A traceable and revocable multi-authority attribute-based access control scheme for mineral industry data secure storage in blockchain

被引:2
|
作者
Zhang, Xiaohong [1 ]
Du, Wenqi [1 ]
Moshayedi, Ata Jahangir [1 ,2 ]
机构
[1] Jiangxi Univ Sci & Technol, Sch Informat Engn, Ganzhou 341000, Jiangxi, Peoples R China
[2] Islamic Azad Univ, KhomeiniShahr Branch, Esfahan 10587, Iran
来源
JOURNAL OF SUPERCOMPUTING | 2023年 / 79卷 / 13期
基金
中国国家自然科学基金;
关键词
CP-ABE; Traceability; Revocation; Mineral industry; Blockchain; IPFS;
D O I
10.1007/s11227-023-05222-2
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid advancements of the mineral industry, the data generated by this industry chain have increased dramatically. To reduce the growing pressure of data storage and security risks, we design a credible on-chain and off-chain collaborative dual storage system that integrates blockchain technology and Interplanetary file system (IPFS), also construct a traceable and revocable multi-authority ciphertext-policy attributed-based encryption (CP-ABE) algorithm to meet the demand of privacy protection and dynamic fine-grained access control. Furthermore, the multi-authority layered authorization with a central authority model distributes system overhead while enabling the platform can be regulated. More importantly, our scheme achieves accurate trace of the malicious users by white-box traceability and capable of implementing indirect immediate user and attribute revocation without requiring key or ciphertext updates. Finally, the proposed scheme is indistinguishably secure under chosen-plaintext attack (IND-CPA) in the standard model. And the performance analysis demonstrates that our scheme is feature-rich, practical and efficient.
引用
下载
收藏
页码:14743 / 14779
页数:37
相关论文
共 50 条
  • [1] A traceable and revocable multi-authority attribute-based access control scheme for mineral industry data secure storage in blockchain
    Xiaohong Zhang
    Wenqi Du
    Ata Jahangir Moshayedi
    The Journal of Supercomputing, 2023, 79 : 14743 - 14779
  • [2] Traceable and revocable multi-authority attribute-based keyword search for cloud storage
    Varri, Uma Sankararao
    Pasupuleti, Syam Kumar
    Kadambari, K., V
    JOURNAL OF SYSTEMS ARCHITECTURE, 2022, 132
  • [3] Blockchain Access Control Scheme Based on Multi-authority Attribute-Based Encryption
    Li, Yang
    Qi, Baoyue
    Wang, Mengmeng
    Zhu, Jianming
    Wang, Xiuli
    DATA SCIENCE (ICPCSEE 2022), PT II, 2022, 1629 : 105 - 124
  • [4] Secure Multi-Authority Data Access Control Scheme in Cloud Storage System Based on Attribute-Based Signcryption
    Xu, Qian
    Tan, Chengxiang
    Fan, Zhijie
    Zhu, Wenye
    Xiao, Ya
    Cheng, Fujia
    IEEE ACCESS, 2018, 6 : 34051 - 34074
  • [5] Attribute-Based Data Access Control for Multi-Authority System
    Salehi, Ahmad S.
    Rudolph, Carsten
    Grobler, Marthie
    2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 1834 - 1841
  • [6] Efficient Revocable Multi-Authority Attribute-Based Encryption for Cloud Storage
    Ming, Yang
    He, Baokang
    Wang, Chenhao
    IEEE ACCESS, 2021, 9 : 42593 - 42603
  • [7] A traceable and revocable multi-authority access control scheme with privacy preserving for mHealth
    Zhang, Leyou
    Zhao, Chuchu
    Wu, Qing
    Mu, Yi
    Rezaeibagha, Fatemeh
    JOURNAL OF SYSTEMS ARCHITECTURE, 2022, 130
  • [8] TRACEABLE MULTI-AUTHORITY ATTRIBUTE-BASED ENCRYPTION SCHEME FOR CLOUD COMPUTING
    Yang, Xiaodong
    Yang, Ping
    An, Faying
    Zhou, Qixu
    Yang, Miaomiao
    2017 14TH INTERNATIONAL COMPUTER CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (ICCWAMTIP), 2017, : 263 - 267
  • [9] Attribute Revocable Multi-Authority Attribute-Based Encryption with Forward Secrecy for Cloud Storage
    Nomura, Kenta
    Mohri, Masami
    Shiraishi, Yoshiaki
    Morii, Masakatu
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2017, E100D (10) : 2420 - 2431
  • [10] Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage
    Zhong, Hong
    Zhu, Wenlong
    Xu, Yan
    Cui, Jie
    SOFT COMPUTING, 2018, 22 (01) : 243 - 251