Blockchain-enabled supervised secure data sharing and delegation scheme in Web3.0

被引:7
作者
Gao, Hongmin [1 ]
Duan, Pengfei [2 ]
Pan, Xiaofeng [1 ]
Zhang, Xiaojing [1 ]
Ye, Keke [1 ]
Zhong, Ziyuan [1 ]
机构
[1] China Mobile Informat Technol Co Ltd, Beijing 100037, Peoples R China
[2] Beijing Univ Posts & Telecommun, Sch Cyberspace Secur, Beijing 100876, Peoples R China
来源
JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS | 2024年 / 13卷 / 01期
关键词
Web3.0; Decentralized data delegation; Fine-grained data sharing; Supervised;
D O I
10.1186/s13677-023-00575-8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Web3.0 represents the ongoing evolution of blockchain technology, placing a strong emphasis on establishing a decentralized and user-controlled Internet. Current data delegation solutions for Web3.0 predominantly rely on attribute-based encryption algorithms (ABE) but lack the essential capabilities for processing ciphertext. Additionally, the attribute-based ciphertext transformation algorithm (ABCT) falls short when it comes to verifying the transformed ciphertext provided by data proxies. The primary objective of this article is to design a fine-grained and supervised attribute-based data delegating solution tailored specifically for Web3.0. This scheme aims to enhance the ciphertext processing capabilities of existing data delegation solutions based on blockchain and ABE. Additionally, it addresses the current limitations of ABCT technology. This includes its inability to verify re-encrypted ciphertext and ensure non-repudiation of transformation results. We leverage smart contracts to ensure the automatic execution of the data delegation process and to store permanent records on the blockchain for auditing and traceability. This approach guarantees a fair distribution of interests among all stakeholders. Furthermore, we employ a commitment mechanism and digital signature to enhance the regulatory compliance of existing ABCT technology. We present a secure access control and supervised data delegation scheme for Web3.0 with blockchain along with its instantiation, emphasizing its fine-grained nature and verifiability. Finally, the evaluation results demonstrate its practicality and effectiveness.
引用
收藏
页数:14
相关论文
共 29 条
[1]   Charm: a framework for rapidly prototyping cryptosystems [J].
Akinyele, Joseph A. ;
Garman, Christina ;
Miers, Ian ;
Pagano, Matthew W. ;
Rushanan, Michael ;
Green, Matthew ;
Rubin, Aviel D. .
JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2013, 3 (02) :111-128
[2]  
Ateniese G., 2006, ACM Transactions on Information and Systems Security, V9, P1, DOI 10.1145/1127345.1127346
[3]  
Barua M., 2011, IEEE INFOCOM 2011 - IEEE Conference on Computer Communications. Workshops, P970, DOI 10.1109/INFCOMW.2011.5928953
[4]  
Benet J., 2014, PREPRINT
[5]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[6]  
Blaze M, 1998, LECT NOTES COMPUT SC, V1403, P127, DOI 10.1007/BFb0054122
[7]   Securing Patient-Centric Personal Health Records Sharing System in Cloud Computing [J].
Chen Danwei ;
Chen Linling ;
Fan Xiaowei ;
He Liwen ;
Pan Su ;
Hu Ruoxiang .
CHINA COMMUNICATIONS, 2014, 11 (01) :121-127
[8]  
Ge C., 2023, IEEE Trans. Dependable Secure Comput.
[9]   Secure Keyword Search and Data Sharing Mechanism for Cloud Computing [J].
Ge, Chunpeng ;
Susilo, Willy ;
Liu, Zhe ;
Xia, Jinyue ;
Szalachowski, Pawel ;
Fang Liming .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (06) :2787-2800
[10]   A Key-Policy Attribute-Based Proxy Re-Encryption Without Random Oracles [J].
Ge, Chunpeng ;
Susilo, Willy ;
Wang, Jiandong ;
Huang, Zhiqiu ;
Fang, Liming ;
Ren, Yongjun .
COMPUTER JOURNAL, 2016, 59 (07) :970-982