1. Introduction
The aviation transportation industry is one of the core indicators of a nation’s modernization level. With the global aviation industry accelerating its digital and intelligent transformation, smart civil aviation has become a concentrated manifestation of the new technological revolution and industrial transformation in the aviation sector, exhibiting strong developmental momentum. Data, as a key element of production, is increasingly demonstrating its multidimensional value in aviation.
From an operational perspective, air traffic management (ATM) data reflects the real-time status of aviation activities, providing precise situational awareness and decision-making support for stakeholders (e.g., air traffic controllers, airlines, airports), such as real-time weather information sharing, flight conflict warnings, and dynamic traffic management. From a research perspective, ATM data serves as an empirical foundation for exploring aviation operational patterns, validating optimization strategies, and developing intelligent decision-making systems.
Data-driven aviation has become a consensus, and data sharing can significantly enhance data resource utilization, serving as a critical task in building smart civil aviation. However, data silos persist, with vast amounts of data only accessible and analyzable within limited scopes, leaving their potential underutilized. The challenges in data sharing stem from three main factors: (1) Security and privacy concerns: Aviation data, especially ATM data, contains sensitive operational information with high security requirements. Recent privacy breaches in aviation, such as the 21 May 2021, incident where Indian Airlines reported the theft of approximately 4.5 million customer records spanning a decade (August 2011 to February 2021), have heightened data owners’ apprehensions. (2) Dynamic and real-time requirements: The highly dynamic nature of aviation operations imposes stringent demands on the timeliness, security, and reliability of data sharing, limiting its scope and extent. (3) Lack of incentives: Most data producers are reluctant to share data voluntarily, while data consumers remain skeptical of data utility, highlighting the absence of an effective fair incentive mechanism for ATM data sharing.
Blockchain, a specialized database technology, employs P2P networks for communication, cryptography for ownership and privacy assurance, and distributed consensus frameworks for consistency. Since the release of the Bitcoin whitepaper in 2008, blockchain technology has made continuous breakthroughs in data security and collaborative computing.
The Bitcoin network, with its SHA-256 encryption and distributed ledger architecture, pioneered tamper-proof storage without trusted third parties [
1]. In 2015, Ethereum introduced smart contracts [
2], enabling auditable trust mechanisms for automated program execution. For high-throughput processing, Solana’s Proof-of-History consensus in 2021 achieved 710,000 transactions per second (TPS), 46 times faster than Ethereum 1.0 [
3].
These advancements have transformed blockchain from a cryptocurrency tool into a universal trust infrastructure, laying the groundwork for its integration into aviation. Blockchain’s decentralized, tamper-proof, traceable, and scalable features offer novel solutions for secure data architectures, attracting widespread attention. Organizations like Air France, ICAO, and NASA have explored blockchain applications in aviation maintenance and data tracking [
4].
Blockchain can deeply integrate with ATM operations, effectively addressing trust, efficiency, and collaboration challenges in distributed data sharing. Aviation operations generate vast heterogeneous data with varying sensitivity and timeliness requirements. A blockchain-based multi-layer data-sharing mechanism can cater to diverse stakeholder needs. For real-time-dependent operators (e.g., airlines), encrypted blockchain data with access controls enables rapid airspace restriction updates and trajectory adjustments. For regulatory bodies focused on trend analysis, federated learning leveraging blockchain preserves privacy while enhancing decision-making models. To meet aviation’s real-time demands and storage constraints, optimized blockchain deployment and consensus mechanisms can improve scalability and processing efficiency. This holistic approach balances security, timeliness, and consistency while maximizing data utility under multiple constraints.
This paper is structured as follows:
Section 1 introduces the context;
Section 2 covers background knowledge;
Section 3 presents the mathematical model for secure data sharing;
Section 4 details the multi-layer sharing framework;
Section 5 analyzes security and formal verification; and
Section 6 concludes this paper.
2. Related Work
As the value of aviation data resources becomes increasingly prominent, establishing secure, trustworthy, and efficient collaborative data-sharing mechanisms has become a research focus. In recent years, blockchain has gained widespread application in privacy-sensitive domains due to its decentralized, tamper-proof, and traceable characteristics. In the ATM field, existing research has attempted to overcome the trust deficiencies of centralized architectures. For example, ATMChain [
4] integrates identity authentication, access control, and data sharing into a unified 4A security model (Authentication, Authorization, Accounting, Auditing). While it enhances trustworthiness and auditability, its consensus mechanism lacks real-time adaptability to high-frequency ATM data. Another blockchain-based distributed flight data platform [
5] improves data consistency and availability under the SESAR and SWIM frameworks but remains largely conceptual, lacking in-depth technical implementation.
In healthcare [
6], cloud storage [
7], Internet of Things (IoT) [
8], and intelligent transportation [
9], blockchain technology has also been widely applied. For instance, HSHB [
10] achieves secure and efficient data access by dividing private and consortium chain sharing, constructing access control policies and B+ tree indexing, and combining proxy re-encryption with smart contracts. Reference [
8] proposes a multi-center IoT data-sharing framework that reduces computational overhead through improved attribute-based encryption and cloud-side obfuscation strategies.
The integration of blockchain and federated learning (FL) is building a new paradigm for trusted privacy-preserving computing. Reference [
11] proposes a blockchain-FL energy trading framework based on edge computing in 5G environments, while [
12] designs a medical privacy-preserving architecture based on FL and blockchain. However, existing research primarily focuses on horizontal federated learning, with limited support for vertical federated learning (VFL), which is crucial for cross-institutional ATM data sharing. Additionally, there is a lack of quantitative fairness evaluation mechanisms for multi-party collaboration contributions.
Consensus mechanisms are the core of blockchain-enabled trusted collaboration, with the key challenge being how to ensure system security and consistency in untrusted, heterogeneous, and dynamic network environments. Byzantine Fault Tolerance (BFT) protocols achieve fault tolerance and robustness in malicious node environments through cryptographic verification, redundant communication, and voting mechanisms. Existing solutions are mainly divided into proof-based (e.g., PoW, PoS) and election-based (e.g., PBFT). Proof-based schemes offer strong decentralization in open networks but struggle to meet ATM system requirements for strong consistency and low latency due to uncertain outcomes and high delays. PBFT, suitable for semi-trusted environments, enables deterministic consensus and is widely adopted. However, PBFT faces O(n
2) communication complexity and a leader node bottleneck. To improve PBFT performance, various optimization schemes have been proposed: the work in [
13] introduces a dynamic PBFT ordering service with bandwidth reservation, optimizing throughput and cluster scalability; reference [
13] allows each ordering node to autonomously initiate consensus and employs a bandwidth reservation protocol to achieve efficient distributed ledger record insertion in permissioned blockchain. Reference [
14] designs a scalable multi-layer PBFT consensus mechanism, reducing communication complexity through hierarchical node grouping to support large-scale systems. The authors of [
15] adopt threshold proxy signatures and a dual-layer reputation mechanism to enable the TP-PBFT protocol, which achieves consensus even when more than 1/3 of nodes fail. However, existing schemes mostly assume stable connectivity and fixed topologies, making them unsuitable for high-mobility, weak-link scenarios like ATM communications. Lightweight, strongly consistent, low-latency consensus protocols remain necessary.
Additionally, traditional blockchain’s full ledger replication imposes heavy storage burdens on high-density data environments like ATM. Current mainstream solutions fall into two categories: off-chain and on-chain cooperative storage. Off-chain solutions, such as LightChain [
16], IPFS [
17], and LayerChain [
18], store raw data externally while maintaining hash indices on-chain, reducing redundancy but introducing trust and availability challenges. On-chain cooperative storage reduces individual node loads through ledger sharding, such as BFT-Store [
19] using erasure coding and VBG [
20] using virtual block groups, but incurs high coordination costs in dynamic node environments. Light client solutions, such as FlyClient [
21] based on Merkle Mountain Ranges, improve storage efficiency but heavily rely on full nodes and have limited autonomous validation capabilities.
In summary, ATM data sharing faces challenges such as unstable connectivity, high real-time demands, and massive data volumes. Neither purely on-chain nor off-chain storage can fully meet these needs. Constructing a multi-layer hybrid storage architecture that dynamically processes data based on priority is a critical path to enhancing system adaptability and scalability.
3. Analysis of ATM Big Data Sharing
To gain a deeper understanding of the fundamental characteristics and key challenges of ATM data sharing, this chapter first examines the functional objectives and structural composition of the ATM system from a systemic perspective. It then identifies the primary participants and data types involved in sharing, laying the groundwork for subsequent data modeling and mechanism design.
3.1. ATM System Concepts
ATM is a highly complex, dynamically evolving cyber–physical system (CPS). This section characterizes ATM from four perspectives: functions/objectives, structure, key elements (stakeholders), and constraints.
3.1.1. Functions and Objectives
ATM is an integrated management system leveraging Communication, Navigation, and Surveillance (CNS) technologies and information networks. Through “air–space–ground” coordination (e.g., satellite links, ground radar, onboard systems), it enables real-time data sharing and dynamic decision-making, with core objectives of ensuring safe, efficient, and orderly aircraft operations.
Per ICAO’s Global ATM Operational Concept [
22], ATM comprises seven key components, shown in
Figure 1.
These components form ATM’s foundational framework, enabling functions like traffic control, flight information dissemination, conflict resolution, and flow optimization to address complex airspace environments and diverse flight demands. The system’s complexity and adaptability stem from its wide-area, multi-source heterogeneous data fusion and high real-time requirements [
4].
3.1.2. ATM System Structure
ATM is analyzed temporally and spatially, with data-sharing implications.
The ATM system can be temporally divided into three distinct phases—strategic, pre-tactical, and tactical [
23]—each exhibiting significant differences in functional implementation and data-sharing mechanisms.
The strategic phase spans months to years, with core functions including airspace design and traffic flow prediction. By analyzing historical data and macroeconomic trends, this phase forecasts future traffic distribution and optimizes air route networks and sector configurations to accommodate long-term traffic growth. A representative example is the Dynamic Airspace Configurations (DAC) tool developed by Europe’s SESAR project, which dynamically adjusts route networks and sectors by integrating multi-source data from various stakeholders including ANSPs, airline operators (AOs), airspace users (AUs), and network managers (NMs). Data shared during this phase encompasses airline flight plans, airport throughput capacity, airspace utilization metrics, and external socioeconomic data.
The pre-tactical phase operates on timescales ranging from hours to days, focusing on establishing flow management strategies and dynamic route adjustments to address real-time variables such as adverse weather and temporary airspace restrictions. This phase requires sharing real-time operational data including aircraft performance parameters, live weather conditions, and current airspace status [
1]. The FAA’s System Wide Information Management (SWIM) exemplifies this through standardized interfaces enabling real-time data exchange between ATC, airlines, and airports, covering aircraft positions (ADS-B), meteorological radar data, and airspace status updates [
23].
The tactical phase (operational layer) functions within minute-to-hour timeframes, emphasizing the execution of control instructions and conflict resolution under shared situational awareness. Controllers monitor operations in real time using surveillance technologies (ADS-B), issuing altitude and heading adjustments via voice communications (VHF) or data links (CPDLC), while coordinating with onboard collision avoidance systems (TCAS II) and the ground-based Short-Term Conflict Alert (STCA) to resolve aircraft conflicts. Tools like Electronic Flight Bags (EFBs) enhance situational awareness synchronization between pilots and controllers through features like route weather synchronization.
In summary, the strategic phase primarily relies on cross-institutional historical data sharing and multi-source data fusion modeling to improve prediction accuracy. The pre-tactical phase achieves dynamic resource allocation through real-time data synchronization and promotes collaborative decision-making (CDM) through multi-party data exchange. The tactical phase accomplishes situational awareness synchronization between controllers and pilots via immediate data sharing. This hierarchical data-sharing model across different time dimensions reflects the evolving operational requirements of ATM from macro-planning to micro-execution.
In terms of spatial architecture, air traffic management (ATM) constitutes a three-dimensional system that deeply integrates space-based (space), aerial (air), and ground (ground) components through multimodal communication technologies including satellite data links and aeronautical data links.
The space-based system incorporates navigation satellites (GPS, GLONASS, Galileo, BeiDou, etc.), communication satellites (Inmarsat, Iridium, etc.), meteorological satellites (NOAA, Fengyun series), and space-based ADS-B (e.g., Aireon system). These collectively provide positioning/navigation, wide-area communication, weather monitoring, and transoceanic aircraft tracking capabilities.
The aerial layer employs onboard data links such as ACARS and CPDLC to enable real-time trajectory management and dynamic airspace allocation.
Ground layer: Built upon the Aeronautical Telecommunication Network (ATN) and international standardized protocols (e.g., ATN/IPS), it enables air–ground data interaction through VHF, HF, and satellite communications. Aircraft surveillance, identification, and interaction are achieved via ATC automation systems for flight plan processing, conflict detection, and traffic flow prediction, while airport departure sequencing is optimized using CDM tools.
This integrated spatial architecture forms a comprehensive framework for modern ATM operations, ensuring seamless coordination across all flight domains.
3.1.3. Key Element
ATM is a highly integrated complex system whose efficient operation relies on the coordinated collaboration of hardware infrastructure, software systems, multiple participating entities, and data resources. These key elements collectively constitute the core architecture of ATM, ensuring the safety, orderliness, and efficiency of air transportation.
As the physical foundation of ATM, hardware includes critical equipment such as surveillance, navigation, communication, and meteorological detection systems. Surveillance systems (e.g., radar, ADS-B, MLAT) track aircraft positions in real time; navigation systems (ground-based VOR/DME and space-based GNSS) provide precise route guidance; communication systems (VHF, CPDLC, SATCOM) enable air–ground information exchange; and meteorological equipment supports weather warnings and route optimization. These hardware components serve as the “sensors” of ATM, providing physical-layer perception and interaction capabilities.
Software systems act as the “nerve center” of ATM, responsible for data processing, decision support, and operational optimization. ATM automation systems (e.g., FDP, RDP) manage flight plans and trajectory tracking; decision support tools (STCA, MSAW) assist controllers in risk identification; and simulation systems are used for personnel training and contingency plan validation. These software components transform raw data collected by hardware devices into actionable control decisions, significantly enhancing system response speed and management precision.
ATM participants include air traffic service providers, airline operators, regulatory agencies, and technical support units. ATC units (area control, approach control, tower) are responsible for real-time command; airlines execute control instructions and provide operational feedback; international organizations (ICAO) and national agencies (FAA, EASA) establish standards and regulations; and equipment manufacturers and technical service providers offer system support. This multi-party collaboration mechanism ensures the reliability and safety of ATM operations through clear division of responsibilities while also imposing higher requirements on the system’s overall collaborative decision-making capability.
Data resources serve as the “lifeblood” connecting all elements, running through the entire ATM operation process. The sharing and exchange of data such as aircraft dynamic data (position, altitude, speed), airspace structure data (routes, sectors), meteorological information (real-time weather, forecasts), and operational management data (flight plans, delay statistics) provide a quantifiable decision-making basis for ATM operations. These data not only support daily operational management but also serve as important references for system performance evaluation and continuous optimization. These four elements do not exist in isolation but form an organic whole through continuous interaction: hardware collects data, software processes information, participants make decisions, and data flows both transmit information and feed back into system optimization.
3.1.4. Constraints
The International Civil Aviation Organization (ICAO) has explicitly identified the coordinated development of “physical safety—operational efficiency—environmental sustainability—information security” throughout the entire lifecycle as the overarching objective in the Global Air Traffic Management Operational Concept [
22]. Under this macro-level guidance, these objectives can be further decomposed into specific constraints.
Safety prioritizes the security of aircraft and personnel above all else, with ATM implementing multidimensional constraints through systematic risk management. ICAO’s Standards and Recommended Practices (SARPs) and Procedures for Air Navigation Services (PANS) provide theoretical guidance for safe operations. At the operational level, ATM adopts a layered defense strategy for conflict management, strictly enforcing horizontal, vertical, and temporal separation standards to maintain aircraft operational risks within acceptable limits while incorporating the Traffic Collision Avoidance System (TCAS) as a safeguard. Additionally, quantitative management of air traffic controller workload ensures it remains within safe thresholds.
Efficiency requirements primarily focus on optimizing airspace and airport resource allocation to reduce flight delays and lower operational costs. In practice, this involves multiple technical indicators and operational constraints such as airspace capacity limits, maximum acceptable delay thresholds, route optimization restrictions, and flow management constraints. To enhance efficiency, dynamic airspace management is achieved by balancing user preferences with airspace capacity limitations based on 4D trajectory requirements while mandating information sharing among all stakeholders including airlines, air traffic control, and airports to facilitate collaborative decision-making and improve airspace throughput.
Environmental sustainability aims to significantly reduce the environmental impact of aviation activities through optimized operational procedures, ultimately achieving ICAO’s global goal of net-zero carbon emissions by 2050. This is manifested in three key areas: (i) carbon emission control: implementing trajectory optimization techniques, strictly enforcing phased carbon emission limits under ICAO’s CORSIA mechanism [
24], and adopting sustainable aviation fuels; (ii) noise management: maintaining strict compliance with ICAO’s day–night noise limits [
25] and optimizing flight procedures to reduce noise during approach and departure phases; and (iii) energy efficiency: integrating real-time meteorological data to minimize unnecessary detours and implementing flexible airspace management strategies.
Cybersecurity serves as a critical element in safeguarding global aviation safety, playing a vital role in ATM systems. ATM systems heavily depend on the availability of information and communication technologies (ICT), as well as the accuracy and confidentiality of data, all of which directly impact flight safety and efficiency [
26]. As early as 1996, ICAO’s ATNP Security Working Group identified that all ATM information transmitted via data links is vulnerable to tampering, replay, and forgery attacks, while the Communication, Navigation, and Surveillance (CNS) systems supporting ATM exhibit inherent vulnerabilities to Distributed Denial of Service (DDoS) attacks. With the continuous evolution of cyber threats, attacks targeting ATM systems are demonstrating broader impact and greater destructive potential.
To address these growing cybersecurity challenges, ICAO has established a systematic standard framework. The 2019 Aviation Cybersecurity Strategy [
27] for the first time elevated cybersecurity to a strategic priority, requiring member states to incorporate cybersecurity into their national aviation safety and security oversight systems. Through measures such as building international cooperation mechanisms, improving information sharing platforms, and optimizing incident response procedures, the strategy aims to comprehensively enhance the cyber resilience of aviation systems. The 2022 revision to Annex 17—Aviation Security of the Convention on International Civil Aviation [
28] further refined technical specifications, mandating that member states establish full lifecycle risk management mechanisms covering critical aviation ICT systems and data based on the Secure by Design principle, with emphasis on ensuring the confidentiality, integrity, and availability of critical systems and data.
Building on this foundation, the latest edition of the Global Aviation Security Plan (GASeP) [
29] proposed more actionable implementation measures, calling for the establishment of a cross-domain, multi-layered cybersecurity protection system encompassing key areas including air traffic management, communications, surveillance, and aircraft operations. The plan sets clear phased targets through detailed implementation roadmaps: by 2030, over 90% of member states must achieve effective implementation in aviation cybersecurity to ensure continuous availability of critical systems, thereby constructing a highly resilient global aviation cybersecurity protection framework.
Through coordinated management of these multidimensional constraints, global ATM systems can achieve efficient, sustainable, and interference-resistant operations while maintaining safety.
3.2. Foundation of Aviation Big Data Sharing
This chapter provides an in-depth overview of aviation big data sharing from three key perspectives: data classification and participants, sharing trends and characteristics, and demand analysis.
3.2.1. Data Classification and Participants
ICAO has systematically standardized global ATM data-sharing requirements through documents including Annex 11 “Air Traffic Services” and Doc 4444 “Procedures for Air Navigation Services—Air Traffic Management” (abbreviated as PANS-ATM) to ensure flight safety, efficient airspace utilization, and cross-regional coordination.
From the perspective of air traffic management operations, the main participants in data sharing include air traffic service providers (such as air traffic control centers and regional control units), airlines and operators (providing flight plans and dynamic data sharing), airport operators (providing takeoff/landing slots and ground operation data), aeronautical information service providers (supplying aeronautical charts and airspace restriction information), airspace users, meteorological service providers (offering real-time weather and wind shear data), military aviation departments (for airspace coordination and temporary restricted area information), civil aviation regulatory authorities (conducting safety audits and operational compliance data), and international organizations (such as ICAO, Eurocontrol, and IATA).
Regarding shared content, this paper classifies seven categories of shared data based on application scenarios and functions: core operational data, airspace and traffic flow management data, communication–navigation–surveillance data, aeronautical information data, meteorological data, emergency data, and support data. Note that the aviation big data referred to in this paper specifically pertains to ATM data.
3.2.2. Aviation Big-Data-Sharing Trends and Characteristics
Under the impetus of digital transformation in the aviation industry, ATM data sharing exhibits three major trends [
30].
- (1)
Exponential growth in data exchange volume.
The frequency of daily data interactions shows exponential growth, with ATM data evolving from “limited data flows between fixed stakeholders” to “massive data-sharing exchanges reaching tens of millions within specific timeframes.”
- (2)
Normalization of cross-domain sharing.
Data flow boundaries are breaking through traditional security perimeters, transitioning from “ATM data being used only within fixed, limited security domains” to “ATM data being utilized across different security domains.” This aligns with the “Internet of Aviation” concept proposed in ICAO’s Global Air Navigation Plan, which emphasizes network interconnectivity among all aviation nodes (aircraft, ANSPs, ground facilities) and achieves cross-domain information integration through large-scale data sharing across Flight Information Region (FIR) boundaries [
31].
- (3)
Diversification of participants.
With third-party analysis institutions and research organizations emerging as new data users, the sharing participants are evolving from “data accessors being solely operational executors” to “including third-party analysts and researchers.”
3.2.3. Demand Analysis
These trends render traditional sharing mechanisms inadequate for new scenarios. While ICAO Annex 11 only specifies minimum security requirements for data sharing, new operational needs like multi-party situational awareness and collaborative decision-making have generated additional demands for ATM data sharing.
- (1)
Hierarchical sharing requirements.
Layered data sharing accommodates differentiated business needs among ATM participants, divided into raw data sharing and data–model sharing.
Participants can be categorized into three tiers, core operational entities, collaborative support entities, and regulatory (research) entities, forming a “decision–execution–supervision” tri-layer structure. This reflects ATM’s multi-level data-sharing requirements—different entities have varying demands for data granularity and timeliness. Core operators rely on high-precision real-time data to maintain operational safety (e.g., airlines needing second-level latency for airspace restriction updates), while regulators focus more on data trends, requiring aggregated historical data for decision models. The former necessitates direct raw data sharing, whereas the latter prefers model sharing, achieving information exchange through distributed model training while keeping raw data localized.
Raw data sharing ensures complete transmission of critical operational data to consumers, while model sharing minimizes unnecessary information leakage, adhering to the “data minimization principle” and transforming sharing from “ownership transfer” to “usage rights sharing.”
This hierarchical approach balances data openness with ownership control through data–model separation, offering new solutions to break “data silos” and laying groundwork for differentiated security strategies.
- (2)
Information security requirements.
The expanded sharing scope significantly increases attack surfaces, multiplying ATM system security risks. Recent years have seen growing information security incidents in global aviation, causing substantial economic losses and even threatening flight safety. In September 2016, DHS senior officials confirmed successful remote penetration testing on a Boeing 757 at Atlantic City International Airport via radio communications. In September 2018, Bristol Airport’s electronic displays were disabled for two days by ransomware attacks, forcing manual flight information updates. ATM data faces tampering, theft, and access failure risks regarding confidentiality, availability, and integrity. Unauthorized access and privacy breaches during sharing threaten ATM’s secure operation.
- (3)
Efficiency requirements.
Aviation operations’ characteristics—vast airspace networks, dense traffic flows, cross-regional coordination, and highly dynamic management—impose stringent timeliness demands on data sharing. As ATM systems transition from “human-led decision-making” to “data-driven decision-making,” exemplified by Trajectory-Based Operations (TBO) requiring real-time 4D trajectory data exchange among ATC, airlines, and airports [
31], data timeliness becomes an increasingly critical constraint.
- (4)
Storage resource requirements.
There exists a contradiction between exponentially growing data volumes and limited storage resources. New-generation aircraft generate 5–8 TB data per flight (80 times more than older models), with global fleet data projected to reach 98 billion GB annually by 2026 [
32]. This massive historical data imposes high storage demands on aviation participants, especially lightweight users like aircraft avionics systems with inherently limited storage capacity, making storage capacity adaptation a prerequisite for effective data sharing.
- (5)
Incentive requirements.
Due to operational inertia, most data producers are reluctant to share voluntarily. Meanwhile, data consumers remain skeptical about shared data’s utility, as current ATM operations lack an effective fair incentive mechanism for data sharing.
4. Data Security Sharing Modeling
This chapter constructs a behavioral model based on an extended infinite state machine (ISM) to formally characterize the key states, input events, and dynamic evolution mechanisms involved in the ATM data-sharing process, clearly expressing various secure sharing constraints. On this basis, a multi-layer secure sharing architecture for multi-source aviation data is proposed, followed by correctness analysis and formal verification. The proposed modeling approach and analytical framework provide a solid theoretical foundation for the subsequent design and implementation of secure sharing mechanisms.
4.1. Mathematical Model for Secure Data Sharing
This paper employs an extended infinite state machine (ISM) (hexatuple) to characterize the ATM data-sharing process:
where
is the set of system states (potentially infinite);
is the set of input events, such as data requests, data updates, access control modifications, etc.;
is the state transition function, describing the dynamic changes in data sharing;
is the initial state, representing the system state when no data sharing occurs;
is the set of accepting states, i.e., trusted sharing states that satisfy all constraints; and
is the set of constraints, including security, storage capacity, timeliness, etc., during the sharing process.
The description of system states can fully represent all information for a single instance of secure data sharing. Each state
in the state set can be expressed as follows:
The definitions of each element in the system state are shown in
Table 1.
4.2. Constraints for Secure Data Sharing
Traditional finite state machines (FSMs) or infinite state machines (ISMs) are typically defined as quintuples . However, the ATM data secure sharing scenario possesses unique characteristics. ATM data sharing must satisfy stringent security and timeliness constraints, which are fundamental to ATM operations and have irreplaceable impacts on data sharing. Therefore, this paper augments the quintuple with a constraint tuple. The constraints for secure data sharing include the following aspects.
4.2.1. Storage Space Constraints
Each participant has limited actual storage capacity, especially lightweight participants like aircraft with extremely constrained storage. The total stored data must be restricted:
where
is the maximum storage capacity of participant
, and
is the size of data
.
4.2.2. Efficiency (Real-Time) Constraints
The delay from data request to completed sharing must not exceed the maximum allowed value:
where
is the transmission delay of data
, and
is the system’s maximum allowed delay.
4.2.3. Security Constraints
(i) Integrity verification.
Define integrity verification function
,
When
is shared data or a model, it must satisfy integrity requirements:
(ii) Confidentiality protection.
Define confidentiality verification function
,
When
x is shared data or a model, it must satisfy confidentiality requirements:
(iii) Availability.
Defend against single points of failure through multi-replica storage:
(iv) Privacy protection.
Define privacy protection function
,
where
is the privacy metric function,
is the original data,
is the perturbed data, and
is the security threshold
When
is a shared model, it must satisfy privacy protection requirements,
4.2.4. Compliance Constraints
Sharing behaviors must comply with air traffic regulations:
Here, refers to the regulation (e.g., data retention period, privacy protection clauses, etc.).
4.2.5. Data Utility Constraints
Shared data must be valuable to the data consumer to avoid redundant transmission.
Here, represents the utility value of for , and refers to the minimum utility value.
5. Aviation Big Data Multi-Layer Security Sharing Framework
According to the ATM data-sharing scenario and sharing requirements, the framework protects ATM data layer by layer through different protection strategies, achieving comprehensive security from data storage to sharing. This security architecture employs technologies such as blockchain, federated learning, attribute-based encryption, and multi-objective optimization to achieve secure data transmission, storage, and sharing in the ATM system. It provides a feasible solution for aviation big data security sharing, and its system architecture is shown in
Figure 2.
A trusted data-sharing mechanism is established using blockchain, leveraging its tamper-proof, traceable, decentralized, and single-point-failure-resistant characteristics to protect data security. By adopting a clustering-based grouped PBFT consensus mechanism, the consensus efficiency and throughput among ATM data participants are improved, ensuring efficient data sharing. Through a multi-objective optimization-based block deployment strategy, the storage occupancy ratio of participants is significantly reduced. The optimized block deployment and efficient consensus strategy address blockchain’s storage and latency issues, laying the foundation for subsequent data sharing and model sharing.
In terms of data sharing, hash algorithms and encryption algorithms are used to ensure data integrity and confidentiality. To tackle the challenges of massive data retrieval and the over-/under-authorization issues in traditional access control, a data attribute-based retrieval method and a fine-grained attribute-based access control method are proposed.
To address privacy leakage risks in sharing, an ATM-oriented model-sharing method is introduced, leveraging blockchain’s decentralization to provide a secure and reliable storage environment for federated learning. The Shapley value contribution assessment method is used to identify low-quality data and incentivize user sharing.
The combination of data sharing and model sharing covers the multi-level data sharing needs of current ATM participants.
5.1. Blockchain Optimization Deployment and Consensus Mechanism for ATM
As a data-sharing solution, blockchain is widely applied across various industries, such as the Internet of Things (IoT), vehicular networks, education, and healthcare. However, blockchain deployment and consensus models pose challenges for ATM participants. Since blockchain occupies significant storage space, resource-constrained terminals (e.g., aircraft) struggle to deploy a full blockchain. Additionally, in the Practical Byzantine Fault Tolerance (PBFT) consensus mechanism, each node must broadcast twice in a single consensus round, resulting in a network communication complexity of O(N2) for an N-node system. As the number of nodes increases, communication costs and consensus latency rise sharply, leading to rapid system performance degradation. This makes PBFT difficult to apply directly in dense, real-time ATM sharing systems.
To address these issues, an optimization algorithm is used to partition the full blockchain into multiple blocks and distribute them across different nodes, reducing storage pressure on resource-limited nodes. Additionally, a clustering-based grouped PBFT algorithm is employed to decompose consensus tasks, lowering communication overhead and consensus latency.
5.1.1. Blockchain Deployment Optimization Strategy
Blockchain provides secure protection for data storage and sharing, but as the chain grows, its storage demands increase, posing challenges for resource-constrained participants.
Time-based chain segmentation: The blockchain is divided into a real-time chain (containing real-time/near-real-time data, such as aircraft health status, flight trajectories, and weather updates) and a traceability chain (storing historical data).
Geographical network partitioning: The aviation network is divided into multiple consensus domains connected via heterogeneous networks. Each domain includes ATM participants such as air traffic control stations, weather stations, airports, airlines, and aircraft (both ground and airborne nodes). Airborne nodes within a domain jointly maintain a real-time chain instead of each storing a full blockchain (see
Figure 3), which resolves the conflict between high storage demands and limited airborne node resources. Ground nodes, with sufficient computing and storage capacity, maintain full chains to ensure data security and traceability. If an airborne node lacks certain data, it sends a query to other nodes in its domain. Nodes holding the requested block return it, and the requester verifies data authenticity and integrity by comparing multiple copies.
As ATM operations continue, blocks accumulate. When a node’s storage exceeds a threshold, block redeployment optimization is triggered. By defining an objective function, the storage occupancy ratio, response latency, and block availability are balanced while ensuring security. A multi-objective optimization algorithm computes the optimal deployment scheme:
where
x is the block allocation scheme,
denotes the average storage occupancy ratio,
is the access response latency, and
is the average unavailability probability. And
and
mean security level and storage threshold constraints, respectively.
The optimization process follows to derive the Pareto-optimal solution for block deployment.
5.1.2. Clustering-Based Grouped PBFT Consensus Mechanism
Leveraging ATM’s spatiotemporal characteristics, the K-means++ clustering algorithm groups nodes by spatial location. An intra-cluster to inter-cluster consensus strategy narrows the consensus scope, reducing per-round communication rounds, lowering overhead, and improving efficiency and throughput.
5.2. Publish–Subscribe-Based Secure Data-Sharing Scheme for ATM
To meet the demand for large-scale direct data sharing among ATM participants while ensuring secure sharing policies, this scheme addresses challenges such as difficult data sharing and inefficient access control. By leveraging blockchain for managing data service publishing, querying, subscribing, and deregistration, along with attribute-based encryption (ABE) and integrity verification, it enables secure ATM data sharing and fine-grained access control. These strategies enhance both data security and sharing efficiency.
The data provider (DP) encrypts data using attribute-based encryption (ABE) and stores the ciphertext in cloud storage. The DP generates metadata (recording data keys, verification credentials, etc.) and publishes it on the blockchain to complete data registration. Beyond storing metadata, the blockchain also maintains data-sharing records and uses smart contracts to handle requests from participants, including data registration, data querying, data subscription, data updates, and data deregistration, while data consumers (DCs) search for target data via data query contracts. If a DC meets the DP’s access control requirements, it retrieves the ciphertext from cloud storage and decrypts it. DCs can also subscribe to data via data subscription contracts. Data owners can push updates periodically to subscribers via data update contracts. Data owners can terminate data distribution via data deregistration contracts.
The specific process of the data-sharing scheme is illustrated in
Figure 4.
5.3. Privacy-Preserving and Evaluable Model-Sharing Scheme for ATM
With the advancement of ATM technology, ATM systems generate vast amounts of flight operation-related data, including flight data, flight plans, meteorological data, airport operation data, and intelligence data. Sharing and analyzing such data can facilitate activities like flight delay prediction and service assurance, thereby improving flight operation efficiency and service quality. However, concerns over data security and privacy may hinder necessary data-sharing activities.
To maximize the value of ATM data while ensuring security and privacy, it is essential to incentivize data sharing. By integrating blockchain and federated learning technologies, this scheme leverages blockchain’s decentralized nature to eliminate reliance on third-party central servers, providing a secure, trustworthy, and reliable data storage environment for federated learning.
The Shapley value contribution assessment method is employed to fairly evaluate data-sharing participants, identifying low-quality data and equitably distributing rewards to incentivize high-quality data sharing. Furthermore, a reweighting strategy is applied to update local models, enhancing the performance of the global model even when some participants engage in passive training.
The specific process of model training and contribution assessment is illustrated in
Figure 5.
6. Security Analysis and Formal Verification
This chapter conducts a comprehensive security analysis and formal verification of the proposed architecture from four aspects: security analysis, TLA+ correctness verification, logical verification, and numerical experiments and validation.
6.1. Security Analysis
The advantages of the blockchain-based multi-layer aviation big data security sharing scheme are demonstrated as follows:
- (1)
A blockchain-based data-sharing architecture eliminates security and privacy leakage risks associated with centralized trust mechanisms.
- (2)
The optimized block deployment solution enhances both the security and efficiency of ATM data sharing in resource-constrained scenarios (e.g., airborne nodes) while achieving deep integration between blockchain and ATM operational workflows.
- (3)
The publish–subscribe data security sharing scheme implements fine-grained access control and flexible, diversified data management, strengthening both security and convenience of data sharing in ATM environments.
- (4)
The evaluable federated learning (FL) model sharing achieves dual privacy protection for both raw data and shared models, promotes high-quality data sharing, and prevents poisoning attacks through weighted aggregation of trained models, thereby ensuring secure data sharing.
6.2. TLA+ Correctness Verification
This section employs TLA+ formal specification to verify the correctness of the blockchain-based multi-layer aviation big data security sharing scheme. TLA+ is a formal specification language and toolset used for verifying the correctness of system designs. By defining states, system behaviors, and invariants, it helps identify potential design flaws and security issues, and it is widely applied in concurrent and distributed algorithms and systems.
When running the TLC model checker in the TLA+ Toolbox, it explores all user-defined finite states. If all generated states satisfy the specified invariants, it proves that the system executes correctly within that finite state space. This section decomposes the scheme’s optimal block deployment, searchable data sharing, and evaluable model sharing into discrete operations, defines corresponding state transitions for each operation, and uses TLA+ to verify the scheme’s correctness, ensuring all security properties are guaranteed.
6.2.1. Correctness of Optimal Block Deployment Model
The states of the optimal block deployment model are defined as shown in
Table 2. All components start from the initial state.
The initial state is set with the aircraft node state AN_State as “SBR”, the master node state MN_State as SBR, and empty sets for the block optimization candidate node set as AN_OptimizePrepared, block pruning candidate node set as AN_PrunePrepared, and peer-to-peer message collection set as msgs.
Definition 5.1: System behavior of the optimal block deployment model: The system behavior is defined by the “TPNext” operation, which determines what operations are allowed to occur in the system and ensures they are executed in the correct order. The formal description of the optimal block deployment model’s system behavior is defined as:
TPNext ==
\/ \E an \in AN :
ANPrepareOptimize(an)
\/ MNRcvOptimizePrepared(an)
\/MNCommitOptimize
\/ ANRcvCommitOptimizeMsg(an)
\/ ANPreparePrune(an)
\/ MNRcvPrunePrepared(an)
\/ MNCommitPrune
\/ ANRcvCommitPrunedMsg(an)
where ANPrepareOptimize and MNRcvOptimizePrepared represent all nodes sending block optimization preparation messages to the master node and the master node receiving these messages, respectively. MNCommitOptimize and ANRcvCommitOptimizeMsg represent the master node committing block optimization deployment and other nodes receiving the optimization deployment messages, respectively. ANPreparePrune and MNRcvPrunePrepared represent all nodes sending block pruning preparation messages to the master node and the master node receiving these messages, respectively. MNCommitPrune and ANRcvCommitPrunedMsg represent the master node committing block pruning and other nodes receiving the pruning messages, respectively.
Definition 5.2: System specification of optimal block deployment model: The behavioral specification of the system includes the initial state and sequential execution of each operation, formally described as
TPSpec ==
TPInit[][TPNext]_<<AN_State,MN_State,AN_OptimizePrepared,AN_PrunePrepared,msgs>>
Definition 5.3: Invariants of optimal block deployment model:
(1) Before the master node commits block optimization deployment, it must receive block optimization preparation messages from all other nodes, and the master node state must be in the Block On-Demand Storage phase. The formal description is
Inv_MNCommitOptimizeAfterPrepared==/\MN_State=“SBR”/\AN_OptimizePrepared=AN
(2) Before the master node commits block pruning, it must receive block pruning preparation messages from all other nodes, and the master node state must be in the Block Optimized Storage phase. The formal description is
Inv_MNCommitPruneAfterPrepared==/\MN_State=“SOD”/\AN_PrunePrepared=AN
The TLA+ model checker was used to verify the formal specification of the optimal block deployment model. The verification results are shown in
Figure 6. All invariant checks were passed, and no deadlocks were found in the entire state space. This indicates that every operation in the block optimal deployment executes correctly as designed, proving the correctness of the optimal block deployment model.
6.2.2. Correctness of Searchable Data-Sharing Model
The states of the searchable data-sharing model are defined as shown in
Table 3. All components start from the initial state.
The initial state is configured with the data provider SP’s state SP_State, data consumer SC’s state SC_State, and third-party authority AC’s state AC_State all set to “Ready”; the blockchain BC’s state BC_State set to “Init”; the SP’s public key state SPPK_State, SC’s public key state SCPK_State, and SC’s private key state SCSK_State all in “NotGenerated” status; and the SP’s private key state SPSK_State, shared data state MT_State, and key encryption key state KEK_State for encrypting SP’s private key all in “NotEncrypted” status.
Definition 5.4: System behavior of searchable data-sharing model:
The system behavior is defined by the TPNext operation, which determines permitted operations and ensures correct execution order. The formal specification is as follows:
TPNext ==
\/ ACGenKEY
\/ SPEncMT
\/ SPEncSPSK
\/ SPEncKEK
\/ SPPublishService
\/ SCQueryService
\/ SCSubscribeService
In the specification, ACGenKEY denotes that AC generates a public key for SP and a private key for SC; SPEncMT represents SP encrypting the shared data MT; SPEncSPSK indicates SP encrypting its own private key; SPEncKEK signifies SP encrypting the KEK; SPPublishService means SP publishing the service to the blockchain; SCQueryService refers to SC querying the service from the blockchain; and SCSubscribeService describes SC subscribing to the service from the blockchain.
Definition 5.5: System specification:
The system specification includes initial state and sequential operation execution:
TPSpec ==
TPInit[][TPNext]_<<SP_State,SC_State,AC_State,BC_State,SPPK_State,SPSK_State,SCPK_State,SCSK_State,MT_State,KEK_State>>
Definition 5.6: Model invariants:
- (1)
Service publishing invariant: SP must be in the encrypted state with both MT and KEK encrypted before publishing service:
Inv_SPPublishServiceAfterEncrypted==/\SP_State=“Encryption”/\MT_State =“Encrypted”/\KEK_State=“Encrypted”
- (2)
Service query invariant:SP must have published service and SC must have generated keys before querying:
Inv_SCQueryServiceAfterPublish==/\SP_State=“ServicePublish”/\SCPK_State=“True”/\SCSK_State=“True”
- (3)
Service subscription invariant: SP must have published service and SC must have queried it before subscribing:
Inv_SCSubscribeServiceAfterQuery==/\SP_State=“ServicePublish”/\SC_State=“ServiceQuery”
Verification results: The TLA+ model checker validated the formal specification (see
Figure 7). All invariants passed, and no deadlocks were found in the state space, confirming the correctness of the searchable data-sharing model.
6.2.3. Correctness of Evaluable Model-Sharing Model
The states of the evaluable model-sharing model are defined as shown in
Table 4. All components start from the initial state.
The initial state is configured with the data requester node RN’s state RN_State and data provider node PN’s state PN_State both set to “Initialized”, the set of all nodes prepared for model-sharing state PN_Prepared initialized as an empty set, the blockchain BC’s state BC_State set to “Init”, the FL model’s state Model_State in initialized status, and the peer-to-peer communication message set msgs initialized as an empty collection.
Definition 5.7: System behavior of evaluable model-sharing model:
The system behavior is defined by the TPNext operation, which determines permitted operations and ensures correct execution order. The formal specification is as follows:
TPNext ==
\/ \E pn \in PN:
\/ RNBiddingPN
\/ PNRcvBiddingMsg(pn)
\/ RNRcvBidPreparedMsg(pn)
\/ RNCommitBidMsg
\/ PNTrainModel(pn)
\/ PNEvaluatePreparedMsg(pn)
\/ BCRcvEvaluatePreparedMsg(pn)
\/ BCCommitEvaluatedMsg
\/ PNRcvCommitEvaluatedMsg(pn)
\/ PNAggregatePreparedMsg(pn)
\/ BCRcvAggregatePreparedMsg(pn)
\/ BCCommitAggregated
Herein, RNBiddingPN denotes that RN sends data request messages to all nodes on the blockchain; PNRcvBiddingMsg indicates that PN nodes receive the data request messages; RNRcvBidPreparedMsg represents RN receiving the complete set of PN nodes prepared to participate in model sharing; RNCommitBidMsg signifies RN submitting the message about participating model-sharing nodes; PNTrainModel shows that PN nodes receive the participation messages and subsequently initiate FL model training; PNEvaluatePreparedMsg demonstrates that PN nodes, upon completing model training, transmit model evaluation preparation messages to the blockchain; BCRcvEvaluatePreparedMsg reflects the blockchain receiving these model evaluation preparation messages from PN nodes; BCCommitEvaluatedMsg embodies the blockchain committing the model evaluation messages; PNRcvCommitEvaluatedMsg portrays PN nodes receiving the model evaluation messages from the blockchain; PNAggregatePreparedMsg illustrates PN nodes sending model aggregation preparation messages to the blockchain after completing model evaluation; BCRcvAggregatePreparedMsg captures the blockchain receiving these model aggregation preparation messages from PN nodes; and BCCommitAggregated ultimately represents the blockchain committing the final model aggregation message.
Definition 5.8: System specification:
The system specification includes initial state and sequential operation execution:
TPSpec ==
TPInit/\[][TPNext]_<<RN_State,PN_State,PN_Prepared,Modle_State,BC_State,msgs>>
Definition 5.9: Model invariants:
- (1)
Model training invariant: PN must be in training-prepared state with FL model initialized before training:
Inv_PNTrainModelAfterPrepared==/\PN_State=“TrainPrepared”/\Modle_State = “False”
- (2)
Model evaluation invariant: BC must receive messages from all evaluation-prepared nodes before committing:
Inv_BCCommitEvaluatedMsgAfterPrepared==/\PN_Prepared=PN
- (3)
Model aggregation invariant: BC must receive messages from all aggregation-prepared nodes before committing:
Inv_BCCommitAggregatedMsgAfterPrepared==/\PN_Prepared=PN
Verification results: The TLA+ model checker validated the formal specification (see
Figure 8). All invariants passed with no deadlocks in the state space, confirming the evaluable model-sharing model’s correctness.
6.3. Logical Verification
This section conducts formal definition and logical verification analysis of the blockchain-based multi-layer aviation big data security sharing scheme using Nash equilibrium from game theory. The core of game theory lies in how rational participants select strategies to optimally respond to others’ decisions in interactive environments. This analytical method aims to ensure security, privacy, and effectiveness throughout the data-sharing process. Below are relevant definitions and theorems for this model.
Let represent the set of all nodes participating in the multi-layer aviation big data security sharing, denote the action strategy space of all participating nodes during sharing, and represent the utility functions of all participating nodes under different game outcomes. The game payoff for node under strategy combination can be expressed as .
Lemma 1. The utility function is monotonically increasing. By definition, represents the probability that a participant can at least determine message reception/sending by others or at most obtain information with probability . Since all participants act rationally in data sharing—meaning higher x yields greater game payoff and thus higher for any where —we have , proving is monotonically increasing.
Definition 1. Nash equilibrium. Let denote the game outcome when participants execute strategy combination . A strategy combination constitutes a Nash equilibrium if and only if no participant can unilaterally change strategy to obtain better outcomes when others’ strategies are known, i.e., , . As all participants are rational, none will deviate from . Generally, a game may yield multiple Nash equilibria.
Definition 2. Rational security protocol. Let be the set of security communication protocols followed by all participants during data sharing. The communication protocol game is denoted as , where S denotes sender, R receiver, A attacker, and AviationChain the sharing environment. Here, represents the minimum probability that sender S confirms correct receipt by R, the minimum probability that R confirms M’s origin from S, and the maximum probability that A obtains M. is rationally secure if and only if the following holds:
The strategy combination forms a Nash equilibrium in producing optimal outcome ;
For any Nash equilibrium in this game, .
Verification:
Per game definition, is the optimal outcome—no strategy change yields better results. Thus, if achieves , it constitutes a Nash equilibrium.
By Nash equilibrium definition, for any equilibrium with outcome , the optimal dominates. From Lemma 1, holds for all participants.
Figure 9 presents the game tree of the proposed multi-level security sharing model for aviation big data, where the optimal game outcome is (α,β,γ), generated by the Nash equilibrium action sequence. As shown in
Table 5, individual security functions cannot guarantee comprehensive security throughout the aviation big data-sharing process. The proposed integrated solution—incorporating optimized block deployment, searchable data sharing, and evaluable model sharing—establishes multi-level security protection for aviation big data sharing. This achieves the game-theoretic mechanism’s security assurance for rational protocols.
6.4. Numerical Experiments and Validation
To validate the blockchain deployment optimization and consensus mechanism, we construct a realistic and reliable test scenario. Real-time aircraft position data from the OpenSky Network platform [
33] is used to simulate a practical ATM data-sharing environment. For blockchain deployment optimization, we adopt our proposed IF-NSGA-II algorithm with the following parameter settings: the number of objective functions is 3, the number of constraints is 3, the crossover probability is 0.85, and the mutation probability is 0.15. For the consensus algorithm, we use our proposed C-GPBFT, where the total number of nodes is set to 100 and the number of sub-clusters is 4.
We compare IF-NSGA-II with the benchmark algorithm NSGA-II [
34] in terms of solution quality and diversity. We randomly select one run result of two algorithms with a population size of 100 and visualize the non-dominated solution sets for the block allocation optimization problem. As shown in
Figure 10, the x, y, and z axes represent the average weighted storage occupancy rate, average response time, and average unavailability probability, respectively. It can be seen that IF-NSGA-II achieves better coverage of the approximate non-dominated solution space than NSGA-II, with the approximate non-dominated solutions obtained by IF-NSGA-II exhibiting the widest distribution in the objective space. Furthermore, IF-NSGA-II contributes the most to the overall set of approximate non-dominated solutions, accounting for 92.24%, while NSGA-II contributes only 7.76%.
To demonstrate the advantages of C-GPBFT in ATM data sharing, we conduct a comparison with the traditional PBFT [
35] algorithm. First, the aircraft nodes are divided into four sub-clusters, and the clustering results are shown in
Figure 11. Then, we evaluate the consensus latency and throughput (TPS) of both algorithms, with the results presented in
Figure 12 and
Figure 13, respectively.
Figure 12 presents a comparison of consensus latency between the two algorithms. In the prepare and commit phases of PBFT, each aircraft node in the consensus domain broadcasts messages to all other nodes in the network, resulting in a large number of communications for each consensus and consequently higher latency. In contrast, C-GPBFT adopts a clustering strategy that divides nodes into multiple sub-clusters based on their spatial distribution, significantly narrowing the consensus domain and reducing the number of required communications. Furthermore, as the number of consensus increases and node positions change in real time, C-GPBFT can dynamically update the clustering based on the node distribution, allowing the consensus latency to remain stable.
Figure 13 presents a comparison of throughput between the two algorithms. Since C-GPBFT has significantly lower consensus latency compared to PBFT, its throughput is considerably higher. Moreover, as the clusters are dynamically updated, the throughput exhibits only minor fluctuations across different consensus counts. This indicates that the proposed C-GPBFT algorithm has excellent adaptability to dynamic environments and holds promising practical potential in highly dynamic ATM scenarios.
7. Limitations
Although the proposed multi-layered secure sharing framework for aviation big data demonstrates promising theoretical performance in terms of security, privacy, and efficiency, several practical challenges and limitations remain, which require further exploration and refinement in future research.
First, the integration of blockchain with existing ATM data systems presents a significant challenge. Current aviation systems rely heavily on legacy infrastructures and standardized interfaces, yet no unified blockchain protocols or interfacing standards have been established for this domain. Large-scale system renovations may incur high costs and technical complexity, particularly within globally interconnected ATM networks. Future work may consider introducing middleware technologies to bridge blockchain with traditional infrastructures, thereby minimizing disruption and improving deployment feasibility.
Second, energy consumption remains an important concern. Although this work adopts a consortium blockchain to avoid the high energy costs of public chains, the collaborative learning scenario involving frequent interactions and multi-party participation still incurs non-negligible computational overhead. In light of global efforts toward green aviation and carbon reduction, subsequent research should explore more energy-efficient consensus mechanisms such as lightweight protocols and investigate edge–cloud collaborative architectures to optimize resource allocation.
Third, regulatory and legal adaptation for blockchain in aviation is still lacking. Currently, there is no well-established global regulatory framework for blockchain applications in civil aviation. Cross-border data sharing raises issues such as data sovereignty, accountability, and jurisdictional ambiguity. Future work could explore the design of auditable smart contracts, compliance-oriented templates, and participant authorization mechanisms. Collaboration with international bodies such as ICAO may be necessary to establish common standards and facilitate regulatory alignment.
Fourth, ethical issues must not be overlooked when deploying federated learning in critical infrastructures such as ATM systems. When federated learning models are involved in safety-critical decision-making, challenges may arise during model collaboration, including model bias, lack of decision transparency, and ambiguous responsibility attribution. If participants’ data contain structural biases, it can adversely affect the overall model’s performance and fairness. Moreover, since model updates and decision processes are mainly conducted locally without a unified auditing mechanism, future work should explore mechanisms such as explainable models and auditable smart contracts to enhance system trustworthiness.
Fifth, the deployment of blockchain-based data-sharing mechanisms on a global scale also faces significant data governance challenges. In the international aviation environment, cross-jurisdictional data flows may trigger issues related to compliance with data movement regulations, responsibility attribution, and the delineation of regulatory authority. Currently, there is a lack of unified standards and protocols for cross-border inter-chain data governance. Subsequent research can integrate technologies such as verifiable privacy-preserving computation to build interoperable data governance frameworks, supporting secure and efficient international collaboration.
In summary, the architecture proposed in this paper provides a valuable exploratory path toward secure and trustworthy data sharing in ATM systems. However, further improvement and development are needed in areas including standardization, energy efficiency optimization, regulatory adaptation, ethical application, and cross-border data governance.
8. Conclusions
This paper analyzes the practical data-sharing requirements in aviation operations and establishes a mathematical model for secure aviation big data sharing. Building on this foundation, we propose a multi-layer security sharing architecture that addresses the storage and timeliness constraints in aviation data sharing through blockchain optimization deployment and consensus mechanisms. By implementing a dual-layer sharing framework combining data sharing and model sharing, we achieve comprehensive aviation big data sharing while providing targeted support for ATM operations.
Based on real-world aviation operational scenarios, this study constructs a mathematical model for secure aviation big data sharing and innovatively develops a multi-layer security architecture that effectively resolves the critical challenges of data security and real-time performance in aviation data sharing. At the technical implementation level, we employ a dynamic deployment strategy to significantly reduce storage pressure on lightweight nodes, design a clustering-based grouped PBFT consensus mechanism to meet the timeliness requirements of critical business data, and establish a dual-layer architecture integrating data sharing with model sharing to ensure security, efficiency, privacy protection, and sharing incentives for ATM data sharing. This solution provides secure and efficient data-sharing support for ATM operations while offering a viable technical pathway for the digital transformation of air traffic management systems.
The proposed approach demonstrates three key technical innovations: the dynamic deployment strategy effectively alleviates storage constraints for resource-limited nodes, the optimized consensus mechanism ensures timely processing of critical aviation data, and the integrated sharing framework simultaneously addresses security, privacy, and efficiency requirements. Together, these advancements establish a comprehensive solution for aviation big data sharing that meets the stringent demands of modern air traffic management systems while supporting their ongoing digital transformation.