Blockchain-Based Service Oriented Privacy-Preserving Data Sharing over Distributed Data Streams in Asynchronous Environment
Keywords:
Blockchain, Privacy-preserving, data sharing, smart contract, Internet of Things, Smart CityAbstract
Innovative city applications use information and communication technologies to function various operations efficiently. The widespread use of the Internet of Things (IoT) can be viewed in several applications like smart cars, smart cities, e-commerce, and cyber-physical systems. The huge amount of data produced and transmitted by these systems is handled by cloud-based storage services, which are vulnerable to multiple threats risking the privacy and security features of the application. Cloud storage services employ encryption algorithms to ensure data confidentiality, but it fails to address the privacy issues. Apart from the privacy risks, in these systems, the identity of a user who shares and accesses the data is traceable, as it is required to verify user eligibility before providing access. Also, a vast amount of daily data is stored on a centralized system that processes service requests from multiple users, posing considerable risks to the system's stability during peak periods. To address these challenges faced during the data sharing process in a centralized system, Service Oriented Privacy-Preserving Data Sharing (SOPPDS) platform based on a blockchain framework is proposed. The modified Key Policy-Attribute-based Encryption (MKP-ABE) technique is applied to securely share the data between the service owners and the service consumers. It was evident from the performance evaluation of the proposed SOPPDS platform that the encryption process takes lesser time than the decryption process. Also, the cryptographic operations performed on the prime order sets exhibited increased latency and computational cost. It was observed that comparatively, cryptographic operations performed on composite order sets could overcome the issues in prime order sets. SOPPDS platform works well in preserving the users' privacy, ensuring anonymity in the data sharing process, and maintaining the confidentiality of the data shared in the system
Downloads
References
Apthorpe, N., Reisman, D., Feamster, N., “A smart home is no castle: privacy vulnerabilities of encrypted iot traffic,” arXiv, 1705.06805, pp.1–6, 2017.
Biswas, K., Muthukkumarasamy, V., “Securing Smart Cities using Blockchain Technology,” In: Proceedings of the 14th International Conference on Smart City High Performance Computing and Communications, IEEE, pp. 1392–1393, 2016.
M. V. Ahluwalia, A. Gangopadhyay, Z. Chen and Y. Yesha, "Target-Based, Privacy Preserving, and Incremental Association Rule Mining," in IEEE Transactions on Services Computing, vol. 10, no. 4, pp. 633- 645, 2017.
Shen, J., Zhou, T., Chen, X., Li, J. and Susilo, W., “Anonymous and traceable group data sharing in cloud computing,” IEEE Transactions on Information Forensics and Security, vol.13,no.4, pp.912-925, 2017.
Ouaddah, A. AbouElkalam, and A. AitOuahman, “Fairaccess: a new blockchain-based access control framework for the internet of things,” Security and Communication Networks, pp. 5943–5964, 2016.
J. Liu, X. Li, L. Ye, H. Zhang, X. Du, and M. Guizani, “Bpds: A blockchain based privacy-preserving data sharing for electronic medical records,” in GLOBECOM. IEEE, pp. 1–6, 2018.
S. Wang, Y. Zhang, and Y. Zhang, “A blockchain-based framework for data sharing with fine-grained access control in decentralized storage systems,” IEEE Access, vol. 6, pp. 38 437–38 450, 2018.
Ahmad, I., Kumar, T., Liyanage, M., Okwuibe, J., Ylianttila, M., Gurtov, A.,”Overview of 5G security challenges and solutions”, Commun. Standards Mag. Vol.2 (1), pp.36–43, 2018.
Dorri, A., Kanhere, S.S., Jurdak, R., “Mof-bc: a memory optimized and flexible blockchain for large scale networks”, Future Generation Computational. System, vol.92, pp.357–373,2019.
Faber, B., Michelet, G.C., Weidmann, N., Mukkamala, R.R., Vatrapu, R.,”BPDIMS: a blockchain-based personal data and identity management system”, In: Proceedings of the 52nd Hawaii International Conference on System Sciences (HICSS). IEEE, pp. 6855–6864, 2019.
Ferrag, M.A., Maglaras, L., Argyriou, A., Kosmanos, D., Janicke, H.,”Security for 4G and 5G cellular networks: a survey of existing authentication and privacy-preserving schemes”, Journal of Network and Computer Applications, vol.101, pp.55–82, 2019.
Gordon, W.J., Catalini, C., “Blockchain technology for healthcare: facilitating the transition to patient-driven interoperability”, Computational and Structural Biotechnology, vol.16, pp. 224–230, 2018.
Haidar, F., Kaiser, A., Lonc, B.,”On the Performance Evaluation of Vehicular PKI Protocol for V2X Communications Security”, In: Proceedings of the 86th Vehicular Technology Conference (VTC-Fall). IEEE, pp. 1–5, 2017.
Huh, S., Cho, S., Kim, S.,”ManagingIoT Devices using Blockchain Platform”, In: Proceedings of the 19th International Conference on Advanced Communication Technology (ICACT). IEEE, pp. 464–467.
Makhdoom, I., Abolhasan, M., Abbas, H., Ni, W., “Blockchain’S adoption in IoT: the challenges, and a way forward”, Journal of Network and Computer Applications, vol.125, pp. 251–279, 2019.
Makhdoom, I., Abolhasan, M., Lipman, J., Liu, R.P., Ni, W., “Anatomy of threats to the internet of things”, IEEE Communications Surveys & Tutorials, vol.21 (2), pp.1636–1675, 2018a.
Makhdoom, I., Abolhasan, M., Ni, W., “Blockchain for IoT: The Challenges and a Way Forward”, In: Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, SECRYPT. INSTICC. SciTePress , vol. 2., pp. 428–439, 2018b.
Marchesi, M., Marchesi, L., Tonelli, R., ”An agile software engineering method to design blockchain applications”, In: Proceedings of the 14th Central and Eastern European Software Engineering Conference Russia. ACM, pp. 1–8, 2018.
Michelin, R.A., Dorri, A., Steger, M., Lunardi, R.C., Kanhere, S.S., Jurdak, R., Zorzo, A.F., “SpeedyChain: A Framework for Decoupling Data from Blockchain for Smart Cities”, In:Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services. ACM, pp. 145–154, 2018.
Kaaniche, N., Laurent, M., “A blockchain-based data usage auditing architecture with enhanced privacy and availability”, In: Proceedings of the 16th International Symposium on Network Computing and Applications (NCA). IEEE, pp. 1–5, 2017.
Kountché, D.A., Bonnin, J.-M., Labiod, H., “The Problem of Privacy in Cooperative Intelligent Transportation Systems (C-ITS)”, in Proceedings of the Computer Communications Workshops (INFOCOM WKSHPS). IEEE, pp. 482–486, 2017.
Krishnan, K.N., Jenu, R., Joseph, T., Silpa, M., “Blockchain Based Security Framework for IoT Implementations” in Proceedings of the International CET Conference on Control, Communication, and Computing (IC4). IEEE, pp. 425–429, 2018.
Mach, P., Becvar, Z., “Mobile edge computing: a survey on architecture and computation offloading”, IEEE Communications Surveys & Tutorials, vol.19 (3), pp.1628–1656, 2018.Moustaka, V., Theodosiou, Z., Vakali, A., Kounoudes, A., “Smart cities at risk: privacy and security borderlines from social networking in cities”, Athena 357, pp.905–910.
Qian, Y., Liu, Z., Yang, J., Wang, Q., “A Method of Exchanging Data in Smart City by Blockchain”, in Proceedings of the 16th International Conference on Smart City. IEEE, pp. 1344–1349.
Rahman, M.A., Rashid, M.M., Hossain, M.S., Hassanain, E.,Alhamid, M.F., Guizani, M., “Blockchain and IoT-based cognitive edge framework for sharing economy services in a smart city”, IEEE Access vol.7, 18611–18621, 2019.
J. Hua, A. Tang, Y. Fang, Z. Shen and S. Zhong, "Privacy-Preserving Utility Verification of the Data Published by Non-Interactive Differentially Private Mechanisms," in IEEE Transactions on Information Forensics and Security, vol. 11, no. 10,pp. 2298-2311, 2016.
Q. Xia, E. B. Sifah, K. O. Asamoah, J. Gao, X. Du, and M. Guizani, “Medshare: Trust-less medical data sharing among cloud service providers via blockchain,” IEEE Access, vol. 5, pp. 14 757–14 767, 2017.
B. A. Tama, B. J. Kweka, Y. Park, and K. H. Rhee, “A critical review of blockchain and its current applications,” in Proceedings of 2017 International Conference on Electrical Engineering and Computer Science (ICECOS), pp. 109–113, 2017.
Rabah, “Challenges & opportunities for blockchain powered healthcare systems: A review,” Mara Research Journal of Medicine and Health Sciences, vol. 1, no. 1, pp. 45–52, 2017.
X. Yue, H. Wang, D. Jin, M. Li, and W. Jiang, “Healthcare data gateways: found healthcare intelligence on blockchain with novel privacy risk control,” Journal of Medical Systems, vol. 40, no. 10, p. 218, 2016.
Azaria, A. Ekblaw, T. Vieira, and A. Lippman, “Medrec: Using blockchain for medical data access and permission management,” in Proceedings of International Conference on Open and Big Data (OBD), pp. 25–30, 2016.
R. Guo, H. Shi, Q. Zhao, and D. Zheng, “Secure attribute-based signature scheme with multiple authorities for blockchain in electronic health records systems,” IEEE Access, vol. 6, pp. 11 676–11 686, 2018.
Z. Zheng, S. Xie, H. Dai, X. Chen, and H. Wang, “An overview of blockchain technology: Architecture, consensus, and future trends,” in Proceedings of 2017 IEEE International Congress on Big Data, pp. 557–564, 2017.
Huamaní, E. L. ., Leon-Ayala, R. ., Alva-Mantari, A. ., & Meneses-Claudio, B. . (2023). Prototype of a Mobile Application for the Detection of Car Accidents on the Roads of Peru . International Journal on Recent and Innovation Trends in Computing and Communication, 11(3), 37–42. https://doi.org/10.17762/ijritcc.v11i3.6198
María, K., Järvinen, M., Dijk, A. van, Huber, K., & Weber, S. Machine Learning Approaches for Curriculum Design in Engineering Education. Kuwait Journal of Machine Learning, 1(1). Retrieved from http://kuwaitjournals.com/index.php/kjml/article/view/111
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.