Open Access
ARTICLE
FADSF: A Data Sharing Model for Intelligent Connected Vehicles Based on Blockchain Technology
Data Security Institute, China Industrial Control Systems Cyber Emergency Response Team, Beijing, 100040, China
* Corresponding Author: Yitong Liu. Email:
(This article belongs to the Special Issue: Innovative Security for the Next Generation Mobile Communication and Internet Systems)
Computers, Materials & Continua 2024, 80(2), 2351-2362. https://doi.org/10.32604/cmc.2024.048903
Received 21 December 2023; Accepted 21 May 2024; Issue published 15 August 2024
Abstract
With the development of technology, the connected vehicle has been upgraded from a traditional transport vehicle to an information terminal and energy storage terminal. The data of ICV (intelligent connected vehicles) is the key to organically maximizing their efficiency. However, in the context of increasingly strict global data security supervision and compliance, numerous problems, including complex types of connected vehicle data, poor data collaboration between the IT (information technology) domain and OT (operation technology) domain, different data format standards, lack of shared trust sources, difficulty in ensuring the quality of shared data, lack of data control rights, as well as difficulty in defining data ownership, make vehicle data sharing face a lot of problems, and data islands are widespread. This study proposes FADSF (Fuzzy Anonymous Data Share Frame), an automobile data sharing scheme based on blockchain. The data holder publishes the shared data information and forms the corresponding label storage on the blockchain. The data demander browses the data directory information to select and purchase data assets and verify them. The data demander selects and purchases data assets and verifies them by browsing the data directory information. Meanwhile, this paper designs a data structure Data Discrimination Bloom Filter (DDBF), making complaints about illegal data. When the number of data complaints reaches the threshold, the audit traceability contract is triggered to punish the illegal data publisher, aiming to improve the data quality and maintain a good data sharing ecology. In this paper, based on Ethereum, the above scheme is tested to demonstrate its feasibility, efficiency and security.Keywords
The accelerated integration of the digital economy has spurred the development of intelligent connected vehicles (ICV) equipped with advanced onboard sensors, controllers, actuators and other devices. This sophisticated integration of modern communication and network technology enables intelligent information exchange and sharing between vehicles and various entities including other vehicles, roads, people, and clouds-a process encompassing complex environment perception, smart decision-making, and collaborative control. Consequently, ICVs facilitate safe, efficient, comfortable, energy-saving driving, thereby heralding a new generation of automobiles that can autonomously function, hence becoming a pivotal direction for innovative progression in the automotive industry [1]. The product form, industrial ecology, and development concept of ICV deviate substantially from those of the traditional automobile industry, thus promising vast developmental prospects. Externally, ICV is a transportation vehicle, internally, it serves as a powerful information terminal and energy storage unit. Therefore, ICV [2] amalgamates logistics, information, and energy networks. Data plays an instrumental role in organically linking these three networks and harnessing their efficiencies, forming the core of future ICVs for improved intelligence, business model creation, and applications [3]. Throughout their design, research and development, usage, operation, and maintenance, ICVs will collect, process, transmit, and utilize copious amounts of personal, vehicle, road, and environmental data. The sharing and exchange of data are essential prerequisites for the advancement of the automobile industry in this big data era. Such data-sharing practices also exhibit urgent market demand in fields such as autonomous driving model [4] analysis, second-hand car trading, and automobile insurance. However, ensuring the safe and orderly flow of automotive data presents certain challenges. The question then arises: how can we secure the compliance of vehicle data?
For organized ICV data sharing and optimal data value realization, the National Highway Traffic Safety Administration [5] of the United States launched the “AV TEST Initiative” as an online, public platform for disseminating road testing activities of autonomous drive systems. Autonomous vehicles that were previously tested can voluntarily submit information to NHTSA (National Highway Traffic Safety Administration) under the AV TEST Initiative, and NHTSA [6] will provide information viewing services. Meanwhile, Oxbotica, a global autonomous vehicle software company, is collaborating with Cisco to develop an open roaming platform. The platform facilitates autonomous driving fleets to share large volumes of data safely and cost-effectively. It is designed to be fully scalable and can be deployed in a variety of fleet networks, allowing safe and inexpensive data downloading irrespective of fleet size or location. Furthermore, GM is teaming up with BMW to research and implement blockchain technology for sharing autonomous vehicle data among themselves and other automotive manufacturers. Under the auspices of the Mobile Open Blockchain Initiative (MOBI), exploratory work on data sharing in this field is ongoing [7]. However, every scheme has its distinct characteristics and weaknesses. NHTSA introduces third-party organizations that pose centralized risks. GM and BMW’s solutions involve data encryption and storage, as well as decryption and verification each time data is read, which is inefficient. The roaming platform depends on the honesty of the data requester-malicious attackers could issue numerous data acquisition requests and potentially block the network, disrupting regular data flow. None of these schemes consider the reputability of the data holder [8]. This study proposes a decentralized car data sharing scheme based on blockchain technology, linking data sharing behavior with the reputation of the data publisher, aiming to secure data quality and preserve a healthy data sharing ecosystem [9].
The main contributions of this study are as follows:
1) This study proposes a data quality evaluation model based on the concept of the Bloom filter. For each shared data, DDBF is utilized to record the frequency of data complaints. If the number of complaints exceeds a certain threshold, the data is deemed illegal.
2) A decentralized vehicle data sharing method is proposed based on blockchain technology. Trusted interaction of data is achieved without the need for a trusted location. In addition, blockchain is used to record the data flow path.
3) An experimental simulation using Ethereum demonstrates the security and efficiency of the scheme. By comparing the time efficiency with the industrial Internet data trusted exchange and sharing service platform, the feasibility and effectiveness of the approach are verified.
The structure of this paper is arranged as follows: Section 2 introduces the automobile data quality evaluation scheme. Building upon blockchain technology, Section 3 delineates the data sharing strategy for intelligent network-connected vehicles. Section 4 employs experimental analyses to demonstrate the viability and efficiency of the proposed scheme. Finally, Section 5 provides a comprehensive summary of the entire paper and discusses potential future work and areas for enhancement.
2 Data Discrimination Bloom Filter
To ensure the quality of shared data, standardize data sharing activities, and maintain a good data ecology, the data demander can complain about the illegal data it has obtained. When the number of complained data reaches a certain threshold, the data holder will be punished. To improve the time efficiency, based on the idea of Bloom filter, this study designs DDBF to record the number of complaints against each data. Its structure is shown in the Fig. 1, where S represents the length of array V, V [i] = 0, i ∈ {0, 1, 2, …, S−1}. Each user a will be randomly assigned a collection Pa, Pa is a subset of {0, 1, 2, …, S−1}, and a collection Qi will be randomly assigned after the data holder publishes the data information i and stores the label in the blockchain; Qi is a subset of {0, 1, 2,…,S−1}.
When user a wants to complain data i, he will set an element in array V from 0 to 1. The operation steps are presented as follows:
After each epoch in a time period, the system calculates whether the complaint number of each shared data in that time period exceeds the threshold μ. If the threshold value is exceeded, the data holder will be punished, and the operation steps are as follows:
2.2 Data Quality Threshold Measurement Model
Data quality threshold is the critical number of complaints for a certain illegal data. At first, this study firstly calculates the probability of intersection of any two subsets of {0, 1, 2,…, S−1}. Based on this probability, the critical value is calculated recursively, and the integer closest to the critical value is obtained with the dynamic strategy as the threshold.
Suppose P, Q are two subsets of {0, 1, 2, …, S−1}, |P| = m, |Q| = n, x ≤ m ≤ n ≤ s, the probability that any two subsets have an intersection is calculated as follows:
For any piece of data, ξ ≤ | Qdata | is defined as the number of 0 in Qdata, and count is the number of complaints that data has received. The probability that any user a can set a 0 in Qdata to 1 is as follows:
It is assumed that the number of 0 in Qdata is ξ. After data is complained for count times, the number of 0 in Qdata is DRξ. Count, if ξ equals 0, and all elements in Qdata are 1. If count equals 0, the number of 0 in Qdata is ξ. Otherwise, the first complaint has a Pξ probability, making the number of 0 in Qdata be ξ−1, or 1−Pξ probability, making the number of 0 be ξ. DRξ; count is calculated as follows:
Data quality threshold μrepresents the number of 1 in Q data after data is complained t times, which can be calculated by the sum of
After obtaining
3 Fuzzy Anonymous Data Share Frame
The architecture of the connected vehicle data sharing scheme [10] based on blockchain [11] technology proposed in this study is shown in the Fig. 2. The data holder initiates the data sharing request, uploading the data category, size, format, acquisition method and other information to the off-chain storage model. The data demander browses the data information [12] and initiates the data reading request. The data holder sends the requested data to the data demander, and synchronously generates data labels to be packaged and stored in the blockchain. When the data information received is illegal [13], the data demander calls the data complaint smart contract to complain about the data [14]. After each epoch, the audit traceability smart contract checks the data information exceeding the threshold
3.1 Vehicle Data Exchange and Sharing
To bind the data with the identity [16] of the publisher and prevent the data integrity and availability from being damaged by attackers in the subsequent circulation process, the data holder sharer will generate a label MARKdata to be packaged and stored in the blockchain after initiating the data sharing request. This study employs smart contracts ProduceCon to ensure the security and transparency of the label generation process [17]. The specific generation steps are as follows:
When the data holder receives [18] the read request from the data demander, the data holder generates a shared data label through the contract. If the data is generated by the holder, the data is sent to the data demander along with the label. If the data is retransmitted twice, the data label generated this time is discarded, and the data is sent to the data demander along with the original label. The specific steps are presented as follows:
When the data demander receives the data [19], it verifies the data, including the signature of the label generation contract and checks whether the data content is consistent with the description information in the off-chain storage model, whether there is dirty data, and whether the data tag is legal. The specific steps are as follows:
3.2 Vehicle Data Complaints and Audit
The data complainer calls the illegal data complaint algorithm, and sets an element in array V from 0 to 1. To prevent malicious attackers from madly initiating data complaints and conducting denial of service attacks on the system, in the scheme proposed in this study, the data complainer can only set the elements assigned to the subset from 0 to 1. In a time period epocah, the number of complaints is limited. Meanwhile, each data complaint operation is a write operation to group V. To avoid competition conditions and improve the security and transparency of the system, the illegal data complaint algorithm is implemented using smart contracts. It is essential to queue according to the timestamp information carried by each data complaint operation, and linearly execute all complaint requests.
After a time period epocah, the system will check whether the number of complaints about data released in this period reaches the threshold. If the number reaches the threshold, the system will take the data off, decrypt the data label information to obtain the identity of the data holder, and reduce the credit value of the data holder as a punishment. In addition, the above operation does not involve write operation. Therefore, the audit operation can be distributed and concurrently executed by multiple machines, aiming to ensure the system time efficiency.
3.3 Measurement the Credit Value of Participants in Data Sharing
Based on the logistic regression model, this study proposes an algorithm to measure the credit value of data sharers, credit value measurement contract maintain the data sharing behavior record, and takes epocah as a measurement cycle. The measurement content includes six items. The parameter settings are shown in Table 1.
The value of each field in the table is brought into formula (7) to calculate the credit value of the data sharing participant. All data sharing and data reading requests will be discarded when the credit value is less than the system minimum value.
In this study, two ECS servers are employed to build the experimental environment. Totally 15 data sharing participants are virtualized. These data nodes receive real-time data from BYD Dynasty automotive sensors in real time. Ethereum clients are installed to form a private chain. Smart contract scripts are written using solidity, and TLS1.3 is used for communication. The configuration of two servers and 15 virtual nodes is presented in Table 2.
4.2 Time Efficiency of Vehicle Data Sharing Based on Blockchain Technology
According to the experimental test, the time efficiency used by data holder A to share data with data demander B mainly includes the following four parts: data label generation time, data transmission time, data complaint time and audit traceability time. The data transmission time is associated with the specific data type, data volume and sharing method, which is independent of the sharing scheme proposed in this study. The audit traceability time, data label generation time and data complaint time change with the block out time and the number of data. The efficiency is shown in the following Figs. 3–6.
Based on the experimental data in the table, we can find that the audit traceability operation is to read data through the smart contract. This is independent of the block out time and is very short, which can be ignored. However, the data complaint operation and data label generation operation aim to generate a piece of data through smart contract packaging. The time is basically equivalent to a block out time. The data set’s write time is proportional to the concurrent requests and block out time. The above experiments demonstrate the feasibility of the scheme and the time efficiency is within the acceptable range.
To address the common problem of “data island” in the ICV network, this study proposes a connected vehicle data security sharing scheme based on blockchain technology. This scheme binds data with the identity of the data holder through smart contracts and preliminarily addresses the risk of data ownership confirmation and data secondary transfer. The scheme achieves the quality evaluation of shared data based on the data discrimination Bloom filter. By associating the data quality with the credit value of the data holder, the secure and efficient exchange and sharing of data can be realized without the need for a trusted third party. In addition, a good data sharing ecology is maintained. Finally, the Ethereum private chain is built to simulate the data exchange and sharing process proposed in this study. The experimental results demonstrate the feasibility and efficiency of the scheme. In the next stage, we will concentrate on the improvement of space efficiency and time efficiency of the scheme. Because the blockchain can only grow and cannot be deleted, when a piece of data is taken off the shelf, its label is still stored in the blockchain, which greatly wastes storage resources. The data acquirer needs to verify the integrity of the signature and summary when verifying the data quality, which is not beneficial for sharing scenarios with high real-time requirements. Finally, we will consider the business attributes of intelligent connected vehicles and propose a solution that does not influence the real-time performance of the business system in the event of data sharing system failures or hacker attacks. The above issues need to be further studied.
Acknowledgement: We wish to thank the timely help given by China Industrial Control Systems Cyber Emergency Response Team in experimental design, which greatly improved the quality of the work.
Funding Statement: This work was financially supported by the National Key Research and Develop-ment Program of China (2022YFB3103200).
Author Contributions: Conceptualization, Yan Sun, Yitong Liu; methodology, Yan Sun, Yitong Liu; formal analysis, Yan Sun, Caiyun Liu; investigation, Yan Sun, Jun Li; data curation, Yan Sun, Jun Li. All authors reviewed the results and approved the final version of the manuscript.
Availability of Data and Materials: The data are not publicly available due to their containing information that could compromise the privacy of research participants.
Conflicts of Interest: All authors have read and agreed to the published version of the manuscript.
References
1. S. Nakamoto, “Bitcoin: A peer-to-peer electronic cash system,” vol. 3, pp. 99, 2008. doi: 10.2139/ssrn.3440802. [Google Scholar] [CrossRef]
2. A. A. Monrat, O. Schelen, and K. Andersson, “A survey of blockchain from the perspectives of applications, challenges, and opportunities,” IEEE Access, vol. 7, pp. 117134–117151, 2019. doi: 10.1109/ACCESS.2019.2936094. [Google Scholar] [CrossRef]
3. M. Belotti, N. Božić, G. Pujolle, and S. Secci, “A vademecum on blockchain technologies: When, which, and how,” IEEE Commun. Surv. & Tutor. 21, vol. 4, pp. 3796–3838, 2019. [Google Scholar]
4. K. Wüst and A. Gervais, “Do you need a blockchain?” in Crypto Valley Conference on Blockchain Technology (CVCBT), Zug, Switzerland, 2018, pp. 45–54. doi: 10.1109/CVCBT.2018.00011. [Google Scholar] [CrossRef]
5. C. Dannen, Introducing Ethereum and Solidity: Foundations of Cryptocurrency and Blockchain Programming for Beginners. New York City: Apress, 2017, pp. 1–39. [Google Scholar]
6. S. Tikhomirov, “Ethereum: State of knowledge and research perspectives,” in Int. Symp. Found. Pract. Secur., Cham, Springer, 2017, pp. 206–221. [Google Scholar]
7. G. Wood, Ethereum: A secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper, vol. 151, pp. 1–32, 2014. [Google Scholar]
8. M. Valenta and P. Sandner, “Comparison of ethereum, hyperledger fabric and corda,” in FSBC Working Paper, 2017, vol. 8, pp. 1–8. [Google Scholar]
9. X. Zhang and X. Chen, “Data security sharing and storage based on a consortium blockchain in a vehicular ad-hoc network,” IEEE Access, vol. 7, pp. 58241–58254, 2019. doi: 10.1109/ACCESS.2018.2890736. [Google Scholar] [CrossRef]
10. A. Parakh and S. Kak, “Space efficient secret sharing for implicit data security,” Inf. Sci., vol. 181, no. 2, pp. 335–341, 2011. doi: 10.1016/j.ins.2010.09.013. [Google Scholar] [CrossRef]
11. H. Zhou, W. Xu, J. Chen, and W. Wang, “Evolutionary V2X technologies toward the internet of vehicles: Challenges and opportunities,” Proc. IEEE, vol. 108, no. 2, pp. 308–323, 2020. doi: 10.1109/JPROC.2019.2961937. [Google Scholar] [CrossRef]
12. H. Xu, Q. He, X. Li, B. Jiang, and K. Qin, “BDSS-FA: A blockchain-based data security sharing platform with fine-grained access control,” IEEE Access, vol. 8, pp. 87552–87561, 2020. doi: 10.1109/ACCESS.2020.2992649. [Google Scholar] [CrossRef]
13. W. Li, J. Bu, X. Li, and X. Chen, “Security analysis of DeFi: Vulnerabilities,” in 2022 IEEE Int. Conf. Blockchain (Blockchain), Espoo, Finland, 2022, pp. 488–493. doi: 10.1109/Blockchain55522.2022.00075. [Google Scholar] [CrossRef]
14. Y. Xue et al., “A review on the security of the ethereum-based DeFi ecosystem,” Comput. Model. Eng. Sci., vol. 139, no. 1, pp. 1–101, 2024. doi: 10.32604/cmes.2023.031488. [Google Scholar] [CrossRef]
15. L. Wang, S. Huang, L. Zuo, J. Li, and W. Liu, “RCDS: A right-confirmable data-sharing model based on symbol mapping coding and blockchain,” Front. Inform. Technol. Electron. Eng., vol. 24, no. 8, pp. 1194–1213, 2023. doi: 10.1631/FITEE.2200659. [Google Scholar] [CrossRef]
16. Y. Lu, X. Huang, K. Zhang, S. Maharjan, and Y. Zhang, “Blockchain empowered asynchronous federated learning for secure data sharing in internet of vehicles,” IEEE Trans. Vehicular Technol., vol. 69, no. 4, pp. 4298–4311, 2020. doi: 10.1109/TVT.2020.2973651. [Google Scholar] [CrossRef]
17. O. Serrano, L. Dandurand, and S. Brown, “On the design of a cyber security data sharing system,” in Proc. 2014 ACM Workshop Inform. Sharing & Collab. Secur., 2014, pp. 61–69. [Google Scholar]
18. D. Xie, J. Yang, W. Bian, F. Chen, and T. Wang, “An improved identity-based anonymous authentication scheme resistant to semi-trusted server attacks,” IEEE Internet Things J., vol. 10, no. 1, pp. 734–746, 2023. doi: 10.1109/JIOT.2022.3203991. [Google Scholar] [CrossRef]
19. T. Wang, H. Shen, J. Chen, F. Chen, Q. Wu and D. Xie, “A hybrid blockchain-based identity authentication scheme for mobile crowd sensing,” Future Gener. Comput. Syst., vol. 143, no. 6, pp. 40–50, 2023. doi: 10.1016/j.future.2023.01.013. [Google Scholar] [CrossRef]
Cite This Article
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.