A. P, S. A, R. Elavarasu, Shilpi Singhal, Shubha G. V., Ashok Kumar
{"title":"基于区块链的车联网安全数据传输","authors":"A. P, S. A, R. Elavarasu, Shilpi Singhal, Shubha G. V., Ashok Kumar","doi":"10.1109/iciptm54933.2022.9753890","DOIUrl":null,"url":null,"abstract":"To address the issues that traditional Internet of Vehicles (IoV) data is readily manipulated with and access control is inflexible, a security sharing method for IoV data is presented that utilizes blockchain technology and weighted cipher text policy attribute-based encryption. Maintain the production, verification, and storage of blocks, implement distributed data storage, and secure the integrity of data; access control of data on the chain based on characteristics to ensure that only authorized visitors may access data content; For the Internet of Vehicles data access, a multi-attribute-based hierarchical access policy formulation approach is built by mining the association relationship between points and permissions between roles. This method simplifies the complexity of access control policies. The built-in hierarchical access policy formulation approach efficiently reduces the computation and transmission overhead of cars while meeting the needs of the Internet of Vehicles scenario for access to various entities and different roles.","PeriodicalId":6810,"journal":{"name":"2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"49 1","pages":"765-769"},"PeriodicalIF":0.0000,"publicationDate":"2022-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Block chain Based Secure Data Transmission among Internet of Vehicles\",\"authors\":\"A. P, S. A, R. Elavarasu, Shilpi Singhal, Shubha G. V., Ashok Kumar\",\"doi\":\"10.1109/iciptm54933.2022.9753890\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"To address the issues that traditional Internet of Vehicles (IoV) data is readily manipulated with and access control is inflexible, a security sharing method for IoV data is presented that utilizes blockchain technology and weighted cipher text policy attribute-based encryption. Maintain the production, verification, and storage of blocks, implement distributed data storage, and secure the integrity of data; access control of data on the chain based on characteristics to ensure that only authorized visitors may access data content; For the Internet of Vehicles data access, a multi-attribute-based hierarchical access policy formulation approach is built by mining the association relationship between points and permissions between roles. This method simplifies the complexity of access control policies. The built-in hierarchical access policy formulation approach efficiently reduces the computation and transmission overhead of cars while meeting the needs of the Internet of Vehicles scenario for access to various entities and different roles.\",\"PeriodicalId\":6810,\"journal\":{\"name\":\"2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM)\",\"volume\":\"49 1\",\"pages\":\"765-769\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-02-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/iciptm54933.2022.9753890\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/iciptm54933.2022.9753890","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Block chain Based Secure Data Transmission among Internet of Vehicles
To address the issues that traditional Internet of Vehicles (IoV) data is readily manipulated with and access control is inflexible, a security sharing method for IoV data is presented that utilizes blockchain technology and weighted cipher text policy attribute-based encryption. Maintain the production, verification, and storage of blocks, implement distributed data storage, and secure the integrity of data; access control of data on the chain based on characteristics to ensure that only authorized visitors may access data content; For the Internet of Vehicles data access, a multi-attribute-based hierarchical access policy formulation approach is built by mining the association relationship between points and permissions between roles. This method simplifies the complexity of access control policies. The built-in hierarchical access policy formulation approach efficiently reduces the computation and transmission overhead of cars while meeting the needs of the Internet of Vehicles scenario for access to various entities and different roles.