AuthPrivacyChain: A Blockchain-Based Access Control Framework With Privacy Protection in Cloud

被引:84
|
作者
Yang, Caixia [1 ]
Tan, Liang [1 ,2 ]
Shi, Na [1 ]
Xu, Bolei [3 ]
Cao, Yang [4 ]
Yu, Keping [5 ,6 ]
机构
[1] Sichuan Normal Univ, Coll Comp Sci, Chengdu 610101, Peoples R China
[2] Chinese Acad Sci, Inst Comp Technol, Beijing 100190, Peoples R China
[3] Shenzhen Univ, Coll Informat Engn, Shenzhen 518060, Peoples R China
[4] Kyoto Univ, Dept Social Informat, Kyoto 6068501, Japan
[5] Waseda Univ, Global Informat & Telecommun Inst, Tokyo 1698050, Japan
[6] Shenzhen Boyi Technol Co Ltd, Shenzhen 518125, Peoples R China
基金
日本学术振兴会; 中国国家自然科学基金;
关键词
Cloud computing; Authorization; Privacy; Distributed databases; cloud security; access control; blockchain; privacy protection; SECURE; NETWORK; SCHEME;
D O I
10.1109/ACCESS.2020.2985762
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud is a computing model that provides sharing and supports ubiquitous on-demand access computing, providing new data processing and services for many industries, significantly reducing user computing and storage costs, and improving ease of use. With the development of cloud-scale and intensification, cloud security has become an essential issue in the field of cloud computing. Access control is one of the critical security technologies for protecting sensitive data stored in the cloud by enterprises and individuals. Since the centralized access control mechanism is adopted in the cloud, the sensitive data in the cloud are easy to be tampered with or leaked by hackers or cloud internal managers. To address this issue, we propose a blockchain-based access control framework with privacy protection called AuthPrivacyChain. Firstly, we use the account address of the node in blockchain as the identity, and at the same time, redefine the access control permission of data for the cloud, which is encrypted and stored in blockchain. After that, we design processes of access control, authorization, and authorization revocation in AuthPrivacyChain. Finally, we implement AuthPrivacyChain based on enterprise operation system (EOS), and the results show that AuthPrivacyChain can not only prevent hackers and administrators from illegally accessing resources, but also protect authorized privacy.
引用
收藏
页码:70604 / 70615
页数:12
相关论文
共 50 条
  • [1] BSAF: A blockchain-based secure access framework with privacy protection for cloud-device service collaborations
    Duan, Li
    Xu, Wenyao
    Ni, Wei
    Wang, Wei
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2023, 140
  • [2] Blockchain-based AMI framework for data security and privacy protection
    Tian, Hongliang
    Jian, Yuzhi
    Ge, Xiaonan
    [J]. SUSTAINABLE ENERGY GRIDS & NETWORKS, 2022, 32
  • [3] BACC: Blockchain-Based Access Control For Cloud Data
    Sohrabi, Nasrin
    Yi, Xun
    Tari, Zahir
    Khalil, Ibrahim
    [J]. PROCEEDINGS OF THE AUSTRALASIAN COMPUTER SCIENCE WEEK MULTICONFERENCE (ACSW 2020), 2020,
  • [4] A Blockchain-Based Access Control System for Cloud Storage
    Sukhodolskiy, Ilya
    Zapechnikov, Sergey
    [J]. PROCEEDINGS OF THE 2018 IEEE CONFERENCE OF RUSSIAN YOUNG RESEARCHERS IN ELECTRICAL AND ELECTRONIC ENGINEERING (EICONRUS), 2018, : 1575 - 1578
  • [6] A Blockchain-Based Medical Data Sharing Mechanism with Attribute-Based Access Control and Privacy Protection
    Chen, Yingwen
    Meng, Linghang
    Zhou, Huan
    Xue, Guangtao
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
  • [7] Blockchain-Based Framework for Privacy Preservation and Securing EHR with Patient-Centric Access Control
    Puneeth, Reval Prabhu
    Parthasarathy, Govindaswamy
    [J]. ACTA INFORMATICA PRAGENSIA, 2024, 13 (01)
  • [8] SDAC-BBPP: A Secure Dynamic Access Control Scheme With Blockchain-Based Privacy Protection for IIoT
    Feng, Libo
    Lin, Junyu
    Qiu, Fei
    Yu, Bei
    Jin, Zhihua
    Wang, Jinli
    Cheng, Jing
    Yao, Shaowen
    [J]. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2024, 21 (03): : 3179 - 3193
  • [9] A blockchain-based privacy protecting framework with multi-channel access control model for asset trading
    Cai, Jing
    Huang, Haihui
    Ma, Chuang
    Liu, Jun
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2024,
  • [10] A blockchain-based privacy-preserving auditable authentication scheme with hierarchical access control for mobile cloud computing
    Zhang, Yin
    Xiong, Ling
    Li, Fagen
    Niu, Xianhua
    Wu, Hanzhou
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2023, 142