A Location-Aware Verifiable Outsourcing Data Aggregation in Multiblockchains

被引:3
|
作者
Zhang, Junwei [1 ,2 ]
Wang, Yuqing [1 ,2 ]
Ma, Zhuo [1 ,2 ]
Yang, Xiaohan [1 ,2 ]
Ying, Zuobin [3 ]
Ma, Jianfeng [1 ,2 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
[2] Xidian Univ, Sch Cyber Engn, Xian 710071, Peoples R China
[3] City Univ Macau, Fac Data Sci, Macau, Peoples R China
来源
IEEE INTERNET OF THINGS JOURNAL | 2023年 / 10卷 / 06期
基金
中国国家自然科学基金;
关键词
Data aggregation; Blockchains; Outsourcing; Data privacy; Security; Homomorphic encryption; Public key; Internet of Vehicles (IoV); location-aware; location privacy; multiblockchains; verifiable aggregation; PRIVACY-PRESERVING AGGREGATION; CONCEALED DATA AGGREGATION; EFFICIENT DATA AGGREGATION; TREE CONSTRUCTION; SCHEME; AUTHENTICATION; LIGHTWEIGHT; SECURITY;
D O I
10.1109/JIOT.2022.3221555
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid development of the Internet of Vehicles (IoV), location-aware outsourcing data aggregation is evolving into a fundamentally key role for analyzing a significant amount of data among smart devices. Due to the spatial property of the data in IoV, location privacy and data security in outsourcing data aggregation face critical challenges. Meanwhile, because of the diversity of entities in IoV, how aggregating data from multiple domains is also a serious issue. In this article, we propose a location-aware verifiable outsourcing data aggregation (LAVODA) for IoV where aggregators are hierarchical for the cross-chain mechanism in multiblockchains. With homomorphic encryption and homomorphic commitment, we achieve the verifiability of the aggregation while ensuring data confidentiality. Specifically, we combine twin-DH with circle-based location verification to ensure the privacy of the requester's location strategy and data providers' locations. The security analysis shows that our scheme can achieve the above secure properties. In addition, the experimental results demonstrate that our scheme is efficient and feasible in practice.
引用
收藏
页码:4783 / 4798
页数:16
相关论文
共 50 条
  • [31] Visualization design for location-aware services
    Chia-How Lin
    Kai-Tai Song
    Sheng-Po Kuo
    Yu-Chee Tseng
    Yau-Jen Kuo
    2006 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS, VOLS 1-6, PROCEEDINGS, 2006, : 4380 - +
  • [32] Location-aware communications in smart environments
    Satoh, Ichiro
    INFORMATION SYSTEMS FRONTIERS, 2009, 11 (05) : 501 - 512
  • [33] Seamless engineering of location-aware services
    Rossi, G
    Gordillo, S
    Fortier, A
    ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2005: OTM 2005 WORKSHOPS, PROCEEDINGS, 2005, 3762 : 176 - 185
  • [34] GeoIGM: a Location-Aware IGM Platform
    Cowzer, Neil
    Quigley, Aaron
    2009 18TH IEEE INTERNATIONAL WORKSHOP ON ENABLING TECHNOLOGIES: INFRASTRUCTURES FOR COLLABORATIVE ENTERPRISES, 2009, : 105 - 110
  • [35] An adaptive, location-aware hoarding mechanism
    Kubach, U
    Rothermel, K
    ISCC 2000: FIFTH IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, PROCEEDINGS, 2000, : 615 - 620
  • [36] Location-Aware Human Activity Recognition
    Nguyen, Tam T.
    Fernandez, Daniel
    Nguyen, Quy T. K.
    Bagheri, Ebrahim
    ADVANCED DATA MINING AND APPLICATIONS, ADMA 2017, 2017, 10604 : 821 - 835
  • [37] Automated Location-Aware Influencer Evaluation
    Panasyuk, Aleksey
    Mehrotra, Kishan G.
    Yu, Edmund Szu-Li
    ICVISP 2019: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON VISION, IMAGE AND SIGNAL PROCESSING, 2019,
  • [38] Linking Check-in Data to Users on Location-aware Social Networks
    Li, Yujie
    Sang, Yu
    Chen, Wei
    Zhao, Lei
    PRICAI 2022: TRENDS IN ARTIFICIAL INTELLIGENCE, PT I, 2022, 13629 : 489 - 503
  • [39] Placement Strategies: Structured Skeleton Composition with Location-Aware Remote Data
    Schiller, Lukas Immanuel
    TRENDS IN FUNCTIONAL PROGRAMMING, TFP 2020, 2020, 12222 : 229 - 248
  • [40] Dynamic location privacy mechanism in location-aware system
    Doomum, M. Razvi
    INNOVATIVE ALGORITHMS AND TECHNIQUES IN AUTOMATION, INDUSTRIAL ELECTRONICS AND TELECOMMUNICATIONS, 2007, : 379 - 384