Ciphertext policy hidden access control scheme based on blockchain and supporting data sharing

被引:0
作者
Du, Ruizhong [1 ,2 ]
Zhang, Tianhe [1 ]
Shi, Pengliang [1 ,2 ]
机构
[1] School of Cyber Security and Computer, Hebei University, Baoding
[2] Key Lab on High Trusted Information System in Hebei Province, Baoding
来源
Tongxin Xuebao/Journal on Communications | 2022年 / 43卷 / 06期
基金
中国国家自然科学基金;
关键词
attribute revocation; attribute-based encryption; blockchain; data sharing; policy hidden;
D O I
10.11959/j.issn.1000-436x.2022119
中图分类号
学科分类号
摘要
Although the traditional attribute-based encryption scheme achieves one-to-many access control, there were still challenges such as single point of failure, low efficiency, non-support for data sharing, and privacy leakage. In response to the above problems, a ciphertext policy hidden access control scheme based on blockchain and supporting data sharing was proposed. The prime order bilinear group and the AND-gates on+/− were used to achieve fine-grained access control while avoiding the leakage of user attribute values. Ethereum and interplanetary file system were combined to solve the problem of user attribute revocation and the single point of failure problem in the cloud storage model, and data sharing was realized through proxy re-encryption. Based on the assumption of difficult problems, the safety of the scheme was proved, and the simulation experiment results show that the proposed scheme has high efficiency while implementing policy hiding. © 2022 Editorial Board of Journal on Communications. All rights reserved.
引用
收藏
页码:168 / 178
页数:10
相关论文
共 20 条
[1]  
BERTRAND Y, BOUDAOUD K, RIVEILL M., What do you think about your company’s leaks? A survey on end-users perception toward data leakage mechanisms, Frontiers in Big Data, 8, (2020)
[2]  
BETHENCOURT J, SAHAI A, WATERS B., Ciphertext-policy attribute-based encryption, Proceedings of 2007 IEEE Symposium on Security and Privacy, pp. 321-334, (2007)
[3]  
BUTUN I, OSTERBERG P., A review of distributed access control for blockchain systems towards securing the Internet of things, IEEE Access, 9, pp. 5428-5441, (2021)
[4]  
XU G W, LI H W, DAI Y S, Et al., Enabling efficient and geometric range query with access control over encrypted spatial data, IEEE Transactions on Information Forensics and Security, 14, 4, pp. 870-885, (2019)
[5]  
BOURAS M A, XIA B M, ABUASSBA A O, Et al., IoT-CCAC: a blockchain-based consortium capability access control approach for IoT, PeerJ Computer Science, 7, (2021)
[6]  
SHAFEEQ S, ALAM M, KHAN A., Privacy aware decentralized access control system, Future Generation Computer Systems, 101, pp. 420-433, (2019)
[7]  
ZHANG Y C, LI J G, YAN H., Constant size ciphertext distributed CP-ABE scheme with privacy protection and fully hiding access structure, IEEE Access, 7, pp. 47982-47990, (2019)
[8]  
YU J X, HE G H, YAN X X, Et al., Outsourced ciphertext-policy attribute-based encryption with partial policy hidden, Information Security and Cryptology, pp. 448-467, (2019)
[9]  
SAINI A, ZHU Q Y, SINGH N, Et al., A smart-contract-based access control framework for cloud smart healthcare system, IEEE Internet of Things Journal, 8, 7, pp. 5914-5925, (2021)
[10]  
ZHANG Y Y, YUTAKA M, SASABE M, Et al., Attribute-based access control for smart cities: a smart-contract-driven framework, IEEE Internet of Things Journal, 8, 8, pp. 6372-6384, (2021)