A blockchain-based privacy-preserving auditable authentication scheme with hierarchical access control for mobile cloud computing

被引:10
作者
Zhang, Yin [1 ]
Xiong, Ling [1 ]
Li, Fagen [2 ]
Niu, Xianhua [1 ]
Wu, Hanzhou [3 ]
机构
[1] Xihua Univ, Sch Comp & Software Engn, Chengdu 610039, Peoples R China
[2] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 611731, Peoples R China
[3] Shanghai Univ, Sch Commun & Informat Engn, Shanghai 200444, Peoples R China
基金
中国国家自然科学基金;
关键词
Blockchain; Privacy; Authentication; Access control; Auditability; CONTROL FRAMEWORK; INTERNET;
D O I
10.1016/j.sysarc.2023.102949
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Blockchain-based authentication mode, a fundamental solution to prevent unauthorized access behavior, gradually becomes a focus in future distributed mobile cloud computing (MCC) services. However, due to the transparent and immutable characteristics of blockchain, users' access behaviors are facing huge security and privacy threats. Storing the encrypted data on chain is an effective way to address these issues, but access permission confirmation and update in the form of ciphertext is the main bottleneck. To this end, this paper proposes a blockchain-based unified authentication and hierarchical access control scheme for the MCC environment, which provides both privacy protection and auditability. In the proposed scheme, users can access multiple MCC services with different access permissions using a single credential. To protect the privacy of both users and service providers, while still supporting auditability, the data on the public ledger is blinded using Pedersen commitments. Besides, the proposed scheme provides flexible dynamic updating in encrypted form. Theoretical analysis indicates that the proposed scheme can meet various security and privacy requirements in the MCC environment. Compared with related schemes, it has better communication efficiency. Therefore, the proposed scheme is more suitable for the actual MCC environment.
引用
收藏
页数:12
相关论文
共 35 条
[1]   Blockchain based permission delegation and access control in Internet of Things (BACI) [J].
Ali, Gauhar ;
Ahmad, Naveed ;
Cao, Yue ;
Asif, Muhammad ;
Cruickshank, Haitham ;
Ali, Qazi Ejaz .
COMPUTERS & SECURITY, 2019, 86 :318-334
[2]   Authentication in mobile cloud computing: A survey [J].
Alizadeh, Mojtaba ;
Abolfazli, Saeid ;
Zamani, Mazdak ;
Baharun, Sabariah ;
Sakurai, Kouichi .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 61 :59-80
[3]   Zerocash: Decentralized Anonymous Payments from Bitcoin [J].
Ben-Sasson, Eli ;
Chiesa, Alessandro ;
Garmant, Christina ;
Green, Matthew ;
Miers, Ian ;
Tromer, Eran ;
Virza, Madars .
2014 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2014), 2014, :459-474
[4]  
Brook J.-M., 2022, Top Threats to Cloud Computing Pandemic Eleven
[5]  
Camenisch J., 1998, THESIS
[6]   Blockchain-driven authorized data access mechanism for digital healthcare [J].
Chhikara, Deepak ;
Rana, Saurabh ;
Mishra, Ankita ;
Mishra, Dheerendra .
JOURNAL OF SYSTEMS ARCHITECTURE, 2022, 131
[7]   BSAF: A blockchain-based secure access framework with privacy protection for cloud-device service collaborations [J].
Duan, Li ;
Xu, Wenyao ;
Ni, Wei ;
Wang, Wei .
JOURNAL OF SYSTEMS ARCHITECTURE, 2023, 140
[8]   Blockchain-based authentication and authorization for smart city applications [J].
Esposito, Christian ;
Ficco, Massimo ;
Gupta, Brij Bhooshan .
INFORMATION PROCESSING & MANAGEMENT, 2021, 58 (02)
[9]   HOW TO PROVE YOURSELF - PRACTICAL SOLUTIONS TO IDENTIFICATION AND SIGNATURE PROBLEMS [J].
FIAT, A ;
SHAMIR, A .
LECTURE NOTES IN COMPUTER SCIENCE, 1987, 263 :186-194
[10]  
Gai K., 2022, ACM Transactions on Internet Technology (TOIT)