[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

Integrating Consortium Blockchain and Attribute-Based Searchable Encryption for Automotive Threat Intelligence Sharing Model

  • Conference paper
  • First Online:
Science of Cyber Security (SciSec 2024)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 15441))

Included in the following conference series:

  • 1 Accesses

Abstract

Sharing cyber threat intelligence (CTI) enhances organizations’ abilities in threat detection and emergency response, fostering a proactive defense approach of “predict and prevent”. Given the sensitive nature of automotive CTI and trust issues inherent in its sharing process, this paper presents an automotive CTI security sharing model that integrates blockchain and attribute-based searchable encryption. Leveraging consortium blockchain for CTI sharing, our model addresses the single point of failure and distrust in centralized systems through blockchain’s decentralization and immutability. Furthermore, by combining attribute-based searchable encryption algorithms with smart contracts, we achieve fine-grained access control and ciphertext retrieval for automotive CTI data. This enables data users to independently search CTI on the blockchain, mitigating the risk of sensitive information disclosure. Additionally, we store encrypted CTI data off-chain in the InterPlanetary File System (IPFS) to alleviate blockchain’s storage burden. Finally, we develop an automotive CTI sharing prototype system to demonstrate the feasibility and effectiveness of our proposed model.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 49.99
Price includes VAT (United Kingdom)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 64.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Alobadh, H., Yasin, S.M., Udzir, N.I.: Blockchain-based access control scheme for secure shared personal health records over decentralised storage. Sensors (2021)

    Google Scholar 

  2. Badsha, S., Vakilinia, I., Sengupta, S.: Blocynfo-share: Blockchain based cybersecurity information sharing with fine grained access control. In: 2020 10th Annual Computing and Communication Workshop and Conference, IEEE (2020)

    Google Scholar 

  3. Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE symposium on security and privacy (SP 2007), IEEE (2007)

    Google Scholar 

  4. Bhushan, B., Sinha, P., Sagayam, K.M., Andrew, J.: Untangling blockchain technology: a survey on state of the art, security threats, privacy services, applications and future research directions. Comput. Electr. Eng. (2021)

    Google Scholar 

  5. Bolz, R., Kriesten, R.: Automotive vulnerability disclosure: stakeholders, opportunities, challenges. J. Cybersecurity Priv. 1(2), 274–288 (2021)

    Article  Google Scholar 

  6. Chen, L., Lee, W.K., Chang, C.C., Choo, K.K.R., Zhang, N.: Blockchain based searchable encryption for electronic health record sharing. In: FGCS (2019)

    Google Scholar 

  7. Gao, J., Wang, W., Nikseresht, F., Govinda Rajan, V., Campbell, B.: Pfdrl: personalized federated deep reinforcement learning for residential energy management. In: Proceedings of the 52nd ICPP (2023)

    Google Scholar 

  8. Goodwin, C., et al.: A framework for cybersecurity information sharing and risk reduction. Microsoft (2015)

    Google Scholar 

  9. Guo, X.: Network Threat Intelligence Sharing Mechanism and Implementation Based on Blockchain Smart Contracts. Master’s thesis, BUPT (2019)

    Google Scholar 

  10. Gupta, B.B., Li, K.C., Leung, V.C., Psannis, K.E., Yamaguchi, S., et al.: Blockchain-assisted secure fine-grained searchable encryption for a cloud-based healthcare cyber-physical system. IEEE/CAA J. Automatica Sinica (2021)

    Google Scholar 

  11. Haass, J.C., Ahn, G.J., Grimmelmann, F.: Actra: a case study for threat information sharing. In: Proceedings of the 2nd ACM Workshop on Information Sharing and Collaborative Security, pp. 23–26 (2015)

    Google Scholar 

  12. Homan, D., Shiel, I., Thorpe, C.: A new network model for cyber threat intelligence sharing using blockchain technology. In: 2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS), pp. 1–6. IEEE (2019)

    Google Scholar 

  13. Iftekhar, A., Cui, X., Tao, Q., Zheng, C.: Hyperledger fabric access control system for internet of things layer in blockchain-based applications. Entropy (2021)

    Google Scholar 

  14. Jiang, S., Liu, J., Wang, L., Yoo, S.M.: Verifiable search meets blockchain: a privacy-preserving framework for outsourced encrypted data. In: ICC (2009)

    Google Scholar 

  15. Kampanakis, P.: Security automation and threat information-sharing options. IEEE Secur. Priv. 12(5), 42–51 (2014)

    Article  MATH  Google Scholar 

  16. Lin, Y., Liu, P., Wang, H., Wang, W., Zhang, Y.: A survey of research on cybersecurity threat intelligence sharing and exchange. J. Comput. Res. Dev. 57(10), 2052–2065 (2020)

    MATH  Google Scholar 

  17. Mavroeidis, V., Bromander, S.: Cyber threat intelligence model: an evaluation of taxonomies, sharing standards, and ontologies within cyber threat intelligence. In: 2017 European Intelligence and Security Informatics Conference (EISIC), pp. 91–98. IEEE (2017)

    Google Scholar 

  18. Morris, D., Madzudzo, G., Garcia-Perez, A.: Cybersecurity threats in the auto industry: tensions in the knowledge environment. Technol. Forecast. Soc. Chang. 157, 120102 (2020)

    Article  Google Scholar 

  19. Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system. A peer-to-peer electronic cash system, Bitcoin (2008)

    Google Scholar 

  20. Niu, S., Xie, Y., Yang, P., Du, X.: Cloud-assisted attribute-based searchable encryption scheme on blockchain. In: JCRD (2021)

    Google Scholar 

  21. Preuveneers, D., Joosen, W.: Tatis: trustworthy apis for threat intelligence sharing with uma and cp-abe. In: Foundations and Practice of Security: 12th International Symposium, pp. 172–188. Springer (2020)

    Google Scholar 

  22. Preuveneers, D., Joosen, W., et al.: Distributed security framework for reliable threat intelligence sharing. Secur. Commun. Netw. 2020 (2020)

    Google Scholar 

  23. Qin, Z., Xu, J., Nie, X., Xiong, H.: A survey of public key searchable encryption schemes. J. Cyber Secur. 2(3) (2017)

    Google Scholar 

  24. Riesco, R., Larriva-Novo, X., Villagrá, V.A.: Cybersecurity threat intelligence knowledge exchange based on blockchain: proposal of a new incentive model based on blockchain and smart contracts to foster the cyber threat and risk intelligence exchange of information. Telecommun. Syst. 73(2), 259–288 (2020)

    Article  Google Scholar 

  25. Siddiqui, Z., Gao, J., Khan, M.K.: An improved lightweight puf-pki digital certificate authentication scheme for the internet of things. IEEE Internet Things J. 9(20), 19744–19756 (2022)

    Article  Google Scholar 

  26. Skopik, F., Settanni, G., Fiedler, R.: A problem shared is a problem halved: a survey on the dimensions of collective cyber defense through security information sharing. Comput. Secur. 60, 154–176 (2016)

    Article  MATH  Google Scholar 

  27. Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceeding IEEE S &P (2000)

    Google Scholar 

  28. Stamatellis, C., Papadopoulos, P., Pitropakis, N., Katsikas, S., Buchanan, W.J.: A privacy-preserving healthcare framework using hyperledger fabric. Sensors (2020)

    Google Scholar 

  29. Stupka, V., Horák, M., Husák, M.: Protection of personal data in security alert sharing platforms. In: Proceedings of the 12th ICARS (2017)

    Google Scholar 

  30. Tahir, S., Rajarajan, M.: Privacy-preserving searchable encryption framework for permissioned blockchain networks. In: 2018 IEEE iThings (2018)

    Google Scholar 

  31. Tounsi, W., Rais, H.: A survey on technical threat intelligence in the age of sophisticated cyber attacks. Comput. Secur. 72, 212–233 (2018)

    Article  MATH  Google Scholar 

  32. Vázquez, D.F., Acosta, O.P., Spirito, C., Brown, S.: Conceptual framework for cyber defense information sharing within trust relationships. In: CYCON (2012)

    Google Scholar 

  33. Xiang, X., Zhao, X.: Blockchain-assisted searchable attribute-based encryption for e-health systems. J. Syst. Archit. (2022)

    Google Scholar 

  34. Yan, X., Yuan, X.: Blockchain-based and verifiable attribute-based searchable encryption scheme. J. Commun./Tongxin Xuebao (2020)

    Google Scholar 

  35. Yang, Y., Lin, H., Liu, X., Guo, W., Zheng, X.: Blockchain-based verifiable multi-keyword ranked search on encrypted cloud with fair payment. IEEE Access (2019)

    Google Scholar 

  36. Yang, Z., Zhang, H., Yu, H., Li, Z., Zhu, B., Sinnott, R.O.: Attribute-based keyword search over the encrypted blockchain. Comput. Model. Eng. Sci. 128(1), 269–282 (2021)

    MATH  Google Scholar 

  37. Zhang, W., Bai, Y., Feng, J.: Tiia: a blockchain-enabled threat intelligence integrity audit scheme for IIoT. Futur. Gener. Comput. Syst. 132, 254–265 (2022)

    Article  MATH  Google Scholar 

  38. Zhang, Y., Zhu, T., Zheng, D.: Blockchain-based fine-grained multi-keyword searchable encryption scheme. Inf. Netw. Secur. (2021)

    Google Scholar 

  39. Zhao, W., White, G.: A collaborative information sharing framework for community cyber security. In: IEEE HST (2012)

    Google Scholar 

  40. Zheng, Q., Xu, S., Ateniese, G.: Vabks: verifiable attribute-based keyword search over outsourced encrypted data. In: IEEE INFOCOM (2014)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yinghui Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2025 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Xie, T., Liu, F., Gao, J., Wang, Y. (2025). Integrating Consortium Blockchain and Attribute-Based Searchable Encryption for Automotive Threat Intelligence Sharing Model. In: Zhao, J., Meng, W. (eds) Science of Cyber Security. SciSec 2024. Lecture Notes in Computer Science, vol 15441. Springer, Singapore. https://doi.org/10.1007/978-981-96-2417-1_19

Download citation

  • DOI: https://doi.org/10.1007/978-981-96-2417-1_19

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-96-2416-4

  • Online ISBN: 978-981-96-2417-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics