Privacy Protection of Task in Crowdsourcing: Policy-Hiding and Attribute Updating Attribute-Based Access Control Based on Blockchain

被引:2
|
作者
Yang, Kunwei [1 ]
Yang, Bo [1 ]
Zhou, Yanwei [1 ]
Wang, Tao [1 ]
Gong, Linming [2 ]
机构
[1] Shaanxi Normal Univ, Sch Comp Sci, Xian 710119, Peoples R China
[2] Xian Polytech Univ, Sch Comp Sci, Xian 710048, Peoples R China
基金
中国国家自然科学基金;
关键词
ENCRYPTION; SCHEME;
D O I
10.1155/2022/7787866
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Crowdsourcing is a new way to solve complex problems by using human intelligence. However, the tasks and user information privacy concerned in crowdsourcing have not been adequately addressed. It is necessary to design a privacy protection mechanism for tasks that need to be restricted to specific user groups. Ciphertext-policy attribute-based encryption (CP-ABE) is an efficient and feasible cryptographic tool, particularly for crowdsourcing systems. The encryptor can choose the access policy independently, which limits the scope of decryption users. At present, most CP-ABE schemes adopt a centralized management platform, which poses problems such as high trust-building costs, DDoS attacks, and single point of failure. In this paper, we propose a new access control scheme based on CP-ABE and blockchain, which has the properties of policy hiding and attribute updating. To protect the privacy of worker's attributes, we adopt a test algorithm based on a fully homomorphic cryptosystem to confidentially judge whether the worker's attribute lists match the hidden attributes policy in ciphertext or not before the decryption. Experiment results and comprehensive comparisons show that our mechanism is more flexible, private, and scalable than existing schemes.
引用
收藏
页数:12
相关论文
共 50 条
  • [1] Security and Privacy in Smart Health: Efficient Policy-Hiding Attribute-Based Access Control
    Zhang, Yinghui
    Zheng, Dong
    Deng, Robert H.
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (03): : 2130 - 2145
  • [2] A Policy-Hiding Attribute-Based Access Control Scheme in Decentralized Trust Management
    Ruan, Conghao
    Hu, Chunqiang
    Zhao, Ruifeng
    Liu, Zewei
    Huang, Hongyu
    Yu, Jiguo
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (20) : 17656 - 17665
  • [3] Ciphertext Policy-Hiding Attribute-Based Encryption
    Yadav, Umesh Chandra
    Ali, Syed Taqi
    [J]. 2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2015, : 2067 - 2071
  • [4] Attribute-Based Access Control Policy Review in Permissioned Blockchain
    Lawal, Sherifdeen
    Krishnan, Ram
    [J]. SECURE KNOWLEDGE MANAGEMENT IN THE ARTIFICIAL INTELLIGENCE ERA, 2022, 1549 : 97 - 109
  • [5] Blockchain-Enabled decentralized Attribute-Based access control with policy hiding for smart healthcare
    Zhang, Yinghui
    Wei, Xuanni
    Cao, Jin
    Ning, Jianting
    Ying, Zuobin
    Zheng, Dong
    [J]. JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (10) : 8350 - 8361
  • [6] A Blockchain-Based Medical Data Sharing Mechanism with Attribute-Based Access Control and Privacy Protection
    Chen, Yingwen
    Meng, Linghang
    Zhou, Huan
    Xue, Guangtao
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
  • [7] Utilizing Policy Machine for Attribute-Based Access Control in Permissioned Blockchain
    Lawal, Sherifdeen
    Krishnan, Ram
    [J]. 2021 IEEE INTERNATIONAL CONFERENCE ON OMNI-LAYER INTELLIGENT SYSTEMS (IEEE COINS 2021), 2021, : 131 - 136
  • [8] Attribute Expressions, Policy Tables and Attribute-Based Access Control
    Crampton, Jason
    Williams, Conrad
    [J]. PROCEEDINGS OF THE 22ND ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT'17), 2017, : 79 - 90
  • [9] Using attribute-based access control to enable attribute-based messaging
    Bobba, Rakesh
    Fatemieh, Omid
    Khan, Fariba
    Gunter, Carl A.
    Khurana, Himanshu
    [J]. 22ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2006, : 403 - +
  • [10] Attribute-Based Access Control
    Hu, Vincent C.
    Kuhn, D. Richard
    Ferraiolo, David F.
    [J]. COMPUTER, 2015, 48 (02) : 85 - 88