Self sovereign and blockchain based access control: Supporting attributes privacy with zero knowledge

被引:17
作者
Maesa, Damiano Di Francesco [1 ]
Lisi, Andrea [1 ,2 ]
Mori, Paolo [2 ]
Ricci, Laura [1 ]
Boschi, Gianluca [3 ]
机构
[1] Univ Pisa, Dept Comp Sci, Largo Bruno Pontecorvo 3, I-56127 Pisa, Italy
[2] CNR, Inst Informat & Telemat, Via G Moruzzi 1, I-56124 Pisa, Italy
[3] Univ Pisa, Dept Engn, Via G Caruso 16, I-56122 Pisa, Italy
关键词
Access control; Blockchain; Privacy; Self Sovereign Identity; XACML; Zero-knowledge proofs;
D O I
10.1016/j.jnca.2022.103577
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Recent years have witnessed, especially in Europe, a shift aimed at bringing users back at the center of digital systems. This has driven innovation towards the affirmation of decentralized systems, in line with the Self Sovereign Identity paradigm. User control over the consumption and disclosure of their data is a key topic of such drive. In this paper we show how it is possible to apply this increasingly popular concept to a traditionally centralized and opaque digital process: Access Control systems. To this aim we expand the XACML standard for Attribute Based Access Control systems with the novel concept of private attributes, i.e. attributes whose values should not be disclosed while still contributing to a policy evaluation result after user consent. Basing our proposal on blockchain systems, we show how to leverage smart contracts and zero knowledge proofs to allow for transparent policies evaluation without disclosing the value of such sensible attributes. Beside formalizing our goals, presenting the system architecture, and discussing its advantages and drawbacks with respect to the traditional model, we provide a reference example to show our proposal innovative capabilities and provide a prototype experimental evaluation to prove its feasibility.
引用
收藏
页数:19
相关论文
共 64 条
[21]  
EurLex, 2016, GEN DAT PROT REG
[22]  
European Commission, 2022, The Digital Services Act Package
[23]  
European Union, 2014, Regulation (EU) No 910/2014 of the European Parliament and of the Council of 23 July 2014 on Electronic Identification and Trust Services for Electronic Transactions in the Internal Market and Repealing Directive 1999/93/EC
[24]  
Extropy.IO on Medium, 2018, ZOKR TUT TRUFFL
[25]  
Feige U., 1988, Journal of Cryptology, V1, P77, DOI 10.1007/BF02351717
[26]   In Search of Self-Sovereign Identity Leveraging Blockchain Technology [J].
Ferdous, Md Sadek ;
Chowdhury, Farida ;
Alassafi, Madini O. .
IEEE ACCESS, 2019, 7 :103059-103079
[27]   Exploring the use of self-sovereign identity for event ticketing systems [J].
Feulner, Simon ;
Sedlmeir, Johannes ;
Schlatt, Vincent ;
Urbach, Nils .
ELECTRONIC MARKETS, 2022, 32 (03) :1759-1777
[28]   Capabilities-based access control for IoT devices using Verifiable Credentials [J].
Fotiou, Nikos ;
Siris, Vasilios A. ;
Polyzos, George C. ;
Kortesniemi, Yki ;
Lagutin, Dmitrij .
2022 43RD IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2022), 2022, :222-228
[29]   Towards Verifiable Differentially-Private Polling [J].
Garrido, Gonzalo Munilla ;
Babel, Matthias ;
Sedlmeir, Johannes .
PROCEEDINGS OF THE 17TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, ARES 2022, 2022,
[30]   THE KNOWLEDGE COMPLEXITY OF INTERACTIVE PROOF SYSTEMS [J].
GOLDWASSER, S ;
MICALI, S ;
RACKOFF, C .
SIAM JOURNAL ON COMPUTING, 1989, 18 (01) :186-208