UAV Based Data Access Communication Control in Distributed Hash Table Mechanism
Main Article Content
Abstract
The combination of Internet of Things ( IoT ) and aeronautical integration, made possible by satellite and 6G technology for communication, has led to the emergence of the World Wide Web of unmanned aerial vehicles, or UAVs, often referred to as the Internet of Drones (IoD). Using cloud-based Connectivity of Predators (IoD) is a necessary choice to reduce the heavy workload that mobile UAVs and enable the storing and exchange of massive quantities of actual time UAV data. Protecting highly sensitive UAV data in a transparent, curious, open, and decentralized environment, while operating UAVs with limited resources, is a significant challenge. In our previous research project, SPNCE'21, we introduced a system called PATLDAC that devised a method for managing and regulating access to unmanned aerial vehicle (UAV) data stored in the cloud. This scheme offers robust policy privacy protection, restricted access duration, and comprehensive user traceability. Nevertheless, there are several disadvantages associated with it, such as rigid and centralized storage and retrieval of data in the cloud, as well as unreliable information in an untrustworthy cloud environment for accessing data and tracking users. To accomplish this goal, we propose the implementation of a method known as a blockchain-based privacy-aware control of data access (BPADAC) to securely share UAV data in an internet-based Internet of Drones (IoD) setting. Expanding on the detailed, trackable, and privacy-protecting features of our prior research, we improve it by integrating blockchain and Decentralized Hash Table (DHT) technology. This enables the decentralized and dependable access and storage the UAV data, combined with a secure and limited access method. The objective is to guarantee the delivery of cloud-based Unmanned Aerial Vehicle (UAV) data sharing services. Furthermore, we provide a strong and unquestionable user tracking mechanism to protect against the abuse of user keys and denial by traitors. In the end, we conduct a thorough security study and develop a working model of the system using the smart contracts of the Ethereum blockchain. The purpose of this is to assess the system's efficacy and showcase the feasibility of BPADAC.