J Z . Data sharing mechanism of sensors and actuators of industrial IoT based on blockchain-assisted identity-based cryptography[J]. Sensors, 2021,21(18): 6084-6103. |
[13] | TRUONG H T T , ALMEIDA M , KARAME G ,et al. Towards secure and decentralized sharing of IoT data[C]// Proceedings of 2019 IEEE International Conference on Blockchain (Blockchain). Piscataway:IEEE Press, 2019: 176-183. |
[14] | CHEN Y W , HU B W , YU H J ,et al. A threshold proxy re-encryption scheme for secure IoT data sharing based on blockchain[J]. Electronics, 2021,10(19): 2359-2377. |
[15] | YU K P , TAN L , ALOQAILY M ,et al. Blockchain-enhanced data sharing with traceable and direct revocation in IIoT[J]. IEEE Transactions on Industrial Informatics, 2021,17(11): 7669-7678. |
[16] | SUN J F , XU G W , ZHANG T W ,et al. Secure data sharing with flexible cross-domain authorization in autonomous vehicle systems[J]. IEEE Transactions on Intelligent Transportation Systems, 2022:doi.org/10.1109/TITS.2022.3157309. |
[17] | PAN J W , CUI J , WEI L ,et al. Secure data sharing scheme for VANETs based on edge computing[J]. EURASIP Journal on Wireless Communications and Networking, 2019(1): 1-11. |
[18] | WANG D , ZHANG X H . Secure data sharing and customized services for intelligent transportation based on a consortium blockchain[J]. IEEE Access, 2020,8: 56045-56059. |
[19] | MA J F , LI T , CUI J ,et al. Attribute-based secure announcement sharing among vehicles using blockchain[J]. IEEE Internet of Things Journal, 2021,8(13): 10873-10883. |
[1] | Haibo ZHANG, Kai LAN, Zhou CHEN, Ruyan WANG, Can ZOU, Mingyue WANG. Ring-based efficient batch authentication and group key agreement protocol with anonymity in Internet of vehicles [J]. Journal on Communications, 2023, 44(6): 103-116. |
[2] | Haibo ZHANG, Yukun CAO, Kaijian LIU, Ruyan WANG. Distributed trust management scheme based on blockchain in Internet of vehicles [J]. Journal on Communications, 2023, 44(5): 148-157. |
[3] | Xuejiao LIU, Qiang ZHONG, Yingjie XIA. Efficient authentication scheme for cross-trust domain of IoV based on double-layer shard blockchain [J]. Journal on Communications, 2023, 44(5): 213-223. |
[4] | Tao FENG, Liqiu CHEN, Junli FANG, Jianming SHI. Blockchain data sharing scheme based on localized difference privacy and attribute-based searchable encryption [J]. Journal on Communications, 2023, 44(5): 224-233. |
[5] | Yingjie XIA, Siyu ZHU, Xuejiao LIU. Research on efficient cross trust-domain group authentication with conditional privacy of vehicle platoon under blockchian architecture [J]. Journal on Communications, 2023, 44(4): 111-123. |
[6] | Baiji HU, Xiaojuan ZHANG, Yuancheng LI, Rongxin LAI. Multi-function supported privacy protection data aggregation scheme for V2G network [J]. Journal on Communications, 2023, 44(4): 187-200. |
[7] | Li JIANG, Shengli XIE, Hui TIAN. Adaptive resource optimization mechanism for blockchain sharding in digital twin edge network [J]. Journal on Communications, 2023, 44(3): 12-23. |
[8] | Qianyi DAI, Bin ZHANG, Song GUO, Kaiyong XU. Blockchain network layer anomaly traffic detection method based on multiple classifier integration [J]. Journal on Communications, 2023, 44(3): 66-80. |
[9] | Pujie JING, Liangmin WANG, Xuewen DONG, Yushu ZHANG, Qian WANG, Sohail Muhammad. CHA: cross-chain based hierarchical architecture for practicable blockchain regulatory [J]. Journal on Communications, 2023, 44(3): 93-104. |
[10] | Dongyan HUANG, Kun LI. Research on multi-address time-based blockchain covert communication method [J]. Journal on Communications, 2023, 44(2): 148-159. |
[11] | Yiliang HAN, Kaiyang GUO, Riming WU, Kai LIU. Attribute-based encryption scheme against key abuse based on OBDD access structure from lattice [J]. Journal on Communications, 2023, 44(1): 75-88. |
[12] | Yatao YANG, Deli LIU, Peihe LIU, Ping ZENG, Song XIAO. BFV-Blockchainvoting: blockchain-based electronic voting systems with BFV full homomorphic encryption [J]. Journal on Communications, 2022, 43(9): 100-111. |
[13] | Xia FENG, Kaiping CUI, Qingqing XIE, Liangmin WANG. Distributed anonymous authentication scheme based on the blockchain in VANET [J]. Journal on Communications, 2022, 43(9): 134-147. |
[14] | Leixiao LI, Jinze DU, Hao LIN, Haoyu GAO, Yanyan YANG, Jing GAO. Research progress of blockchain network covert channel [J]. Journal on Communications, 2022, 43(9): 209-223. |
[15] | Xuewang ZHANG, Zhihong LI, Jinzhao LIN. Privacy protection scheme based on fair blind signature and hierarchical encryption for consortium blockchain [J]. Journal on Communications, 2022, 43(8): 131-141. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|