Privacy-Preserving Identity-Based Data Rights Governance for Blockchain-Empowered Human-Centric Metaverse Communications

被引:7
|
作者
Zhang, Chuan [1 ]
Zhao, Mingyang [1 ]
Zhang, Weiting [2 ]
Fan, Qing [1 ]
Ni, Jianbing [3 ]
Zhu, Liehuang [1 ]
机构
[1] Beijing Inst Technol, Sch Cyberspace Sci & Technol, Beijing 100081, Peoples R China
[2] Beijing Jiaotong Univ, Sch Elect & Informat Engn, Beijing 100044, Peoples R China
[3] Queens Univ, Dept Elect & Comp Engn, Kingston, ON, Canada
基金
中国国家自然科学基金;
关键词
Blockchains; Metaverse; Identity-based encryption; Public key; Medical services; Data models; Social networking (online); human-centric communication; blockchain; data rights governance; privacy preservation; ENCRYPTION; EFFICIENT;
D O I
10.1109/JSAC.2023.3345392
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Metaverse provides human-centric immersive communication experiences where humans can teleport across different virtual landscapes and build real-time communications via digital identities with others in the same landscape. Despite great benefits, a natural question in human-centric metaverse communications is how to secure digital content among humans. In this regard, blockchain has been widely applied due to its distinct features (e.g., decentralization, transparency, and immutability). Unfortunately, the inherent properties of the blockchain also hinder humans from further deploying preferences to flexibly govern the digital content (i.e., who can read and who can edit), limiting human-centric communication abilities. Some redactable blockchain-based solutions have been proposed, but most of them suffer from the issues of data and preference leakage. To address the issues, we propose a privacy-preserving identity-based data governance (IDRG) scheme for blockchain-empowered human-centric metaverse communications. Combining digital identities, IDRG cryptographically allows humans to govern readability and editability with the right downward compatibility (i.e., humans with editability are endowed with readability) while protecting policy privacy. Specifically, IDRG leverages the polynomial function technique to break through the bottleneck of the traditional identity-based encryption technique (i.e., a policy only contains a user) to achieve a policy for multiple users. Subsequently, the optimized policies are utilized to enrich chameleon hash-based redactable blockchains for comprehensive rights governance. Further, IDRG supports user accountability and revocation by combining the proxy re-encryption technique. Security analysis proves the security of IDRG under the chosen-ciphertext attack. Experiments on the FISCO blockchain platform demonstrate that IDRG requires approximately 0.1 s to process an encryption request, 0.01 s for a reading request, and 1 s for an editing request. Overall, IDRG achieves a 3x reduction in computational costs compared with state-of-the-art solutions.
引用
收藏
页码:963 / 977
页数:15
相关论文
共 50 条
  • [21] A privacy-preserving data aggregation system based on blockchain in VANET
    Yang, Ruicheng
    Dong, Guofang
    Xu, Zhengnan
    Ning, Juangui
    Du, Jianming
    BLOCKCHAIN-RESEARCH AND APPLICATIONS, 2024, 5 (03):
  • [22] Data privacy-preserving distributed knowledge discovery based on the blockchain
    Lee, Keon Myung
    Ra, Ilkyeun
    INFORMATION TECHNOLOGY & MANAGEMENT, 2020, 21 (04): : 191 - 204
  • [23] Data privacy-preserving distributed knowledge discovery based on the blockchain
    Keon Myung Lee
    Ilkyeun Ra
    Information Technology and Management, 2020, 21 : 191 - 204
  • [24] Privacy-Preserving Data Mining on Blockchain-Based WSNs
    Hrovatin, Niki
    Tosic, Aleksandar
    Mrissa, Michael
    Kavsek, Branko
    APPLIED SCIENCES-BASEL, 2022, 12 (11):
  • [25] PPADT: Privacy-Preserving Identity-Based Public Auditing With Efficient Data Transfer for Cloud-Based IoT Data
    Gai, Chao
    Shen, Wenting
    Yang, Ming
    Yu, Jia
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (22) : 20065 - 20079
  • [26] An Efficient and Secure Identity-based Conditional Privacy-Preserving Authentication Scheme in VANETs
    Wang, Xianglong
    Chen, Qiuting
    Peng, Zhenwan
    Wang, Yimin
    International Journal of Network Security, 2022, 24 (04) : 661 - 670
  • [27] On the Challenges in Designing Identity-Based Privacy-Preserving Authentication Schemes for Mobile Devices
    Wang, Ding
    Cheng, Haibo
    He, Debiao
    Wang, Ping
    IEEE SYSTEMS JOURNAL, 2018, 12 (01): : 916 - 925
  • [28] A Privacy-Preserving and Identity-Based Personalized Recommendation Scheme for Encrypted Tasks in Crowdsourcing
    Yin, Hui
    Xiong, Yinqiao
    Deng, Tiantian
    Deng, Hua
    Zhu, Peidong
    IEEE ACCESS, 2019, 7 : 138857 - 138871
  • [29] Blockchain-Aided and Privacy-Preserving Data Governance in Multi-Stakeholder Applications
    Garcia, Rodrigo Dutra
    Ramachandran, Gowri Sankar
    Jurdak, Raja
    Ueyama, Jo
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2022, 19 (04): : 3781 - 3793
  • [30] MetaCIDS: Privacy-Preserving Collaborative Intrusion Detection for Metaverse based on Blockchain and Online Federated Learning
    Truong, Vu Tuan
    Le, Long Bao
    IEEE OPEN JOURNAL OF THE COMPUTER SOCIETY, 2023, 4 : 253 - 266