Blockchain-based Access Control Mechanism for Big Data

被引:0
作者
Liu A.-D. [1 ,2 ]
Du X.-H. [1 ,2 ]
Wang N. [1 ,2 ]
Li S.-Z. [1 ,2 ]
机构
[1] Information Engineering University, Zhengzhou
[2] Henan Provincial Key Laboratory of Information Security, Zhengzhou
来源
Ruan Jian Xue Bao/Journal of Software | 2019年 / 30卷 / 09期
基金
中国国家自然科学基金;
关键词
ABAC model; Access control; Big data security; Blockchain; Smart contract;
D O I
10.13328/j.cnki.jos.005771
中图分类号
学科分类号
摘要
In terms of the wide source, large dynamics, and distributed management characteristics of big data resources, the current mainstream centralized access control mechanisms have shortcomings, such as low efficiency, insufficient flexibility, and poor scalability. Therefore, this study proposes a blockchain-based big data access control mechanism based on the ABAC model. First, in this paper, the fundamental principle of blockchain technology is described and the attribute-based access control model is formalized. Then, big data access control architecture is presented based on blockchain technology, and the basic framework and flow of access control are analyzed. At the same time, to ensure the access control information is tamper-resistant, auditability, and verifiability, the transaction-based access control policy and entity attribute information management methods are also described in detail. In addition, a smart contract-based access control method is used to implement user-driven, transparent, dynamic, and automated access control for big data resources. Finally, simulation experiments validate the effectiveness of this mechanism, and then the views presented in this paper are summarized and prospected. © Copyright 2019, Institute of Software, the Chinese Academy of Sciences. All rights reserved.
引用
收藏
页码:2636 / 2654
页数:18
相关论文
共 37 条
[1]  
Dimitrov D.V., Medical Internet of things and big data in healthcare, Healthc Inform Res, 22, 3, pp. 156-163, (2016)
[2]  
Zhou K., Fu C., Yang S., Big data driven smart energy management: From big data to big insights, Renewable & Sustainable Energy Reviews, 56, pp. 215-225, (2016)
[3]  
Cerchiello P., Giudici P., Big data analysis for financial risk management, Journal of Big Data, 3, 1, (2016)
[4]  
Feng D.G., Zhang M., Li H., Big data security and privacy protection, Chinese Journal of Computers, 37, 1, pp. 246-258, (2014)
[5]  
Sandhu R., The future of access control: Attributes, automation and adaptation, Proc. of the IEEE Int'l Conf. on Information Reuse and Integration, pp. xxiii-xxiv, (2013)
[6]  
Meng X.F., Ci X., Big data management: concepts, techniques and challenges, Journal of Computer Research and Development, 50, 1, pp. 146-169, (2013)
[7]  
Li H., Zhang M., Feng D.G., Hui Z., Research on access control of big data, Chinese Journal of Computers, 40, 1, pp. 72-91, (2017)
[8]  
Liu A.D., Du X.H., Wang N., Li S.Z., Survey on information security techniques for blockchain technology, Ruan Jian Xue Bao/Journal of Software, 29, 7, pp. 2092-2115, (2018)
[9]  
Yuan E., Tong J., Attributed based access control (ABAC) for Web services, Proc. of the IEEE Int'l Conf. on Web Services (ICWS 2005), pp. 561-569, (2005)
[10]  
Fang L., Yin L.H., Guo Y.C., Fang B.X., A survey of key technologies in attribute-based access control scheme, Chinese Journal of Computers, 40, 7, pp. 1680-1698, (2017)