Trusted edge and cross-domain privacy enhancement model under multi-blockchain

被引:4
|
作者
Minmin, Huang [1 ]
Lingyun, Yuan [1 ,2 ]
Xue, Pan [1 ]
Chuan, Zhou [1 ]
机构
[1] Yunnan Normal Univ, Sch Informat, Kunming 650500, Peoples R China
[2] Yunnan Normal Univ, Minist Educ, Key Lab Educ Informat Nationalities, Kunming 650500, Peoples R China
基金
中国国家自然科学基金;
关键词
Multi-blockchain; Credibility edge; Cross-domain access control; Searchable encryption; Privacy enhancing; EFFICIENT; INTERNET;
D O I
10.1016/j.comnet.2023.109881
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With its promising security and distributed qualities, blockchain offers a significant opportunity to break through the privacy protection issues in the edge computing paradigm. However, when edge participants submit security tasks to a distributed blockchain network across domains, they may expose their data privacy and location privacy. These privacy will be maliciously attacked and exploited by attackers such as external attackers and untrusted third parties, increasing the difficulty of access control. In addition, the performance bottleneck of blockchain systems cannot meet the demand for efficient data processing. To address these problems, we propose a cross-domain privacy enhancement scheme based on multi-blockchain. The scheme first integrates edge computing based on master-slave multi-blockchain and designs an identity authentication mechanism and trust assessment mechanism to deploy a three-layer trusted network architecture, which ensures the security stability and operational efficiency at the edge side. Secondly, role mapping rules are developed and trust degree is evaluated for domain nodes, and a cross-domain access control model based on trust degree and role is proposed. Data in this model cannot be exchanged across domains until all nodes jointly verify whether the access control policy is effective, which ensures the secure sharing of data in heterogeneous domains. In addition, to ensure the privacy and authenticity of data in cross-domain sharing, a hybrid searchable encryption method based on symmetric encryption and public key encryption is proposed. Finally, the security theoretical analysis proves that the model successfully ensures the non-repudiation of access control policy and the controllability of cross-domain data. Experiments show that the proposed model improves access dynamics by 74.8% and reduces CPU usage by 24.6% on average compared to traditional RBAC. The scheme is scalable, and its sending rate to throughput ratio reaches 1:1, gaining a 2X throughput advantage over existing schemes.
引用
收藏
页数:16
相关论文
共 50 条
  • [41] Efficient and Anonymous Cross-Domain Authentication for IIoT Based on Blockchain
    Cui, Jie
    Liu, Nan
    Zhang, Qingyang
    He, Debiao
    Gu, Chengjie
    Zhong, Hong
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2023, 10 (02): : 899 - 910
  • [42] A Cross-domain Data Sharing Scheme for VANETs Based on Blockchain
    Shang, Wan-Yu
    Mu, Hai-Bing
    Liu, Jian-Xiong
    JOURNAL OF INTERNET TECHNOLOGY, 2024, 25 (06): : 843 - 850
  • [43] CreditBC: Incorporating Blockchain to Credit Management for Cross-domain Service
    Zou, Qingquan
    Long, Chengnian
    Wei, Lijun
    2021 PROCEEDINGS OF THE 40TH CHINESE CONTROL CONFERENCE (CCC), 2021, : 8698 - 8703
  • [44] A cross-domain trust inferential transfer model for cross-domain Industrial Internet of Things
    Wu, Xu
    Liang, Junbin
    ICT EXPRESS, 2023, 9 (05): : 761 - 768
  • [45] Institution-governed cross-domain agent service cooperation: a model for trusted and autonomic service cooperation
    Gao, Ji
    Lv, Hexin
    APPLIED INTELLIGENCE, 2012, 37 (02) : 223 - 238
  • [46] Blockchain-Based Cross-Domain Authentication With Dynamic Domain Participation in IoT
    Luo, Deyu
    Sun, Gang
    Yu, Hongfang
    Guizani, Mohsen
    IEEE INTERNET OF THINGS JOURNAL, 2025, 12 (05): : 5385 - 5395
  • [47] A session model for cross-domain interactive multi-user IPTV
    Goergen, Daniel
    Zoric, Josip
    O'Connell, John
    Friedrich, Oliver
    Zachey, Benjamin
    2010 7TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE-CCNC 2010, 2010, : 306 - +
  • [48] Institution-governed cross-domain agent service cooperation: a model for trusted and autonomic service cooperation
    Ji Gao
    Hexin Lv
    Applied Intelligence, 2012, 37 : 223 - 238
  • [49] Privacy-preserving Multi-source Cross-domain Recommendation Based on Knowledge Graph
    Liu, Jing
    Shang, Litao
    Su, Yuting
    Nie, Weizhi
    Wen, Xin
    Liu, Anan
    ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS, 2024, 20 (05)
  • [50] Blockchain-Based Secure Cross-Domain Data Sharing for Edge-Assisted Industrial Internet of Things
    Wang, Fengqun
    Cui, Jie
    Zhang, Qingyang
    He, Debiao
    Zhong, Hong
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 3892 - 3905