A Policy-hidden Big Data Access Control Method Based on Blockchain

被引:0
|
作者
Lin L. [1 ,2 ]
Chu Z.-X. [1 ,2 ]
Liu Z.-M. [1 ,2 ]
Guo F.-B. [1 ,2 ]
Xie X.-Y. [1 ,2 ]
Zhang J.-B. [1 ,2 ]
机构
[1] Faculty of Information Technology, Beijing University of Technology, Beijing
[2] Beijing Key Laboratory of Trusted Computing, Beijing University of Technology, Beijing
来源
基金
中国国家自然科学基金;
关键词
access control; blockchain; Data sharing; policy-hidden; smart contract;
D O I
10.16383/j.aas.c211178
中图分类号
学科分类号
摘要
In the current big data application, the access control of user shared data is implemented by the incomplete trusted cloud service provider, which brings problems such as privacy disclosure, policy and access log easy to be tampered. To solve this problem, this paper presents a policy-hidden big data access control method based on blockchain (PHAC), which exploits blockchain technology to implement access control to reduce the reliance of data owners on cloud servers. Attribute-based encryption (ABE) and bilinear mapping are introduced to implement access control policies correctly through smart contracts without disclosing access control policies. Meanwhile, access control policies are decoupled to simplify their release, update and execution. The combination of on-chain and off-chain storage is applied to solve the problem that smart contracts and access control policies occupy too much blockchain node resources. Finally, theoretical analysis and comprehensive experiments in the HyperLedger Fabric environment have been conducted, which demonstrate the effectiveness of the proposed method. It can effectively implement access control while supporting access control policies hidden, however it does not impose too much extra computing and storage overhead on data owners and blockchain nodes. © 2023 Science Press. All rights reserved.
引用
下载
收藏
页码:1031 / 1049
页数:18
相关论文
共 38 条
  • [1] Berdik D, Otoum S, Schmidt N, Porter D, Jararweh Y., A survey on blockchain for information systems management and security, Information Processing & Management, 58, 1, (2021)
  • [2] Liu Ming-Da, Chen Zuo-Ning, Shi Yi-Juan, Tang Ling-Tao, Cao Dan, Reseach progress of blockchain in data security, Chinese Journal of Computers, 44, 1, pp. 1-27, (2021)
  • [3] Yuan Yong, Wang Fei-Yue, Editable blockchain: Models, techniques and methods, Acta Automatica Sinica, 46, 5, pp. 831-846, (2020)
  • [4] Maesa D D F, Mori P, Ricci L., Blockchain based access control, Proceedings of the 17th IFIP International Conference on Distributed Applications and Interoperable Systems, pp. 206-220, (2017)
  • [5] Yang C, Tan L, Shi N, Xu B, Cao Y, Yu K., Authprivacychain: A blockchain-based access control framework with privacy protection in cloud, IEEE Access, 8, pp. 70604-70615, (2020)
  • [6] Liu Ao-Di, Du Xue-Hui, Wang Na, Li Shao-Zhuo, A blockchain-based access control mechanism for big data, Journal of Software, 30, 9, pp. 2636-2654, (2019)
  • [7] Maesa D D F, Mori P, Ricci L., Blockchain based access control services, Proceedings of the IEEE Conferences on Internet of Things, Green Computing and Communications, Cyber, Physical and Social Computing, Smart Data, pp. 1379-1386, (2018)
  • [8] Wang Xiu-Li, Jiang Xiao-Zhou, Li Yang, Model for data access control and sharing based on blockchain, Journal of Software, 30, 6, pp. 1661-1669, (2019)
  • [9] Maesa D D F, Mori P, Ricci L., A blockchain based approach for the definition of auditable access control systems, Computers & Security, 84, pp. 93-119, (2019)
  • [10] Song Yan, Han Zhen, Liu Feng-Mei, Liu Lei, Attribute-based encryption with hidden policies in the access tree, Journal on Communications, 36, 9, pp. 119-126, (2015)