Abstract
Sharing cyber threat intelligence (CTI) enhances organizations’ abilities in threat detection and emergency response, fostering a proactive defense approach of “predict and prevent”. Given the sensitive nature of automotive CTI and trust issues inherent in its sharing process, this paper presents an automotive CTI security sharing model that integrates blockchain and attribute-based searchable encryption. Leveraging consortium blockchain for CTI sharing, our model addresses the single point of failure and distrust in centralized systems through blockchain’s decentralization and immutability. Furthermore, by combining attribute-based searchable encryption algorithms with smart contracts, we achieve fine-grained access control and ciphertext retrieval for automotive CTI data. This enables data users to independently search CTI on the blockchain, mitigating the risk of sensitive information disclosure. Additionally, we store encrypted CTI data off-chain in the InterPlanetary File System (IPFS) to alleviate blockchain’s storage burden. Finally, we develop an automotive CTI sharing prototype system to demonstrate the feasibility and effectiveness of our proposed model.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Alobadh, H., Yasin, S.M., Udzir, N.I.: Blockchain-based access control scheme for secure shared personal health records over decentralised storage. Sensors (2021)
Badsha, S., Vakilinia, I., Sengupta, S.: Blocynfo-share: Blockchain based cybersecurity information sharing with fine grained access control. In: 2020 10th Annual Computing and Communication Workshop and Conference, IEEE (2020)
Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE symposium on security and privacy (SP 2007), IEEE (2007)
Bhushan, B., Sinha, P., Sagayam, K.M., Andrew, J.: Untangling blockchain technology: a survey on state of the art, security threats, privacy services, applications and future research directions. Comput. Electr. Eng. (2021)
Bolz, R., Kriesten, R.: Automotive vulnerability disclosure: stakeholders, opportunities, challenges. J. Cybersecurity Priv. 1(2), 274–288 (2021)
Chen, L., Lee, W.K., Chang, C.C., Choo, K.K.R., Zhang, N.: Blockchain based searchable encryption for electronic health record sharing. In: FGCS (2019)
Gao, J., Wang, W., Nikseresht, F., Govinda Rajan, V., Campbell, B.: Pfdrl: personalized federated deep reinforcement learning for residential energy management. In: Proceedings of the 52nd ICPP (2023)
Goodwin, C., et al.: A framework for cybersecurity information sharing and risk reduction. Microsoft (2015)
Guo, X.: Network Threat Intelligence Sharing Mechanism and Implementation Based on Blockchain Smart Contracts. Master’s thesis, BUPT (2019)
Gupta, B.B., Li, K.C., Leung, V.C., Psannis, K.E., Yamaguchi, S., et al.: Blockchain-assisted secure fine-grained searchable encryption for a cloud-based healthcare cyber-physical system. IEEE/CAA J. Automatica Sinica (2021)
Haass, J.C., Ahn, G.J., Grimmelmann, F.: Actra: a case study for threat information sharing. In: Proceedings of the 2nd ACM Workshop on Information Sharing and Collaborative Security, pp. 23–26 (2015)
Homan, D., Shiel, I., Thorpe, C.: A new network model for cyber threat intelligence sharing using blockchain technology. In: 2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS), pp. 1–6. IEEE (2019)
Iftekhar, A., Cui, X., Tao, Q., Zheng, C.: Hyperledger fabric access control system for internet of things layer in blockchain-based applications. Entropy (2021)
Jiang, S., Liu, J., Wang, L., Yoo, S.M.: Verifiable search meets blockchain: a privacy-preserving framework for outsourced encrypted data. In: ICC (2009)
Kampanakis, P.: Security automation and threat information-sharing options. IEEE Secur. Priv. 12(5), 42–51 (2014)
Lin, Y., Liu, P., Wang, H., Wang, W., Zhang, Y.: A survey of research on cybersecurity threat intelligence sharing and exchange. J. Comput. Res. Dev. 57(10), 2052–2065 (2020)
Mavroeidis, V., Bromander, S.: Cyber threat intelligence model: an evaluation of taxonomies, sharing standards, and ontologies within cyber threat intelligence. In: 2017 European Intelligence and Security Informatics Conference (EISIC), pp. 91–98. IEEE (2017)
Morris, D., Madzudzo, G., Garcia-Perez, A.: Cybersecurity threats in the auto industry: tensions in the knowledge environment. Technol. Forecast. Soc. Chang. 157, 120102 (2020)
Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system. A peer-to-peer electronic cash system, Bitcoin (2008)
Niu, S., Xie, Y., Yang, P., Du, X.: Cloud-assisted attribute-based searchable encryption scheme on blockchain. In: JCRD (2021)
Preuveneers, D., Joosen, W.: Tatis: trustworthy apis for threat intelligence sharing with uma and cp-abe. In: Foundations and Practice of Security: 12th International Symposium, pp. 172–188. Springer (2020)
Preuveneers, D., Joosen, W., et al.: Distributed security framework for reliable threat intelligence sharing. Secur. Commun. Netw. 2020 (2020)
Qin, Z., Xu, J., Nie, X., Xiong, H.: A survey of public key searchable encryption schemes. J. Cyber Secur. 2(3) (2017)
Riesco, R., Larriva-Novo, X., Villagrá, V.A.: Cybersecurity threat intelligence knowledge exchange based on blockchain: proposal of a new incentive model based on blockchain and smart contracts to foster the cyber threat and risk intelligence exchange of information. Telecommun. Syst. 73(2), 259–288 (2020)
Siddiqui, Z., Gao, J., Khan, M.K.: An improved lightweight puf-pki digital certificate authentication scheme for the internet of things. IEEE Internet Things J. 9(20), 19744–19756 (2022)
Skopik, F., Settanni, G., Fiedler, R.: A problem shared is a problem halved: a survey on the dimensions of collective cyber defense through security information sharing. Comput. Secur. 60, 154–176 (2016)
Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceeding IEEE S &P (2000)
Stamatellis, C., Papadopoulos, P., Pitropakis, N., Katsikas, S., Buchanan, W.J.: A privacy-preserving healthcare framework using hyperledger fabric. Sensors (2020)
Stupka, V., Horák, M., Husák, M.: Protection of personal data in security alert sharing platforms. In: Proceedings of the 12th ICARS (2017)
Tahir, S., Rajarajan, M.: Privacy-preserving searchable encryption framework for permissioned blockchain networks. In: 2018 IEEE iThings (2018)
Tounsi, W., Rais, H.: A survey on technical threat intelligence in the age of sophisticated cyber attacks. Comput. Secur. 72, 212–233 (2018)
Vázquez, D.F., Acosta, O.P., Spirito, C., Brown, S.: Conceptual framework for cyber defense information sharing within trust relationships. In: CYCON (2012)
Xiang, X., Zhao, X.: Blockchain-assisted searchable attribute-based encryption for e-health systems. J. Syst. Archit. (2022)
Yan, X., Yuan, X.: Blockchain-based and verifiable attribute-based searchable encryption scheme. J. Commun./Tongxin Xuebao (2020)
Yang, Y., Lin, H., Liu, X., Guo, W., Zheng, X.: Blockchain-based verifiable multi-keyword ranked search on encrypted cloud with fair payment. IEEE Access (2019)
Yang, Z., Zhang, H., Yu, H., Li, Z., Zhu, B., Sinnott, R.O.: Attribute-based keyword search over the encrypted blockchain. Comput. Model. Eng. Sci. 128(1), 269–282 (2021)
Zhang, W., Bai, Y., Feng, J.: Tiia: a blockchain-enabled threat intelligence integrity audit scheme for IIoT. Futur. Gener. Comput. Syst. 132, 254–265 (2022)
Zhang, Y., Zhu, T., Zheng, D.: Blockchain-based fine-grained multi-keyword searchable encryption scheme. Inf. Netw. Secur. (2021)
Zhao, W., White, G.: A collaborative information sharing framework for community cyber security. In: IEEE HST (2012)
Zheng, Q., Xu, S., Ateniese, G.: Vabks: verifiable attribute-based keyword search over outsourced encrypted data. In: IEEE INFOCOM (2014)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2025 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Xie, T., Liu, F., Gao, J., Wang, Y. (2025). Integrating Consortium Blockchain and Attribute-Based Searchable Encryption for Automotive Threat Intelligence Sharing Model. In: Zhao, J., Meng, W. (eds) Science of Cyber Security. SciSec 2024. Lecture Notes in Computer Science, vol 15441. Springer, Singapore. https://doi.org/10.1007/978-981-96-2417-1_19
Download citation
DOI: https://doi.org/10.1007/978-981-96-2417-1_19
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-96-2416-4
Online ISBN: 978-981-96-2417-1
eBook Packages: Computer ScienceComputer Science (R0)