Blockchain-Enabled Data Secure Sharing with Privacy Protection Based on Proxy Re-Encryption in Web3.0 Applications

被引:0
作者
Ma, Jiawei [1 ]
Zhou, Haojie [3 ]
Wang, Sidie [2 ]
Song, Jiyuan [2 ]
Tian, Tian [2 ]
机构
[1] Beijing Univ Posts & Telecommun, Int Sch, Beijing 100876, Peoples R China
[2] Beijing Univ Posts & Telecommun, Sch Cyberspace Secur, Beijing 100876, Peoples R China
[3] Beijing Univ Posts & Telecommun, Grad Coll Engineers, Beijing 100876, Peoples R China
基金
中国国家自然科学基金; 北京市自然科学基金;
关键词
blockchain; data sharing; privacy protec-tion; proxy re-encryption; web3.0;
D O I
10.23919/JCC.fa.2024-0597.202505
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
With the rapid development of web3.0 applications, the volume of data sharing is increasing, the inefficiency of big data file sharing and the problem of data privacy leakage are becoming more and more prominent, and the existing data sharing schemes have been difficult to meet the growing demand for data sharing, this paper aims at exploring a secure, efficient and privacy-protecting data sharing scheme under web3.0 applications. Specifically, this paper adopts interplanetary file system (IPFS) technology to realize the storage of large data files to solve the problem of blockchain storage capacity limitation, and utilizes ciphertext policy attribute-based encryption (CP-ABE) and proxy re-encryption (PRE) technology to realize secure multi-party sharing and finegrained access control of data. This paper provides the detailed algorithm design and implementation of data sharing phases and processes, and analyzes the algorithms from the perspectives of security, privacy protection, and performance.
引用
收藏
页码:256 / 272
页数:17
相关论文
共 31 条
[1]   A Proxy Re-Encryption Approach to Secure Data Sharing in the Internet of Things Based on Blockchain [J].
Agyekum, Kwame Opuni-Boachie Obour ;
Xia, Qi ;
Sifah, Emmanuel Boateng ;
Cobblah, Christian Nii Aflah ;
Xia, Hu ;
Gao, Jianbin .
IEEE SYSTEMS JOURNAL, 2022, 16 (01) :1685-1696
[2]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[3]  
Blaze M, 1998, LECT NOTES COMPUT SC, V1403, P127, DOI 10.1007/BFb0054122
[4]  
Chen JW, 2014, IEEE ICC, P3782, DOI 10.1109/ICC.2014.6883910
[5]   Blockchain-enabled supervised secure data sharing and delegation scheme in Web3.0 [J].
Gao, Hongmin ;
Duan, Pengfei ;
Pan, Xiaofeng ;
Zhang, Xiaojing ;
Ye, Keke ;
Zhong, Ziyuan .
JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2024, 13 (01)
[6]  
Green M., 2011, USENIX Security Symposium
[7]   Accountable Proxy Re-Encryption for Secure Data Sharing [J].
Guo, Hui ;
Zhang, Zhenfeng ;
Xu, Jing ;
An, Ningyu ;
Lan, Xiao .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (01) :145-159
[8]  
Guo S., 2024, IET Blockchain
[9]   Improving Security and Efficiency in Attribute-Based Data Sharing [J].
Hur, Junbeom .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2013, 25 (10) :2271-2282
[10]   Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems [J].
Hur, Junbeom ;
Noh, Dong Kun .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2011, 22 (07) :1214-1221