Self sovereign and blockchain based access control: Supporting attributes privacy with zero knowledge

被引:17
作者
Maesa, Damiano Di Francesco [1 ]
Lisi, Andrea [1 ,2 ]
Mori, Paolo [2 ]
Ricci, Laura [1 ]
Boschi, Gianluca [3 ]
机构
[1] Univ Pisa, Dept Comp Sci, Largo Bruno Pontecorvo 3, I-56127 Pisa, Italy
[2] CNR, Inst Informat & Telemat, Via G Moruzzi 1, I-56124 Pisa, Italy
[3] Univ Pisa, Dept Engn, Via G Caruso 16, I-56122 Pisa, Italy
关键词
Access control; Blockchain; Privacy; Self Sovereign Identity; XACML; Zero-knowledge proofs;
D O I
10.1016/j.jnca.2022.103577
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Recent years have witnessed, especially in Europe, a shift aimed at bringing users back at the center of digital systems. This has driven innovation towards the affirmation of decentralized systems, in line with the Self Sovereign Identity paradigm. User control over the consumption and disclosure of their data is a key topic of such drive. In this paper we show how it is possible to apply this increasingly popular concept to a traditionally centralized and opaque digital process: Access Control systems. To this aim we expand the XACML standard for Attribute Based Access Control systems with the novel concept of private attributes, i.e. attributes whose values should not be disclosed while still contributing to a policy evaluation result after user consent. Basing our proposal on blockchain systems, we show how to leverage smart contracts and zero knowledge proofs to allow for transparent policies evaluation without disclosing the value of such sensible attributes. Beside formalizing our goals, presenting the system architecture, and discussing its advantages and drawbacks with respect to the traditional model, we provide a reference example to show our proposal innovative capabilities and provide a prototype experimental evaluation to prove its feasibility.
引用
收藏
页数:19
相关论文
共 64 条
[11]   Selective Disclosure in Self-Sovereign Identity based on Hashed Values [J].
De Salve, Andrea ;
Lisi, Andrea ;
Mori, Paolo ;
Ricci, Laura .
2022 27TH IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (IEEE ISCC 2022), 2022,
[12]   Cinderella: Turning Shabby X.509 Certificates into Elegant Anonymous Credentials with the Magic of Verifiable Computation [J].
Delignat-Lavaud, Antoine ;
Fournet, Cedric ;
Kohlweiss, Markulf ;
Parno, Bryan .
2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2016, :235-254
[13]  
Di Francesco Maesa D., 2019, EC GRIDS CLOUDS SYST
[14]   A Novel Attribute-Based Access Control Scheme Using Blockchain for IoT [J].
Ding, Sheng ;
Cao, Jin ;
Li, Chen ;
Fan, Kai ;
Li, Hui .
IEEE ACCESS, 2019, 7 :38431-38441
[15]  
Djemame K., LECT NOTES COMPUT SC, P3, DOI [10.1007/978-3-030-36027-6_1, DOI 10.1007/978-3-030-36027-6_1]
[16]   ZoKrates - Scalable Privacy-Preserving Off-Chain Computations [J].
Eberhardt, Jacob ;
Tai, Stefan .
IEEE 2018 INTERNATIONAL CONGRESS ON CYBERMATICS / 2018 IEEE CONFERENCES ON INTERNET OF THINGS, GREEN COMPUTING AND COMMUNICATIONS, CYBER, PHYSICAL AND SOCIAL COMPUTING, SMART DATA, BLOCKCHAIN, COMPUTER AND INFORMATION TECHNOLOGY, 2018, :1084-1091
[17]   On or Off the Blockchain? Insights on Off-Chaining Computation and Data [J].
Eberhardt, Jacob ;
Tai, Stefan .
SERVICE-ORIENTED AND CLOUD COMPUTING (ESOCC 2017), 2017, 10465 :3-15
[18]   An offline mobile access control system based on self-sovereign identity standards [J].
Enge, Alexander ;
Satybaldy, Abylay ;
Nowostawski, Mariusz .
COMPUTER NETWORKS, 2022, 219
[19]  
EOSIO, 2021, US
[20]  
Ethereum, 2016, EIP170 ETH