{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,25]],"date-time":"2025-04-25T05:31:16Z","timestamp":1745559076769,"version":"3.37.3"},"reference-count":46,"publisher":"MDPI AG","issue":"20","license":[{"start":{"date-parts":[[2022,10,21]],"date-time":"2022-10-21T00:00:00Z","timestamp":1666310400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Sichuan Science and Technology Program","award":["2022YFG0315"]},{"name":"National Key R&D Program of China","award":["2018YFA0306703"]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"The rapid advancement of the Internet of Vehicles (IoV) has led to a massive growth in data received from IoV networks. The cloud storage has been a timely service that provides a vast range of data storage for IoV networks. However, existing data storage and access models used to manage and protect data in IoV networks have proven to be insufficient. They are centralized and usually accompanied by a lack of trust, transparency, security, immutability, and provenance. In this paper, we propose VBlock, a blockchain-based system that addresses the issues of illegal modification of outsourced vehicular data for smart city management and improvement. We introduce a novel collusion-resistant model for outsourcing data to cloud storage that ensures the network remains tamper-proof, has good data provenance and auditing, and solves the centralized problems prone to the single point of failure. We introduced a key revocation mechanism to secure the network from malicious nodes. We formally define the system model of VBlock in the setting of a consortium blockchain. Our simulation results and security analysis show that the proposed model provides a strong security guarantee with high efficiency and is practicable in the IoV environment.<\/jats:p>","DOI":"10.3390\/s22208083","type":"journal-article","created":{"date-parts":[[2022,10,24]],"date-time":"2022-10-24T14:09:23Z","timestamp":1666620563000},"page":"8083","source":"Crossref","is-referenced-by-count":8,"title":["VBlock: A Blockchain-Based Tamper-Proofing Data Protection Model for Internet of Vehicle Networks"],"prefix":"10.3390","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8225-6023","authenticated-orcid":false,"given":"Collins","family":"Sey","sequence":"first","affiliation":[{"name":"School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu 610054, China"}]},{"given":"Hang","family":"Lei","sequence":"additional","affiliation":[{"name":"School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu 610054, China"}]},{"given":"Weizhong","family":"Qian","sequence":"additional","affiliation":[{"name":"School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu 610054, China"}]},{"given":"Xiaoyu","family":"Li","sequence":"additional","affiliation":[{"name":"School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu 610054, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3075-9144","authenticated-orcid":false,"given":"Linda Delali","family":"Fiasam","sequence":"additional","affiliation":[{"name":"School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu 610054, China"}]},{"given":"Seth Larweh","family":"Kodjiku","sequence":"additional","affiliation":[{"name":"School of Computer and Information Engineering, Zhejiang Gongshang University, Hangzhou 310018, China"}]},{"given":"Isaac","family":"Adjei-Mensah","sequence":"additional","affiliation":[{"name":"School of Information and Communication Engineering, University of Electronic Science and Technology of China, Chengdu 611731, China"}]},{"given":"Isaac Osei","family":"Agyemang","sequence":"additional","affiliation":[{"name":"School of Information and Communication Engineering, University of Electronic Science and Technology of China, Chengdu 611731, China"}]}],"member":"1968","published-online":{"date-parts":[[2022,10,21]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1109\/MWC.2015.7368833","article-title":"Integration challenges of intelligent transportation systems with connected vehicle, cloud computing, and internet of things technologies","volume":"22","author":"Zeadally","year":"2015","journal-title":"IEEE Wirel. Commun."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"1259","DOI":"10.1109\/JIOT.2017.2695535","article-title":"Big Sensor Data Systems for Smart Cities","volume":"4","author":"Ang","year":"2017","journal-title":"IEEE Internet Things J."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"8182","DOI":"10.1109\/JIOT.2019.2935189","article-title":"IoT: Internet of Threats? A Survey of Practical Security Vulnerabilities in Real IoT Devices","volume":"6","author":"Meneghello","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"ref_4","first-page":"19","article-title":"A survey on authentication schemes in VANETs for secured communication","volume":"9","author":"Manvi","year":"2017","journal-title":"Veh. Commun."},{"key":"ref_5","first-page":"45","article-title":"Authentication and privacy schemes for vehicular ad hoc networks (VANETs): A survey","volume":"16","author":"Ali","year":"2019","journal-title":"Veh. Commun."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"406","DOI":"10.1016\/j.future.2020.09.038","article-title":"LEChain: A blockchain-based lawful evidence management scheme for digital forensics","volume":"115","author":"Li","year":"2021","journal-title":"Futur. Gener. Comput. Syst."},{"unstructured":"Upstream Security (2022, May 20). Global Automotive Cybersecurity Report 2021. Available online: https:\/\/upstream.auto\/2021Report\/.","key":"ref_7"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1016\/j.sysarc.2018.12.005","article-title":"Authentication in cloud-driven IoT-based big data environment: Survey and outlook","volume":"97","author":"Wazid","year":"2018","journal-title":"J. Syst. Arch."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"107721","DOI":"10.1016\/j.compeleceng.2022.107721","article-title":"ESSecA: An automated expert system for threat modelling and penetration testing for IoT ecosystems","volume":"99","author":"Rak","year":"2022","journal-title":"Comput. Electr. Eng."},{"unstructured":"Al-Riyami, S.S., and Paterson, K.G. (December, January 30). Certificateless Public Key Cryptography. Proceedings of the 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan.","key":"ref_10"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"5771","DOI":"10.1109\/TII.2021.3136580","article-title":"A Hybrid Blockchain-Based Log Management Scheme With Nonrepudiation for Smart Grids","volume":"18","author":"Le","year":"2021","journal-title":"IEEE Trans. Ind. Informatics"},{"doi-asserted-by":"crossref","unstructured":"Agyekum, K.O.-B.O., Xia, Q., Sifah, E.B., Gao, J., Xia, H., Du, X., and Guizani, M. (2019). A Secured Proxy-Based Data Sharing Module in IoT Environments Using Blockchain. Sensors, 19.","key":"ref_12","DOI":"10.3390\/s19051235"},{"key":"ref_13","first-page":"184","article-title":"Block-VN A Distributed Blockchain Based Vehicular Network Architecture in Smart City","volume":"13","author":"Sharma","year":"2017","journal-title":"J. Inf. Process. Syst."},{"doi-asserted-by":"crossref","unstructured":"Yuan, Y., and Wang, F.Y. (2016, January 1\u20134). Towards blockchain-based intelligent transportation systems. Proceedings of the 2016 IEEE 19th International Conference on Intelligent Transportation Systems (ITSC), Rio de Janeiro, Brazil.","key":"ref_14","DOI":"10.1109\/ITSC.2016.7795984"},{"doi-asserted-by":"crossref","unstructured":"Vallent, T., Hanyurwimfura, D., and Mikeka, C. (2021). Efficient Certificate-Less Aggregate Signature Scheme with Conditional Privacy-Preservation for Vehicular Ad Hoc Networks Enhanced Smart Grid System. Sensors, 21.","key":"ref_15","DOI":"10.3390\/s21092900"},{"doi-asserted-by":"crossref","unstructured":"Liu, G., Fan, N., Wu, C.Q., and Zou, X. (2022). On a Blockchain-Based Security Scheme for Defense against Malicious Nodes in Vehicular Ad-Hoc Networks. Sensors, 22.","key":"ref_16","DOI":"10.3390\/s22145361"},{"doi-asserted-by":"crossref","unstructured":"Ma, X., Ge, C., and Liu, Z. (209, January 15\u201318). Blockchain-Enabled Privacy-Preserving Internet of Vehicles: Decentralized and Reputation-Based Network Architecture. Proceedings of the International Conference on Network and System Security 2019, Sapporo, Japan.","key":"ref_17","DOI":"10.1007\/978-3-030-36938-5_20"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"4660","DOI":"10.1109\/JIOT.2018.2875542","article-title":"Blockchain for Secure and Efficient Data Sharing in Vehicular Edge Computing and Networks","volume":"6","author":"Kang","year":"2019","journal-title":"IEEE Internet Things J."},{"doi-asserted-by":"crossref","unstructured":"Javaid, U., Aman, M.N., and Sikdar, B. (2019\u20131, January 28). DrivMan: Driving Trust Management and Data Sharing in VANETs with Blockchain and Smart Contracts. Proceedings of the 2019 IEEE 89th Vehicular Technology Conference (VTC2019-Spring), Kuala Lumpur, Malaysia.","key":"ref_19","DOI":"10.1109\/VTCSpring.2019.8746499"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"8085","DOI":"10.1007\/s11042-019-08284-8","article-title":"Blockchain-based multimedia sharing in vehicular social networks with privacy protection","volume":"79","author":"Shi","year":"2020","journal-title":"Multimedia Tools Appl."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"101636","DOI":"10.1016\/j.sysarc.2019.101636","article-title":"A blockchain-based certificateless public key signature scheme for vehicle-to-infrastructure communication in VANETs","volume":"99","author":"Ali","year":"2019","journal-title":"J. Syst. Arch."},{"key":"ref_22","first-page":"1","article-title":"Blockchain-Based Internet of Vehicles Privacy Protection System","volume":"2020","author":"Su","year":"2020","journal-title":"Wirel. Commun. Mob. Comput."},{"doi-asserted-by":"crossref","unstructured":"Malik, N., Nanda, P., Arora, A., He, X., and Puthal, D. (2018, January 1\u20133). Blockchain Based Secured Identity Authentication and Expeditious Revocation Framework for Vehicular Networks. Proceedings of the 2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications\/12th IEEE International Conference on Big Data Science and Engineering (TrustCom\/BigDataSE), New York, NY, USA.","key":"ref_23","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00099"},{"doi-asserted-by":"crossref","unstructured":"Jabbar, R., Kharbeche, M., Al-Khalifa, K., Krichen, M., and Barkaoui, K. (2020). Blockchain for the Internet of Vehicles: A Decentralized IoT Solution for Vehicles Communication Using Ethereum. Sensors, 20.","key":"ref_24","DOI":"10.3390\/s20143928"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1109\/MCC.2016.94","article-title":"Cryptographic Public Verification of Data Integrity for Cloud Storage Systems","volume":"3","author":"Zhang","year":"2016","journal-title":"IEEE Cloud Comput."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"4101","DOI":"10.1109\/TII.2018.2832251","article-title":"HealthDep: An Efficient and Secure Deduplication Scheme for Cloud-Assisted eHealth Systems","volume":"14","author":"Zhang","year":"2018","journal-title":"IEEE Trans. Ind. Inform."},{"doi-asserted-by":"crossref","unstructured":"Kumar, R., and Sharma, R. (2021). Leveraging blockchain for ensuring trust in IoT: A survey. J. King Saud Univ. Comput. Inf. Sci.","key":"ref_27","DOI":"10.1016\/j.jksuci.2021.09.004"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"4157","DOI":"10.1109\/JIOT.2020.3028368","article-title":"Blockchain for the Internet of Vehicles Towards Intelligent Transportation Systems: A Survey","volume":"8","author":"Mollah","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"103007","DOI":"10.1016\/j.jnca.2021.103007","article-title":"Blockchain for IoT-based smart cities: Recent advances, requirements, and future challenges","volume":"181","author":"Seon","year":"2021","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"103050","DOI":"10.1016\/j.jnca.2021.103050","article-title":"Blockchain based solutions to secure IoT: Background, integration trends and a way forward","volume":"181","author":"Saxena","year":"2021","journal-title":"J. Netw. Comput. Appl."},{"doi-asserted-by":"crossref","unstructured":"Armknecht, F., Bohli, J.-M., Karame, G.O., Liu, Z., and Reuter, C.A. (2014, January 3\u20137). Outsourced Proofs of Retrievability. Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, AR, USA.","key":"ref_31","DOI":"10.1145\/2660267.2660310"},{"unstructured":"Nakamoto, S. (2008). Bitcoin: A Peer-to-Peer Electronic Cash System. Decentralized Bus. Rev., 21260. Available online: https:\/\/bitcoin.org\/en\/bitcoin-paper.","key":"ref_32"},{"unstructured":"Wood, G. (2022, July 22). Ethereum: A Secure Decentralized Generalized Distributed Ledger. Available online: https:\/\/gavwood.com\/paper.pdf.","key":"ref_33"},{"unstructured":"Hopwood, D., Bowe, S., Hornby, T., and Wilcox, N. (2019). Zcash Protocol Specification, GitHub.","key":"ref_34"},{"key":"ref_35","first-page":"1","article-title":"A Decentralized Public Key Infrastructure with Identity Retention","volume":"803","author":"Fromknecht","year":"2014","journal-title":"IACR Cryptol. ePrint Arch."},{"doi-asserted-by":"crossref","unstructured":"Kodjiku, S.L., Fang, Y., Han, T., Asamoah, K.O., Aggrey, E.S.E.B., Sey, C., Aidoo, E., Ejianya, V.N., and Wang, X. (2022). ExCrowd: A Blockchain Framework for Exploration-Based Crowdsourcing. Appl. Sci., 12.","key":"ref_36","DOI":"10.3390\/app12136732"},{"unstructured":"IoTeX Team (2022, July 15). IoTeX A Decentralized Network for Internet of Things Powered by a Privacy-Centric Blockchain. Available online: https:\/\/iotex.io\/research.","key":"ref_37"},{"unstructured":"Labs, S. (2022, July 15). Storj: A Decentralized Cloud Storage Network Framework. Available online: https:\/\/www.storj.io\/storj.pdf.","key":"ref_38"},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"427","DOI":"10.1016\/j.ins.2019.02.038","article-title":"Cloud-assisted secure eHealth systems for tamper-proofing EHR via blockchain","volume":"485","author":"Cao","year":"2019","journal-title":"Inf. Sci."},{"doi-asserted-by":"crossref","unstructured":"Sey, C., Lei, H., Qian, W., Li, X., Fiasam, L.D., Sha, R., and He, Z. (2021, January 17\u201319). FIRMBLOCK: A Scalable Blockchain-Based Malware-Proof Firmware Update Architecture With Revocation For IoT Devices. Proceedings of the 2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP), Chengdu, China.","key":"ref_40","DOI":"10.1109\/ICCWAMTIP53232.2021.9674092"},{"doi-asserted-by":"crossref","unstructured":"Sey, C., Li, X., Qian, W., Fiasam, L.D., Kodjiku, S.L., Baffour, A.A., and Adjei-Mensah, I. (2021, January 17\u201319). TRADEBLOCK: Blockchain Based System For Online Classified Advertisement Industries. Proceedings of the 2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP), Chengdu, China.","key":"ref_41","DOI":"10.1109\/ICCWAMTIP53232.2021.9674070"},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"68957","DOI":"10.1109\/ACCESS.2019.2917326","article-title":"Efficient Certificateless Public Key Cryptography with Equality Test for Internet of Vehicles","volume":"7","author":"Elhabob","year":"2019","journal-title":"IEEE Access"},{"doi-asserted-by":"crossref","unstructured":"Boneh, D., Lynn, B., and Shacham, H. (2001, January 9\u201313). Short Signatures from the Weil Pairing. Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia.","key":"ref_43","DOI":"10.1007\/3-540-45682-1_30"},{"unstructured":"Hyperledger (2022, February 20). Hyperldger Raft. Available online: https:\/\/hyperledger-fabric.readthedocs.io\/en\/release-2.2\/orderer\/ordering_service.html.","key":"ref_44"},{"unstructured":"Caliper, H. (2022, March 20). Hyperledger Caliper Architecture. Available online: https:\/\/hyperledger.github.io\/caliper\/v0.5.0\/getting-started\/#architecture.","key":"ref_45"},{"doi-asserted-by":"crossref","unstructured":"G\u00f3rski, T. (2022). The k + 1 Symmetric Test Pattern for Smart Contracts. Symmetry, 14.","key":"ref_46","DOI":"10.3390\/sym14081686"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/20\/8083\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T22:11:11Z","timestamp":1737411071000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/20\/8083"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,21]]},"references-count":46,"journal-issue":{"issue":"20","published-online":{"date-parts":[[2022,10]]}},"alternative-id":["s22208083"],"URL":"https:\/\/doi.org\/10.3390\/s22208083","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2022,10,21]]}}}