A blockchain-based publicly verifiable data access control scheme without pairing

被引:0
作者
Wang, Kun [1 ]
Wu, Qianhong [1 ]
Han, Tianxu [1 ]
Luo, Decun [1 ]
Deng, Hua [2 ]
Qin, Bo [3 ]
Fan, Jialiang [1 ]
Zhang, Yingmiao [1 ]
机构
[1] Beihang Univ, 37 Xueyuan Rd, Beijing 100191, Peoples R China
[2] Changsha Univ, 98 Hongshan Rd, Changsha 410022, Hunan, Peoples R China
[3] Renmin Univ China, 59 Zhongguancun Rd, Beijing 100872, Peoples R China
基金
国家重点研发计划;
关键词
Blockchain; Decentralized storage; Access control; Proxy reencryption; Layer two;
D O I
10.1016/j.compeleceng.2024.109724
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The stability of Web 3.0 depends on the existence of a robust decentralized storage infrastructure. One challenge associated with decentralized storage is access control in the context of data outsourcing. Many solutions to this problem have been proposed, but there still exist limitations. For instance, the implementation of an access control algorithm may consume a considerable amount of computing resources, necessitate reliance on a centralized storage service provider, and fail to effectively arbitrate against malicious behaviors. To address the these problems, we innovatively propose a Publicly Verifiable Data Access Control (PVDAC) algorithm without bilinear pairing to reduce the computational overhead and provide an efficient arbitration method. We extend the blockchain with a layer two network to reduce the token consumption associated with on-chain operations. We analyzed the security of the scheme, proved that it meets the CCA security of the ciphertext, and conducted comprehensive experiments to evaluate its performance. The results show that the proposed PVDAC scheme achieves low computational consumption by costing only 1% to 10% of the token consumption for interaction with the main chain, and meanwhile, supports public verification.
引用
收藏
页数:17
相关论文
共 30 条
  • [1] A hybrid blockchain method in internet of things for privacy and security in unmanned aerial vehicles network
    Abualsauod, Emad H.
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2022, 99
  • [2] GDPR compliance verification through a user-centric blockchain approach in multi-cloud environment
    Ahmad, Haris
    Aujla, Gagangeet Singh
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2023, 109
  • [3] Ciphertext-policy attribute-based encryption
    Bethencourt, John
    Sahai, Amit
    Waters, Brent
    [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +
  • [4] Blaze M, 1998, LECT NOTES COMPUT SC, V1403, P127, DOI 10.1007/BFb0054122
  • [5] Canetti R, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P185
  • [6] Chow SSM, 2010, LECT NOTES COMPUT SC, V6055, P316
  • [7] David R., 2018, The digitization of the world: from edge to core
  • [8] Flexible attribute-based proxy re-encryption for efficient data sharing
    Deng, Hua
    Qin, Zheng
    Wu, Qianhong
    Guan, Zhenyu
    Zhou, Yunya
    [J]. INFORMATION SCIENCES, 2020, 511 (511) : 94 - 113
  • [9] Deng RH, 2008, LECT NOTES COMPUT SC, V5339, P1, DOI 10.1007/978-3-540-89641-8_1
  • [10] Goyal V., 2006, P 2006 INT C PRIVACY, P1