2020
DOI: 10.1109/tvt.2020.2968094
|View full text |Cite
|
Sign up to set email alerts
|

A Secure and Verifiable Data Sharing Scheme Based on Blockchain in Vehicular Social Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
48
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 128 publications
(48 citation statements)
references
References 31 publications
0
48
0
Order By: Relevance
“…However, from a security point of view, the encoded data does not have a solid link bridge organization, which can not effectively resist the spam file attack on the network, and it is easy to cause data damage. As the simplest link bridge node, network data security sharing code can provide connection endpoints for stored data [7]. Adding network data transmission suffixes can improve the stability and security of data itself, and meet the physical characteristics of cloud platform storage data.…”
Section: Secure Sharing Methods Of Network Data Transmission 21 Network Data Transmission Security Protocol Settingsmentioning
confidence: 99%
“…However, from a security point of view, the encoded data does not have a solid link bridge organization, which can not effectively resist the spam file attack on the network, and it is easy to cause data damage. As the simplest link bridge node, network data security sharing code can provide connection endpoints for stored data [7]. Adding network data transmission suffixes can improve the stability and security of data itself, and meet the physical characteristics of cloud platform storage data.…”
Section: Secure Sharing Methods Of Network Data Transmission 21 Network Data Transmission Security Protocol Settingsmentioning
confidence: 99%
“…Technological Fan et al [64] propose a much more secure and verifiable data intercommunication scheme to solve the problem of traditional encryption schemes centered on ciphertext policy attributes (CP-ABE), which lack credibility due to centralization. Transaction transparency and data protection in the logistics chain [6].…”
Section: Technologicalmentioning
confidence: 99%
“…While Fan et al [13] proposed a secure and verifiable data sharing scheme to realize data sharing in VSNs. They upload the data's access policy onto a blockchain, realizing the self-certification of users, data confidentiality, and cloud attack resistance.…”
Section: Related Workmentioning
confidence: 99%
“…Therefore, blockchain-based CP-ABE schemes are proposed. These schemes store the access policy in the blockchain [13,14], and due to the blockchain's openness characteristics, users can verify whether their attributes are satisfied with the ciphertext's access policy independently. Thus, the cloud cannot deny authorized users access to the data.…”
Section: Introductionmentioning
confidence: 99%