Intelligent Transportation Big Data Retrieval Algorithm Based on Blockchain and Aggregation Signature

Jingyuan Li,Ke Zhang
DOI: https://doi.org/10.1109/icpeca53709.2022.9719321
2022-01-01
Abstract:In view of the low retrieval efficiency of data ciphertext and the insecurity of centralized database in the current intelligent transportation big data system, this paper introduces the blockchain technology into the intelligent transportation big data system, and each information collection department stores it in the blockchain after normalization according to the data standard. According to the unmodifiability and traceability of the blockchain, the trustworthiness and transparency of the data in the system can be guaranteed, The system is better than the current mainstream scheme in data sharing. In this paper, an efficient ciphertext retrieval algorithm scheme for data in intelligent transportation big data system based on blockchain technology is proposed. Based on the theories of bilinear yangshe and difficulty hypothesis theory in cryptography, the problem of low efficiency of multi keyword and multi ciphertext retrieval in large database on traditional platform is solved, This paper uses the aggregation signature algorithm to improve the ciphertext retrieval efficiency in the big data system. For multiple keyword retrieval conditions, an aggregation key is generated by the aggregation signature key algorithm, and the aggregation trap is generated with the aggregation key, retrieval keyword and retrieval file set as inputs for ciphertext retrieval, The final result of the retrieval is based on the smart contract technology of the blockchain to verify the effectiveness of the data and ensure the integrity of the data. In Chapter 4, the security and performance of the efficient aggregation signature retrieval algorithm are analyzed. The results show that the key generated by the aggregation signature is safe and reliable, the aggregation trap used in ciphertext retrieval is irreversibly regenerated, and the algorithm is verified to be trusted in terms of security. The simulation results show that the algorithm is better than other literature algorithms in terms of time overhead, effectively reduces the system overhead and improves the retrieval efficiency of the algorithm.
What problem does this paper attempt to address?