Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3424978.3425019acmotherconferencesArticle/Chapter ViewAbstractPublication PagescsaeConference Proceedingsconference-collections
research-article

Attribute Revocable Data Sharing Scheme Based on Blockchain and CP-ABE

Published: 20 October 2020 Publication History

Abstract

Data sharing and exchange is an effective way to release the vitality and value of data resources, but it also brings security problems, especially in the distributed environment. In this paper, a data sharing scheme based on blockchain, smart contract and attribute-based encryption is proposed, which supports attribute level user authority revocation, and is suitable for the privilege management of data sharing in distributed environment. Firstly, the model of data sharing and exchange is given; secondly, the operation of data sharing and exchange is defined; finally, implementation by smart contract is given and an experiment is carried out. The results show that the scheme can effectively solve the problem of data access authorization and revocation in distributed environment. In this scheme, we introduce the trusted third party as the key management center to generate, encrypt and decrypt the key, thus reducing the pressure on the client.

References

[1]
Ffoulkes P (2017). The Intelligent Use of Big Data on an Industrial Scale[M]. inside Bigdata. https://insidebigdata.com/white-paper/guide-big-data-industrial-scale/; Hewlett Packard Enterprise.
[2]
Zhang S, Niu L and Chen J (2012). The Comparative Analysis of Main Access Control Technologies[J]. Physics Procedia, 33(2012), 1208--11.
[3]
Sandhu R and Samarati P (1994). Access control: principle and practice[ J]. IEEE Communications Magazine, 32(9), 40--8.
[4]
Samarati P and Vimercati S D C D F (2000). Access Control: Policies, Models, and Mechanisms. Proceedings of the Revised Versions of Lectures Given During the Ifip Wg 17 International School on Foundations of Security Analysis & Design on Foundations of Security Analysis & Design: Tutorial Lectures.
[5]
Association N C S (1987). A Guide to Understanding Discretionary Access Control in Trusted Systems[J]. 1--31.
[6]
Moffett J, Sloman M and Twidle K (1990). Specifying discretionary access control policy for distributed systems[J]. Computer Communications, 13(9), 571--80.
[7]
Wang M Y and Su C P (2011). Secure, Scalable, and Fine-grained Data Access Control Achieving in Cloud Computing[J]. 534--42.
[8]
Downs D D, Rub J R, Kung K C and Jordan C S F (1985). Issues in Discretionary Access Control; proceedings of the ieee symposium on security and privacy.
[9]
Jiang Y, Lin C, Hao Y and Tan Z F (2004). Security analysis of mandatory access control model. Proceedings of the IEEE International Conference on Systems.
[10]
Sandhu R, Coyne E J, Feinstein H L and Youman C E (1996). Role-based access control models[J]. IEEE Computer, 29(2), 38--47.
[11]
Osborn S, Sandhu R and Munawer Q (2000). Configuring role-based access control to enforce mandatory and discretionary access control policies[J]. Acm Transactions on Information & System Security, 3(2), 85--106.
[12]
Sahai A and Waters B F (2005). Fuzzy identity-based encryption. Proceedings of the theory and application of cryptographic techniques.
[13]
Goyal V, Pandey O, Sahai A and Waters B F (2006). Attribute-based encryption for fine-grained access control of encrypted data. Proceedings of the computer and communications security.
[14]
Bethencourt J, Sahai A and Waters B F (2007). Ciphertext-Policy Attribute-Based Encryption; proceedings of the ieee symposium on security and privacy.
[15]
Hu V C, Ferraiol D, Kuhn R, Schnitzer A, Sandlin K, et al. (2014). Guide to Attribute Based Access Control (ABAC) Definition and Considerations[J]. 1--47.
[16]
Zou J S, Zhang Y S and Gao Y (2014). Research on ABAC mechanism based on improved cp-abe algorithm[J]. Computer application research, 31(06), 1860--2.
[17]
Liu P, He Q, Liu W Y and Cheng X (2020). CP-ABE scheme supporting revocation attribute and outsourcing decryption[ J]. Information network security, 20(03), 90--7.
[18]
Shangping W, Yinglong Z and Yaling Z (2018). A Blockchain-Based Framework for Data Sharing with Fine-grained Access Control in Decentralized Storage Systems[ J]. IEEE Access, 38437--50.
[19]
Liu J, Li X, Ye L, Zhang H, Du X, et al. (2019). BPDS: A Blockchain Based Privacy-Preserving Data Sharing for Electronic Medical Records. Proceedings of the 2018 IEEE Global Communications Conference (GLOBECOM).
[20]
Huang S, Chen L W and Fan B B (2019). Data security sharing method based on AP-ABE and blockchain[J]. Computer System Application, 28(11), 79--86.
[21]
Boldyreva A, Goyal V and Kumar V (2008). Identity-based encryption with efficient revocation[M]. Proceedings of the 15th ACM conference on Computer and communications security. Alexandria, Virginia, USA; Association for Computing Machinery, 417--26.
[22]
Maesa D D F, Paolo M and Laura R (2017). Distributed Access Control through Blockchain Technology[J]. Ercim News.
[23]
Zhang Y, He D and Choo K R (2018). BaDS: Blockchain-Based Architecture for Data Sharing with ABS and CP-ABE in IoT[J]. Wireless Communications and Mobile Computing, 1--9.
[24]
Nakamoto S (2008). Bitcoin: A peer-to-peer electronic cash system[J].
[25]
Christidis K and Devetsikiotis M (2016). Blockchains and Smart Contracts for the Internet of Things[J]. IEEE Access, 2292--303.
[26]
Szabo N F (2018). Smart Contracts: Building Blocks for Digital Markets.
[27]
Sadiku M N O and Eze G F (2018). Smart Contracts: A Primer.
[28]
Shao Q F, Jin C Q, Zhang Z, Qian W N and Zhou A Y (2018). Blockchain Technology: Architecture and progress[J]. Journal of Computer Science, v. 41, No. 425(5), 3--22.

Cited By

View all
  • (2024)Decentralized CP-ABE Scheme for Enhanced University Data Security Using BlockchainJournal of Circuits, Systems and Computers10.1142/S0218126625500756Online publication date: 26-Oct-2024
  • (2024)An Efficient Blockchain-Based Access Control Framework for IoT-Healthcare SystemWireless Personal Communications10.1007/s11277-024-11312-y136:2(1017-1045)Online publication date: 25-Jun-2024
  • (2023)Improved CP-ABE Algorithm Based on Identity and Access Control2023 5th International Academic Exchange Conference on Science and Technology Innovation (IAECST)10.1109/IAECST60924.2023.10503198(482-487)Online publication date: 8-Dec-2023
  • Show More Cited By

Index Terms

  1. Attribute Revocable Data Sharing Scheme Based on Blockchain and CP-ABE

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    CSAE '20: Proceedings of the 4th International Conference on Computer Science and Application Engineering
    October 2020
    1038 pages
    ISBN:9781450377720
    DOI:10.1145/3424978
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 20 October 2020

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Attribute based encryption system
    2. Blockchain
    3. Data sharing
    4. Smart contract

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    CSAE 2020

    Acceptance Rates

    CSAE '20 Paper Acceptance Rate 179 of 387 submissions, 46%;
    Overall Acceptance Rate 368 of 770 submissions, 48%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)37
    • Downloads (Last 6 weeks)5
    Reflects downloads up to 27 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Decentralized CP-ABE Scheme for Enhanced University Data Security Using BlockchainJournal of Circuits, Systems and Computers10.1142/S0218126625500756Online publication date: 26-Oct-2024
    • (2024)An Efficient Blockchain-Based Access Control Framework for IoT-Healthcare SystemWireless Personal Communications10.1007/s11277-024-11312-y136:2(1017-1045)Online publication date: 25-Jun-2024
    • (2023)Improved CP-ABE Algorithm Based on Identity and Access Control2023 5th International Academic Exchange Conference on Science and Technology Innovation (IAECST)10.1109/IAECST60924.2023.10503198(482-487)Online publication date: 8-Dec-2023
    • (2023)Efficient hybrid centralized and blockchain-based authentication architecture for heterogeneous IoT systemsJournal of King Saud University - Computer and Information Sciences10.1016/j.jksuci.2023.01.01135:2(726-739)Online publication date: 1-Feb-2023
    • (2023)Enabling privacy-preserving multi-server collaborative search in smart healthcareFuture Generation Computer Systems10.1016/j.future.2023.01.025143:C(265-276)Online publication date: 1-Jun-2023
    • (2023)A Robust Remote User Authentication Scheme for Supply Chain Management Using Blockchain TechnologyData Science and Network Engineering10.1007/978-981-99-6755-1_38(499-510)Online publication date: 3-Nov-2023
    • (2023)Research on the Update Method of CP-ABE Access Control Strategy Based on Smart ContractCollaborative Computing: Networking, Applications and Worksharing10.1007/978-3-031-24383-7_27(494-513)Online publication date: 25-Jan-2023
    • (2022)An Efficient Ciphertext-Policy Attribute-Based Encryption Scheme Supporting Collaborative Decryption With BlockchainIEEE Internet of Things Journal10.1109/JIOT.2021.30991719:4(2722-2733)Online publication date: 15-Feb-2022
    • (2022)Auditable attribute-based data access control using blockchain in cloud storageThe Journal of Supercomputing10.1007/s11227-021-04293-378:8(10772-10798)Online publication date: 1-May-2022
    • (2022)Blockchain-based cloud storage system with CP-ABE-based access control and revocation processThe Journal of Supercomputing10.1007/s11227-021-04179-478:6(7700-7728)Online publication date: 1-Apr-2022

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media