A Policy-hidden Big Data Access Control Method Based on Blockchain

被引:0
|
作者
Lin L. [1 ,2 ]
Chu Z.-X. [1 ,2 ]
Liu Z.-M. [1 ,2 ]
Guo F.-B. [1 ,2 ]
Xie X.-Y. [1 ,2 ]
Zhang J.-B. [1 ,2 ]
机构
[1] Faculty of Information Technology, Beijing University of Technology, Beijing
[2] Beijing Key Laboratory of Trusted Computing, Beijing University of Technology, Beijing
来源
基金
中国国家自然科学基金;
关键词
access control; blockchain; Data sharing; policy-hidden; smart contract;
D O I
10.16383/j.aas.c211178
中图分类号
学科分类号
摘要
In the current big data application, the access control of user shared data is implemented by the incomplete trusted cloud service provider, which brings problems such as privacy disclosure, policy and access log easy to be tampered. To solve this problem, this paper presents a policy-hidden big data access control method based on blockchain (PHAC), which exploits blockchain technology to implement access control to reduce the reliance of data owners on cloud servers. Attribute-based encryption (ABE) and bilinear mapping are introduced to implement access control policies correctly through smart contracts without disclosing access control policies. Meanwhile, access control policies are decoupled to simplify their release, update and execution. The combination of on-chain and off-chain storage is applied to solve the problem that smart contracts and access control policies occupy too much blockchain node resources. Finally, theoretical analysis and comprehensive experiments in the HyperLedger Fabric environment have been conducted, which demonstrate the effectiveness of the proposed method. It can effectively implement access control while supporting access control policies hidden, however it does not impose too much extra computing and storage overhead on data owners and blockchain nodes. © 2023 Science Press. All rights reserved.
引用
下载
收藏
页码:1031 / 1049
页数:18
相关论文
共 38 条
  • [21] Guan Zhi-Tao, Yang Ting-Ting, Xu Ru-Zhi, Wang Zhu-Xiao, Multi-authority attribute-based encryption access control model for cloud storage, Journal on Communications, 36, 6, pp. 120-130, (2015)
  • [22] Lin H, Cao Z, Liang X, Shao J., Secure threshold multi authority attribute based encryption without a central authority, Information Sciences, 180, 13, pp. 2618-2632, (2010)
  • [23] Ding X, Yang J., An access control model and its application in blockchain, Proceedings of the International Conference on Communications, Information System and Computer Engineering, pp. 163-167, (2019)
  • [24] Ba Y, Hu X, Chen Y, Hao Z, Li X, Yan X., A blockchain-based CP-ABE scheme with partially hidden access structures, Security and Communication Networks, 2021, (2021)
  • [25] Wang S, Zhang Y, Zhang Y., A blockchain-based framework for data sharing with fine-grained access control in decentralized storage systems, IEEE Access, 6, pp. 38437-38450, (2018)
  • [26] Zhang Jian-Biao, Zhang Zhao-Qian, Xu Wan-Shan, Wu Na, Inter-domain access control model based on blockchain, Journal of Software, 32, 5, pp. 1547-1564, (2021)
  • [27] Makhdoom I, Zhou I, Abolhasan M, Lipman J, Ni W., Privy-Sharing: A blockchain-based framework for privacy-preserving and secure data sharing in smart cities, Computers and Security, 88, (2020)
  • [28] Gao S, Piao G, Zhu J, Ma X, Ma J., Trustaccess: A trustworthy secure ciphertext-policy and attribute hiding access control scheme based on blockchain, IEEE Transactions on Vehicular Technology, 69, 6, pp. 5784-5798, (2020)
  • [29] Zhang Z, Zhang J, Yuan Y, Li Z., An expressive fully policy-hidden ciphertext policy attribute-based encryption scheme with credible verification based on blockchain, IEEE Internet of Things Journal, 9, 11, pp. 8681-8692, (2022)
  • [30] Xia Qing, Dou Wen-Sheng, Guo Kai-Wen, Liang Geng, Zuo Chun, Zhang Feng-Jun, Survey of blockchain consensus protocols, Journal of Software, 32, 2, pp. 277-299, (2021)