Self sovereign and blockchain based access control: Supporting attributes privacy with zero knowledge

被引:17
作者
Maesa, Damiano Di Francesco [1 ]
Lisi, Andrea [1 ,2 ]
Mori, Paolo [2 ]
Ricci, Laura [1 ]
Boschi, Gianluca [3 ]
机构
[1] Univ Pisa, Dept Comp Sci, Largo Bruno Pontecorvo 3, I-56127 Pisa, Italy
[2] CNR, Inst Informat & Telemat, Via G Moruzzi 1, I-56124 Pisa, Italy
[3] Univ Pisa, Dept Engn, Via G Caruso 16, I-56122 Pisa, Italy
关键词
Access control; Blockchain; Privacy; Self Sovereign Identity; XACML; Zero-knowledge proofs;
D O I
10.1016/j.jnca.2022.103577
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Recent years have witnessed, especially in Europe, a shift aimed at bringing users back at the center of digital systems. This has driven innovation towards the affirmation of decentralized systems, in line with the Self Sovereign Identity paradigm. User control over the consumption and disclosure of their data is a key topic of such drive. In this paper we show how it is possible to apply this increasingly popular concept to a traditionally centralized and opaque digital process: Access Control systems. To this aim we expand the XACML standard for Attribute Based Access Control systems with the novel concept of private attributes, i.e. attributes whose values should not be disclosed while still contributing to a policy evaluation result after user consent. Basing our proposal on blockchain systems, we show how to leverage smart contracts and zero knowledge proofs to allow for transparent policies evaluation without disclosing the value of such sensible attributes. Beside formalizing our goals, presenting the system architecture, and discussing its advantages and drawbacks with respect to the traditional model, we provide a reference example to show our proposal innovative capabilities and provide a prototype experimental evaluation to prove its feasibility.
引用
收藏
页数:19
相关论文
共 64 条
[1]   Revocable and Offline-Verifiable Self-Sovereign Identities [J].
Abraham, Andreas ;
More, Stefan ;
Rabensteiner, Christof ;
Horandner, Felix .
2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, :1021-1028
[2]  
Atluri V., 2005, P 2005 ACM WORKSH PR, P40, DOI [10.1145/1102199.1102208, DOI 10.1145/1102199.1102208]
[3]  
Backes M, 2005, P 2005 ACM WORKSH PR, P40, DOI 10.1145/1102199.1102208
[4]   SSIBAC: Self-Sovereign Identity Based Access Control [J].
Belchior, Rafael ;
Putz, Benedikt ;
Pernul, Guenther ;
Correia, Miguel ;
Vasconcelos, Andre ;
Guerreiro, Sergio .
2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, :1935-1943
[5]  
Ben-Sasson E., 2018, Scalable, transparent, and post-quantum secure computational integrity
[6]  
Bitansky N., 2012, P 3 INN THEOR COMP S, P326, DOI 10.1145/ 2090236.2090263
[7]   NONINTERACTIVE ZERO-KNOWLEDGE [J].
BLUM, M ;
DESANTIS, A ;
MICALI, S ;
PERSIANO, G .
SIAM JOURNAL ON COMPUTING, 1991, 20 (06) :1084-1118
[8]  
Camenisch J, 2001, LECT NOTES COMPUT SC, V2045, P93
[9]  
Chadwick D., 2019, VERIFIABLE CREDENTIA
[10]   Efficient Zero-Knowledge Proof of Algebraic and Non-Algebraic Statements with Applications to Privacy Preserving Credentials [J].
Chase, Melissa ;
Ganesh, Chaya ;
Mohassel, Payman .
ADVANCES IN CRYPTOLOGY (CRYPTO 2016), PT III, 2016, 9816 :499-530