Blockchain-based and multi-authority hierarchical access control data sharing scheme

被引:1
作者
Du, Jianming
Dong, Guofang [1 ]
Ning, Juangui
Xu, Zhengnan
Yang, Ruicheng
机构
[1] Yunnan Minzu Univ, Sch Elect & Informat Technol, Kunming 650504, Peoples R China
基金
中国国家自然科学基金;
关键词
Access control; Blockchain; CP-ABE; Data sharing; Multi-authority; ATTRIBUTE-BASED ENCRYPTION;
D O I
10.1016/j.compeleceng.2024.109547
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
As cloud computing technology advances, the demand for data sharing through cloud platforms is increasing. However, existing approaches suffer from limitations in granularity and flexibility. Ciphertext Policy Attribute-Based Encryption (CP-ABE) is commonly used for access control, but single-authority systems pose a risk of single point of failure. To address these challenges, we propose a blockchain-based and multi-authority CP-ABE hierarchical access control method. This approach provides precise control over data access through hierarchical access control and mitigates risks by introducing multiple authorities. Additionally, blockchain technology ensures secure and reliable documentation of access control procedures, enhancing system security and credibility. We formally prove the security of the proposed method and evaluate its performance through simulated experiments. The results demonstrate efficient data sharing, access management, and data security.
引用
收藏
页数:17
相关论文
共 25 条
[1]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[2]   TrustAccess: A Trustworthy Secure Ciphertext-Policy and Attribute Hiding Access Control Scheme Based on Blockchain [J].
Gao, Sheng ;
Piao, Guirong ;
Zhu, Jianming ;
Ma, Xindi ;
Ma, Jianfeng .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (06) :5784-5798
[3]   An enhanced traceable CP-ABE scheme against various types of privilege leakage in cloud storage [J].
He, Xu ;
Li, Lixiang ;
Peng, Haipeng .
JOURNAL OF SYSTEMS ARCHITECTURE, 2023, 136
[4]   An Efficient Ciphertext-Policy Attribute-Based Encryption Scheme Supporting Collaborative Decryption With Blockchain [J].
He, Ying ;
Wang, Haiyan ;
Li, Yuan ;
Huang, Ke ;
Leung, Victor C. M. ;
Yu, F. Richard ;
Ming, Zhong .
IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (04) :2722-2733
[5]   Attribute-Based Encryption With Blockchain Protection Scheme for Electronic Health Records [J].
Jiang, Yu ;
Xu, Xiaolong ;
Xiao, Fu .
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2022, 19 (04) :3884-3895
[6]   An Expressive Hidden Access Policy CP-ABE [J].
Khan, Fawad ;
Li, Hui ;
Zhang, Liangxuan ;
Shen, Jian .
2017 IEEE SECOND INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC), 2017, :178-186
[7]   Harnessing Policy Authenticity for Hidden Ciphertext Policy Attribute-Based Encryption [J].
Kim, Intae ;
Susilo, Willy ;
Baek, Joonsang ;
Kim, Jongkil .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (03) :1856-1870
[8]   Extended File Hierarchy Access Control Scheme with Attribute-Based Encryption in Cloud Computing [J].
Li, Jiguo ;
Chen, Ningyu ;
Zhang, Yichen .
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2021, 9 (02) :983-993
[9]   Online/Offline MA-CP-ABE with Cryptographic Reverse Firewalls for IoT [J].
Li, Juyan ;
Fan, Ye ;
Bian, Xuefen ;
Yuan, Qi .
ENTROPY, 2023, 25 (04)
[10]   TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage [J].
Li, Wei ;
Xue, Kaiping ;
Xue, Yingjie ;
Hong, Jianan .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2016, 27 (05) :1484-1496