Proceedings of International Conference on Applied Innovation in IT
2025/07/26, Volume 13, Issue 3, pp.133-139

Privacy-Preserving Machine Learning Using Consortium Blockchain in Vehicular Social Networks


Amna Arak Radeini Asal and Shaimaa Jabbr Ali


Abstract: It presents both opportunities for intelligent transportation systems and challenges for ensuring privacy during the data analysis process that VSNs (Vehicular Social Networks) generate. Our paper proposes a threshold Paillier cryptosystem and consortium blockchain for training Support Vector Machines (SVMs) on vertically partitioned datasets. Traditional approaches that rely on trusted third parties are insecure compared to blockchain-based collaboration. Most computations are performed locally and intermediate values are only shared if they are encrypted. This ensures high levels of privacy and efficiency. This model (PP-SVM) offers classification accuracy comparable to standard SVMs, resulting in privacy-preserving learning environments in virtual social networks. As a result of this approach, sensitive user data is effectively protected, and a robust sense of trust among network members is fostered. In addition to ensuring data integrity, consortium blockchain technology promotes collaborative learning by leveraging its inherently decentralized nature, facilitating secure interactions and shared decision-making processes. With the rapid evolution and increasing adoption of vehicular social networks, preserving user privacy has become increasingly crucial, demanding scalable and reliable security mechanisms.

Keywords: Vehicular Social Networks (VSNs), Privacy-Preserving Machine Learning, Consortium Blockchain, Threshold Paillier Cryptosystem, Support Vector Machine (SVM).

DOI: Under Indexing

Download: PDF

References:

  1. N. Hussain, P. Rani, N. Kumar, and M. G. Chaudhary, “A deep comprehensive research architecture, characteristics, challenges, issues, and benefits of routing protocol for vehicular ad-hoc networks,” Int. J. Distrib. Syst. Technol. (IJDST), vol. 13, no. 8, pp. 1–23, 2022.
  2. N. Cheng et al., “Big data driven vehicular networks,” IEEE Netw., vol. 32, no. 6, pp. 160–167, 2018.
  3. Y. Zhang et al., “BDS: a centralized near-optimal overlay network for inter-datacenter data replication,” in Proc. 13th EuroSys Conf., Porto, Portugal: ACM, Apr. 2018, pp. 1–14, doi: 10.1145/3190508.3190519.
  4. A. M. Vegni and V. Loscri, “A Survey on Vehicular Social Networks,” IEEE Commun. Surv. Tutor., vol. 17, no. 4, pp. 2397–2419, 2015, doi: 10.1109/COMST.2015.2453481.
  5. N. Hussain and P. Rani, “Comparative studied based on attack resilient and efficient protocol with intrusion detection system based on deep neural network for vehicular system security,” in Distributed Artificial Intelligence, CRC Press, 2020, pp. 217–236.
  6. N. Kato et al., “The Deep Learning Vision for Heterogeneous Network Traffic Control: Proposal, Challenges, and Future Perspective,” IEEE Wirel. Commun., vol. 24, no. 3, pp. 146–153, Jun. 2017, doi: 10.1109/MWC.2016.1600317WC.
  7. G. Xu, H. Li, S. Liu, K. Yang, and X. Lin, “VerifyNet: Secure and verifiable federated learning,” IEEE Trans. Inf. Forensics Secur., vol. 15, pp. 911–926, 2019.
  8. D. X. Song, D. Wagner, and A. Perrig, “Practical techniques for searches on encrypted data,” in Proc. IEEE Symp. Security and Privacy (S&P), 2000, pp. 44–55. [Online]. Available: https://ieeexplore.ieee.org/abstract/document/848445/.
  9. R. Bost, R. A. Popa, S. Tu, and S. Goldwasser, “Machine Learning Classification over Encrypted Data,” in Proc. 2015 Network and Distributed System Security Symp., San Diego, CA: Internet Society, 2015, doi: 10.14722/ndss.2015.23241.
  10. G. Ansari, P. Rani, and V. Kumar, “A novel technique of mixed gas identification based on the group method of data handling (GMDH) on time-dependent MOX gas sensor data,” in Proc. Int. Conf. Recent Trends in Computing (ICRTC 2022), Springer, 2023, pp. 641–654.
  11. Y. Li, Q. Luo, J. Liu, H. Guo, and N. Kato, “TSP Security in Intelligent and Connected Vehicles: Challenges and Solutions,” IEEE Wirel. Commun., vol. 26, no. 3, pp. 125–131, Jun. 2019, doi: 10.1109/MWC.2019.1800289.
  12. A. Singh et al., “Blockchain-Based Lightweight Authentication Protocol for Next-Generation Trustworthy Internet of Vehicles Communication,” IEEE Trans. Consum. Electron., vol. 70, no. 2, pp. 4898–4907, May 2024, doi: 10.1109/TCE.2024.3351221.
  13. R. Shokri and V. Shmatikov, “Privacy-Preserving Deep Learning,” in Proc. 22nd ACM SIGSAC Conf. Comput. Commun. Secur., Denver, CO, USA: ACM, Oct. 2015, pp. 1310–1321, doi: 10.1145/2810103.2813687.
  14. A. Gascón et al., “Secure linear regression on vertically partitioned datasets,” IACR Cryptol. EPrint Arch., vol. 2016, p. 892, 2016.
  15. V. Nikolaenko, U. Weinsberg, S. Ioannidis, M. Joye, D. Boneh, and N. Taft, “Privacy-Preserving Ridge Regression on Hundreds of Millions of Records,” in Proc. IEEE Symp. Security and Privacy (S&P), Berkeley, CA: IEEE, May 2013, pp. 334–348, doi: 10.1109/SP.2013.30.
  16. P. Rani and R. Sharma, “An experimental study of IEEE 802.11n devices for vehicular networks with various propagation loss models,” in Proc. Int. Conf. Signal Processing and Integrated Networks, Springer, 2022, pp. 125–135.
  17. P. Mohassel and Y. Zhang, “SecureML: A System for Scalable Privacy-Preserving Machine Learning,” in Proc. IEEE Symp. Security and Privacy (SP), San Jose, CA, USA: IEEE, May 2017, pp. 19–38, doi: 10.1109/SP.2017.12.
  18. P. Rani and R. Sharma, “Intelligent transportation system for internet of vehicles based vehicular networks for smart cities,” Comput. Electr. Eng., vol. 105, p. 108543, 2023.
  19. P. Mohassel and P. Rindal, “ABY3: A Mixed Protocol Framework for Machine Learning,” in Proc. 2018 ACM SIGSAC Conf. Comput. Commun. Secur., Toronto, Canada: ACM, Oct. 2018, pp. 35–52, doi: 10.1145/3243734.3243760.
  20. M. Shen, J. Zhang, L. Zhu, K. Xu, and X. Tang, “Secure SVM Training Over Vertically-Partitioned Datasets Using Consortium Blockchain for Vehicular Social Networks,” IEEE Trans. Veh. Technol., vol. 69, no. 6, pp. 5773–5783, Jun. 2020, doi: 10.1109/TVT.2019.2957425.
  21. J. Cui, F. Ouyang, Z. Ying, L. Wei, and H. Zhong, “Secure and Efficient Data Sharing Among Vehicles Based on Consortium Blockchain,” IEEE Trans. Intell. Transp. Syst., vol. 23, no. 7, pp. 8857–8867, Jul. 2022, doi: 10.1109/TITS.2021.3086976.
  22. H. Shen, J. Zhou, Z. Cao, X. Dong, and K.-K. R. Choo, “Blockchain-Based Lightweight Certificate Authority for Efficient Privacy-Preserving Location-Based Service in Vehicular Social Networks,” IEEE Internet Things J., vol. 7, no. 7, pp. 6610–6622, Jul. 2020, doi: 10.1109/JIOT.2020.2974874.
  23. H. H. S. Office for Civil Rights, “Standards for privacy of individually identifiable health information. Final rule,” Fed. Regist., vol. 67, no. 157, pp. 53181–53273, 2002.
  24. V. Vapnik and V. Vapnik, Statistical Learning Theory. New York: Wiley, 1998.
  25. R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin, “Secure Distributed Key Generation for Discrete-Log Based Cryptosystems,” in Advances in Cryptology — EUROCRYPT ’99, J. Stern, Ed., Lecture Notes in Computer Science, vol. 1592. Berlin, Heidelberg: Springer, 1999, pp. 295–310, doi: 10.1007/3-540-48910-X_21.
  26. C. Hazay, G. L. Mikkelsen, T. Rabin, and T. Toft, “Efficient RSA Key Generation and Threshold Paillier in the Two-Party Setting,” in Topics in Cryptology – CT-RSA 2012, O. Dunkelman, Ed., Lecture Notes in Computer Science, vol. 7178. Berlin, Heidelberg: Springer, 2012, pp. 313–331, doi: 10.1007/978-3-642-27954-6_20.


    HOME

       - Conference
       - Journal
       - Paper Submission to Journal
       - Paper Submission to Conference
       - For Authors
       - For Reviewers
       - Important Dates
       - Conference Committee
       - Editorial Board
       - Reviewers
       - Last Proceedings


    PROCEEDINGS

       - Volume 13, Issue 3 (ICAIIT 2025)
       - Volume 13, Issue 2 (ICAIIT 2025)
       - Volume 13, Issue 1 (ICAIIT 2025)
       - Volume 12, Issue 2 (ICAIIT 2024)
       - Volume 12, Issue 1 (ICAIIT 2024)
       - Volume 11, Issue 2 (ICAIIT 2023)
       - Volume 11, Issue 1 (ICAIIT 2023)
       - Volume 10, Issue 1 (ICAIIT 2022)
       - Volume 9, Issue 1 (ICAIIT 2021)
       - Volume 8, Issue 1 (ICAIIT 2020)
       - Volume 7, Issue 1 (ICAIIT 2019)
       - Volume 7, Issue 2 (ICAIIT 2019)
       - Volume 6, Issue 1 (ICAIIT 2018)
       - Volume 5, Issue 1 (ICAIIT 2017)
       - Volume 4, Issue 1 (ICAIIT 2016)
       - Volume 3, Issue 1 (ICAIIT 2015)
       - Volume 2, Issue 1 (ICAIIT 2014)
       - Volume 1, Issue 1 (ICAIIT 2013)


    PAST CONFERENCES

       ICAIIT 2025
         - Photos
         - Reports

       ICAIIT 2024
         - Photos
         - Reports

       ICAIIT 2023
         - Photos
         - Reports

       ICAIIT 2021
         - Photos
         - Reports

       ICAIIT 2020
         - Photos
         - Reports

       ICAIIT 2019
         - Photos
         - Reports

       ICAIIT 2018
         - Photos
         - Reports

    ETHICS IN PUBLICATIONS

    ACCOMODATION

    CONTACT US

 

        

         Proceedings of the International Conference on Applied Innovations in IT by Anhalt University of Applied Sciences is licensed under CC BY-SA 4.0


                                                   This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License


           ISSN 2199-8876
           Publisher: Edition Hochschule Anhalt
           Location: Anhalt University of Applied Sciences
           Email: leiterin.hsb@hs-anhalt.de
           Phone: +49 (0) 3496 67 5611
           Address: Building 01 - Red Building, Top floor, Room 425, Bernburger Str. 55, D-06366 Köthen, Germany

        site traffic counter

Creative Commons License
Except where otherwise noted, all works and proceedings on this site is licensed under Creative Commons Attribution-ShareAlike 4.0 International License.