A License Management and Fine-Grained Verifiable Data Access Control System for Online Catering

被引:0
|
作者
Ni, Xiaoze [1 ]
Feng, Jian [2 ]
Jiang, Renkai [1 ]
He, Yajie [2 ]
Liu, Tao [3 ]
Chen, Ting [1 ]
Qiu, Sen [4 ]
机构
[1] Univ Elect Sci & Technol China, Cybersecur Res Ctr, Chengdu 611731, Peoples R China
[2] China Univ Polit Sci & Law, Inst Rule Law, Beijing 100088, Peoples R China
[3] China Univ Polit Sci & Law, Business Sch, Beijing 100088, Peoples R China
[4] Dalian Univ Technol, Sch Control Sci & Engn, Dalian 116024, Peoples R China
关键词
Administrative law enforcement; blockchain; online catering; BLOCKCHAIN; LAW;
D O I
10.1109/TCSS.2023.3294797
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
To address the law enforcement challenges arising from the rapid expansion of the online catering industry, China's market regulatory authorities are pursuing countermeasures through legislative efforts and innovative regulatory models. At present, administrative law enforcement for online catering faces difficulties in license management and ensuring the authenticity and security of data. Specifically, there is a prevalence of fraudulent licenses in the industry, and the market supervision department struggles to verify the authenticity of the data gathered during investigations and evidence collection. The tamper-proof and transparent features of blockchain technology cannot be directly applied to the online catering domain. Consequently, to attain trusted license management and secure data-sharing measures, further system design is necessary. To achieve trusted license management, we employ blockchain technology for managing qualification certificates and delineate the format for valid certificates and the application process. The secure data-sharing protocol is divided into two stages. In the first stage, we ensure data authenticity before uploading it to the blockchain through a consensus process involving platforms, users, and merchants. In the second stage, we implement fine-grained access control based on the on-chain data from the previous stage, utilizing conditional proxy reencryption and ultimately employing the data digest on the blockchain for verification. The experiment thoroughly validates the system's functionality, which is traceable, transparent, and scalable. Moreover, the minimal delay introduced by ensuring data authenticity is virtually negligible. The system's additional storage overhead does not surpass 10%, remaining within acceptable limits.
引用
下载
收藏
页码:3586 / 3601
页数:16
相关论文
共 50 条
  • [21] Fine-Grained Access Control via Policy-Carrying Data
    Padget, Julian A.
    Vasconcelos, Wamberto W.
    ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2018, 18 (03)
  • [22] Fine-Grained Access Control ensuring Data Privacy in OpenStack Cloud
    John, Naveen Thomas M.
    Thomas, Manoj V.
    2017 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING, INSTRUMENTATION AND CONTROL TECHNOLOGIES (ICICICT), 2017, : 1669 - 1674
  • [23] Traceable Lightweight and Fine-grained Access Control in Named Data Networking
    Luo Jiangtao
    He Chen
    Wang Junxia
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2019, 41 (10) : 2428 - 2434
  • [24] Fine-Grained Data Access Control for Collaborative Process Execution on Blockchain
    Marangone, Edoardo
    Di Ciccio, Claudio
    Weber, Ingo
    BUSINESS PROCESS MANAGEMENT: BLOCKCHAIN, ROBOTIC PROCESS AUTOMATION, AND CENTRAL AND EASTERN EUROPE FORUM, 2022, 459 : 51 - 67
  • [25] A Fine-Grained Access Control Model with Secure Label on Data Resource
    Gao, Lijie
    Liu, Lianzhong
    Jin, Ze
    Han, Chunyan
    2013 3RD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), 2013, : 14 - 18
  • [26] Towards a fine-grained access control for Cloud
    Msahli, Mounira
    Chen, Xiuzhen
    Serhrouchni, Ahmed
    2014 IEEE 11TH INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING (ICEBE), 2014, : 286 - 291
  • [27] Delegatable access control for fine-grained XML
    Wu, J
    Seberry, J
    Mu, Y
    Ruan, C
    11TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS WORKSHOPS, VOL II, PROCEEDINGS,, 2005, : 270 - 274
  • [28] Fine-grained integration of access control policies
    Rao, Prathima
    Lin, Dan
    Bertino, Elisa
    Li, Ninghui
    Lobo, Jorge
    COMPUTERS & SECURITY, 2011, 30 (2-3) : 91 - 107
  • [29] Fine-grained Access Control to Web Databases
    Roichman, Alex
    Gudes, Ehud
    SACMAT'07: PROCEEDINGS OF THE 12TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2007, : 31 - 40
  • [30] A Fine-Grained Image Access Control Model
    Al Bouna, Bechara
    Chbeir, Richard
    Gabillon, Alban
    Capolsini, Patrick
    8TH INTERNATIONAL CONFERENCE ON SIGNAL IMAGE TECHNOLOGY & INTERNET BASED SYSTEMS (SITIS 2012), 2012, : 603 - 612