Professional Documents
Culture Documents
FLYING AUTOMATION
Digital Object Identifier: Zhihan Lv and Liang Qiao are with Qingdao University; M. Shamim Hossain (corresponding author) is with the Chair of Pervasive and Mobile Computing,
10.1109/MNET.011.2000154 King Saud University; Bong Jun Choi is with Soongsil University.
Read
of UAV big data are twofold. First, the mechanism
has high performance in security services, such as
key issuance and verification. Second, the execu-
tion times of storing data, releasing the key, and
Upload download Upload download Upload download
verification are within a specified period.
Data layer
dAtA ProtectIon PrIvAcy scheme
The proposed privacy protection scheme of UAV
big data is executed in four stages. In the first
stage, user data is encrypted. In the second stage,
User layer
files are uploaded and downloaded. In the third
stage, data is recorded in the blockchain, and user
data is read from the blockchain. In the fourth
FIGURE 2. Privacy protection model for UAV data.
stage, data is exchanged. The recording operation
in the third stage is the most crucial stage, which
contains two parts. The first part is the data block
desIgn of PrIvAcy ProtectIon scheme for uAv of the blockchain, and the other part is the smart
bIg dAtA bAsed on bLockchAIn technoLogy contract.
To ensure that the recorded content is secure
system modeLs And desIgn obJectIves in blocks, the hash value of the information is
The privacy protection model of UAV big data is stored in the corresponding blockchain structure.
shown in Fig. 2. The model includes a user layer, Since the data in the blockchain is composed of
a data layer, a cloud layer, and a blockchain many message blocks, it is necessary to calculate
layer. In the user layer, users use blockchain the Merkle root of the data block according to
technology to prevent shared data from being the corresponding hash value algorithm. There-
stolen or tampered with. In addition, they can fore, tampering with the data is not possible. The
also use blockchain technology to track transac- message blocks processed in this way are natural-
tions. In the data layer, the information that the ly advantageous in the P2P network, and the cost
user wants to protect is stored. An NTRU pass- of data verification can be significantly reduced.
word is used to encrypt and protect the data.
The data layer is interfaced with the cloud layer PrIvAcy AnALysIs
to share the data. When users need to store As for the privacy protection of UAV big data, the
data, they use a decryption algorithm to recov- data should not be leaked. In the privacy protec-
er the original data. The cloud is a medium for tion of data, the data exchange is carried out only
downloading, uploading, writing, and reading between users and the data center. Information
data. The blockchain layer can provide a pow- is encrypted, and the NTRU password protection
erful abstraction for distributed protocols. The mechanism is used in the blockchain system. The
operations performed in the cloud are recorded protocol guarantees that other users cannot gain
by the blockchain. Once recorded by the block- any information about the encrypted data, and
chain system, the data cannot be deleted or the data center alone cannot decrypt the cipher-
tampered with. This is one of the most valuable text nor deduce the private key of each user.
features of blockchain. Therefore, data privacy protection is provided,
The proposed system model has the follow- and the privacy of the private keys of each user
ing assumptions. First, the number of penetration is preserved.
attacks on semi-honest users is at most (t – 1). In detail, only the ciphertexts are transmit-
Second, there are less than (t – 1) colluding users ted, and they are only transmitted between the
trying to decrypt the ciphertext, which means that user and the data center. If there is no collusion
less than or equal to (t – 1) users cannot unscram- between users, they will not be able to decrypt
ble the ciphertext. The following definitions are the ciphertext because the (p, t) -threshold NTRU
used in the proposed model. cryptography system is used. Therefore, even
Definition 1: When decrypting data, each user if some user or data center gets the ciphertext
needs to provide a valid key value that is kept for the sum Epk( Kk=1 k) , it cannot be decrypted
secret from other users. Therefore, at least t users, unless there is cooperation between t or more
called a threshold, are needed to decrypt the users having their share of the private key.
K
ciphertext collectively. Also, even if the data center has the k=1k, it
Definition 2: The NTRU cryptosystem is used cannot decrypt the ciphertext Epk(k) as the indi-
to encrypt and store user data in the cloud. The vidual private key k is kept secret by each user.
data is then hashed and stored in the blockchain. Therefore, the privacy of each user’s private key
The encryption key is distributed to the P users, is well protected.
Biographies
Zhihan Lv [SM’19] is currently an associate professor at Qingd-
ao University, China. He was an assistant professor at Shenzhen
Institutes of Advanced Technology, Chinese Academy of Sci-
ences from 2012 to 2016. He received his Ph.D. from Ocean
University of China and Paris7 University in 2012. He worked
at CNRS, France, as a research engineer; Umea University,
Sweden, as a postdoctoral research fellow; Fundacion FIVAN,
FIGURE 4. Homomorphic encryption time of NTRU. Spain, as an experienced researcher; University College London,
United Kingdom, as a research associate; and the University of
show that the proposed threshold scheme effec- Barcelona, Spain, as a postdoctoral researcher. He was a Marie
tively protects the privacy of data and user keys. Curie Fellow in the European Union’s Seventh Framework Pro-
gram LANPERCEPT. His research mainly focuses on the Internet
The performance evaluation results show that of Things, blockchain, multimedia, augmented reality, virtual
the scheme is effective at generating keys and reality, computer vision, 3D visualization and graphics, serious
executing encryptions/decryptions. Moreover, games, HCI, big data, and GIS. He has contributed 200+ papers
the homomorphic property of the NTRU crypto- in the related fields on journals such as IEEE TII, IEEE TITS, IEEE
TFS, ACM TOMM, ACM TOIT, and ACM TIST, among others, and
system shows that the proposed scheme provides conferences such as ACM MM, ACM CHI, ACM Siggraph Asia,
good security performance. We believe that the ICCV, and IEEE Virtual Reality. He is an Associate Editor of Plos
work has good theoretical significance for the one (since 2016), IEEE Access (since 2016), Neurocomputing
privacy protection of UAV big data. In addition, (2016–2018), and IET Image Processing (since 2017). He has
been lead Guest Editor of IEEE Transactions on Industrial Infor-
we expect that the presented work can give matics, IEEE Transactions on Intelligent Transportation Systems,
insights into providing a good practical idea for IEEE Network, IEEE Sensors, IEEE Consumer Electronics Magazine,
the research of blockchain technology in UAV and Future Generation Computer Systems. He was a Program
data protection. Committee member of ACM IUI2015, 2016, 2019, and 2020,
IEEE CHASE Workshop on BIGDATA4HEALTH 2016, 2017,
Acknowledgment IEEE/CIC WIN Workshop 2016, IIKI2016 2019, WASA2016,
2017, IEEE PDGC2016, ACM SAC2017-WCN Track, and more.
The authors are grateful to the Deanship of Sci-
entific Research at King Saud University, Riyadh, Liang Qiao [S’20] is currently a graduate student in the School
Saudi Arabia, for funding this work through the of Data Science and Software Engineering at Qingdao Universi-
Vice Deanship of Scientific Research Chairs: Chair ty. His research interests include machine learning, blockchain,
and virtual reality. In 2019, he obtained a bachelor’s degree
of Pervasive and Mobile Computing. from Qingdao University. In 2018, he won the second prize of
the National Software and Information Technology Competition
References in China. He has rich experience in algorithm design.
[1] R. Y. Zheng, “A Blockchain Based Privacy-Preserving Incen-
tive Mechanism in Crowdsensing Applications,” IEEE Access, M. Shamim Hossain [SM’09] (mshossain@ksu. edu.sa), corre-
vol. 6, no. 1, 2018, pp. 17,545–56. sponding author, is currently a professor with the Chair of Per-