Blockchain-based privacy-preserving data-sharing framework using proxy re-encryption scheme and interplanetary file system

被引:6
作者
Lou, Jhong-Ting [1 ]
Bhat, Showkat Ahmad [2 ]
Huang, Nen-Fu [1 ]
机构
[1] Natl Tsing Hua Univ, Dept Comp Sci, Hsinchu 1300044, Taiwan
[2] Natl Tsing Hua Univ, Coll Elect Engn & Comp Sci, Hsinchu 1300044, Taiwan
关键词
Blockchain; Data sharing; Privacy; Proxy re-encryption; Access control; Distributed file system; Food traceability; Smart farm; SECURITY; CHALLENGES; 5G;
D O I
10.1007/s12083-023-01529-2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Through the use of Ethereum, a framework is designed to simplify data exchange mechanism, improve food traceability, and improve privacy. A supply chain management system for agriculture is proposed and implemented in this paper to meet the confidentiality requirements of sensitive data and data ownership requirements. In a public blockchain environment, users can transparently verify every block generated at runtime and easily access data hosted on shared storage without authorization. To improve key distribution efficiency, we developed a proxy re-encryption scheme to manage the symmetric keys of encrypted data on shared storage. Blockchain services should improve the availability of persistent data. The interplanetary File System is used as a storage backend and to provide a file-based database that combined IPFS and a blockchain. Access control is a necessary function in the framework of multi-user data exchange. Users can manage permissions based on any data set in the Access Control List model using smart contracts that are defined by data owners. Finally, we demonstrate the system by developing a management application and integrating it into an existing food traceability system with a decoupled architecture. This demonstrates the system's ability to adapt to open data services while establishing a reliable hybrid architecture.
引用
收藏
页码:2415 / 2437
页数:23
相关论文
共 55 条
[1]  
Albertini A, 2022, 31 USENIX SEC S USEN, P3291
[2]  
Alizadeh F, 2019, P MENSCH COMPUTER 20, P811, DOI DOI 10.1145/3340764.3344913
[3]   Blockchain Vulnerabilities in Practice [J].
Amiet, Nils .
DIGITAL THREATS: RESEARCH AND PRACTICE, 2021, 2 (02)
[4]  
Ateniese G., 2006, ACM Transactions on Information and Systems Security, V9, P1, DOI 10.1145/1127345.1127346
[5]   Making Smart Contracts Predict and Scale [J].
Badruddoja, Syed ;
Dantu, Ram ;
He, Yanyan ;
Thompson, Mark ;
Salau, Abiola ;
Upadhyay, Kritagya .
2022 FOURTH INTERNATIONAL CONFERENCE ON BLOCKCHAIN COMPUTING AND APPLICATIONS (BCCA), 2022, :127-134
[6]  
Barinov I, 2019, PROOF STAKE DECENTRA
[7]  
Ben-Sasson E, 2014, PROCEEDINGS OF THE 23RD USENIX SECURITY SYMPOSIUM, P781
[8]  
Benet J., 2014, CoRR
[9]  
Bhat SA, 2022, AGRICULTURE-BASEL, V12, DOI [10.9734/ajrcs/2021/v6i430125, 10.3390/agriculture12010040]
[10]   Edge Computing and Its Convergence With Blockchain in 5G and Beyond: Security, Challenges, and Opportunities [J].
Bhat, Showkat Ahmad ;
Sofi, Ishfaq Bashir ;
Chi, Chong-Yung .
IEEE ACCESS, 2020, 8 :205340-205373