Towards accountable and privacy-preserving blockchain-based access control for data sharing

被引:0
作者
Hu, Qiwei [1 ]
Huang, Chenyu [2 ]
Zhang, Guoqiang [1 ]
Cai, Lingyi [1 ]
Jiang, Tao [1 ]
机构
[1] Huazhong Univ Sci & Technol, Sch Cyber Sci & Engn, Res Ctr 6G Mobile Commun, Wuhan 430074, Peoples R China
[2] Tencent Technol Co Ltd, Shenzhen 518000, Peoples R China
关键词
Accountability; Anonymity; Attribute-based access control; Blockchain; Erasure coding; Zero knowledge proof; IOT;
D O I
10.1016/j.jisa.2024.103866
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The integration of blockchain technology with Access Control (AC) systems presents novel opportunities for enhancing data security within decentralized architectures, which is drawing increasing attention in Data Sharing (DS) applications. However, existing works reveal a gap in achieving accountability for anonymous access in the absence of a centralized trusted authority. To address this issue, this paper introduces InvisiReveal, a novel Blockchain-Based AC (BBAC) framework that achieves permission invisibility, access anonymity, and accountability without extra trust assumptions. Users in InvisiReveal generate anonymous credentials to authenticate their requests using Zero Knowledge Proof. To enable accountability, a novel blockchain-oriented verifiable commitment (BC-VC) protocol is designed that allows a user to commit a confidential traceable tag to the blockchain. The system could unveil a malicious requester's identity by opening the tag commitment under collaboration with the victim user and blockchain. We implement a prototype of InvisiReveal to evaluate its practicality, where an access request is verified within 5 ms.
引用
收藏
页数:9
相关论文
共 40 条
  • [1] Alhaddad N, 2021, Cryptol ePrint Arch
  • [2] alibabacloud, 2023, Elastic compute service: Overview of instance families
  • [3] Erasure coding for distributed storage: an overview
    Balaji, S. B.
    Krishnan, M. Nikhil
    Vajha, Myna
    Ramkumar, Vinayak
    Sasidharan, Birenjith
    Kumar, P. Vijay
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2018, 61 (10)
  • [4] A Group Signature Scheme With Selective Linkability and Traceability for Blockchain-Based Data Sharing Systems in E-Health Services
    Bao, Zijian
    He, Debiao
    Wang, Huaqun
    Luo, Min
    Peng, Cong
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (23) : 21115 - 21128
  • [5] State Machine Replication for the Masses with BFT-SMART
    Bessani, Alysson
    Sousa, Joao
    Alchieri, Eduardo E. P.
    [J]. 2014 44TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN), 2014, : 355 - 362
  • [6] Deep learning and medical image processing for coronavirus (COVID-19) pandemic: A survey
    Bhattacharya, Sweta
    Maddikunta, Praveen Kumar Reddy
    Pham, Quoc-Viet
    Gadekallu, Thippa Reddy
    Krishnan, S. Siva Rama
    Chowdhary, Chiranji Lal
    Alazab, Mamoun
    Piran, Md. Jalil
    [J]. SUSTAINABLE CITIES AND SOCIETY, 2021, 65
  • [7] Practical byzantine fault tolerance and proactive recovery
    Castro, M
    Liskov, B
    [J]. ACM TRANSACTIONS ON COMPUTER SYSTEMS, 2002, 20 (04): : 398 - 461
  • [8] 2D2PS: A demand-driven privacy-preserving scheme for anonymous data sharing in smart grids
    Chang, Yuan
    Li, Jiliang
    Li, Wenjuan
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 74
  • [9] A Survey on Ethereum Systems Security: Vulnerabilities, Attacks, and Defenses
    Chen, Huashan
    Pendleton, Marcus
    Njilla, Laurent
    Xu, Shouhuai
    [J]. ACM COMPUTING SURVEYS, 2020, 53 (03)
  • [10] Cong T, 2022, P ACM SIGSAC C COMP, DOI [10.1145/3548606.3559355, DOI 10.1145/3548606.3559355]