Eunomia

Anonymous and Secure Vehicular Digital Forensics based on Blockchain

Journal Article (2023)
Authors

Meng Li (Hefei University of Technology)

Yifei Chen (Hefei University of Technology)

Chhagan Lal (TU Delft - Cyber Security)

Mauro Conti (University of Padua)

Mamoun Alazab (Charles Darwin University)

Donghui Hu (Hefei University of Technology)

Research Group
Cyber Security
Copyright
© 2023 Meng Li, Yifei Chen, C. Lal, M. Conti, Mamoun Alazab, Donghui Hu
To reference this document use:
https://doi.org/10.1109/TDSC.2021.3130583
More Info
expand_more
Publication Year
2023
Language
English
Copyright
© 2023 Meng Li, Yifei Chen, C. Lal, M. Conti, Mamoun Alazab, Donghui Hu
Research Group
Cyber Security
Issue number
1
Volume number
20
Pages (from-to)
225-241
DOI:
https://doi.org/10.1109/TDSC.2021.3130583
Reuse Rights

Other than for strictly personal use, it is not permitted to download, forward or distribute the text or part of it, without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license such as Creative Commons.

Abstract

Vehicular Digital Forensics (VDF) is essential to enable liability cognizance of accidents and fight against crimes. Ensuring the authority to timely gather, analyze, and trace data promotes vehicular investigations. However, adversaries crave the identity of the data provider/user, damage the evidence, violate evidence jurisdiction, and leak evidence. Therefore, protecting privacy and evidence accountability while guaranteeing access control and traceability in VDF is no easy task. To address the above-mentioned issues, we propose Eunomia: an anonymous and secure VDF scheme based on blockchain. It preserves privacy with decentralized anonymous credentials without trusted third parties. Vehicular data and evidence are uploaded by data providers to the blockchain and stored in distributed data storage. Each investigation is modeled as a finite state machine with state transitions being executed by smart contracts. Eunomia achieves fine-grained evidence access control via ciphertext-policy attribute-based encryption and Bulletproofs. A user must hold specific attributes and a temporary-and unexpired token/warrant to retrieve data from the blockchain. Finally, a secret key is embedded into data to trace the traitor if any evidence breach happens. We use a formal analysis to demonstrate the strong privacy and security properties of Eunomia. Moreover, we build a prototype in a WiFi-based Ethereum test network to evaluate its performance.

Files

Eunomia_Anonymous_and_Secure_V... (pdf)
(pdf | 2.71 Mb)
- Embargo expired in 16-07-2023
License info not available