Permissioned Blockchain-Based Secure and Privacy-Preserving Data Sharing Protocol

被引:10
作者
Wang, Zhiwei [1 ,2 ,3 ,4 ,5 ]
Chen, Qingqing [6 ]
Liu, Lei [6 ]
机构
[1] Guizhou Univ, State Key Lab Publ Big Data, Guizhou 550025, Peoples R China
[2] Nanjing Univ Posts & Telecommun, Sch Comp, Nanjing 210003, Peoples R China
[3] Chinese Acad Sci, State Key Lab Informat Secur, Beijing 100093, Peoples R China
[4] Beijing Univ Aeronaut & Astronaut, Yunan Key Lab Blockchain Applicat Technol, Yunnan Innovat Res Inst, Kunming 650233, Peoples R China
[5] Chengdu Univ Informat Engn, Key Lab Sichuan Prov, Adv Cryptog & Syst Secur, Chengdu 610103, Peoples R China
[6] Nanjing Univ Posts & Telecommun, Sch Comp, Nanjing 210003, Peoples R China
关键词
Blockchains; Access control; Protocols; Internet of Things; Authentication; Public key; Security; Anonymous credential; blockchain; Groth signature; one-out-of-many proof; privacy preserving; SIGNATURE; INTERNET; IOT;
D O I
10.1109/JIOT.2023.3242959
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this Internet of Things era, privacy preserving is one of the most vital barriers for personal data sharing. In this article, we present a secure and privacy-preserving data sharing protocol over the permissioned blockchains which require to certificate the users before they submit the transactions. We use the structure-preserving Groth signature to construct the anonymous credentials for satisfying the requirement of permissioned blockchains, and the anonymous credentials does not disclose the real identities of data owners. We prove that the anonymous credential in our protocol achieves the ideal functionality. For the secure access control and privacy protection of the data accessors, we propose an efficiently anonymous authentication scheme which utilizes the ElGamal commitment and the one-out-of-many proof to ensure a data accessor is authorized, but any unauthorized entities cannot learn the real identity of the data accessor, and even the data owner does not know who (although in the access control list) and when downloads his/her data. The blockchain platform is used to record the data storing, access control list, and the storage addresses, which helps to enhance the security level of the protocol. We implement our protocol over the ThinkPad, the RaspBerry Pi, the Huawei cloud, and the Hyperledger Fabric, and the experiments show the good performances.
引用
收藏
页码:10698 / 10707
页数:10
相关论文
共 31 条
[1]   Short Accountable Ring Signatures Based on DDH [J].
Bootle, Jonathan ;
Cerulli, Andrea ;
Chaidos, Pyrros ;
Ghadafi, Essam ;
Groth, Jens ;
Petit, Christophe .
COMPUTER SECURITY - ESORICS 2015, PT I, 2015, 9326 :243-265
[2]  
Buchman E., 2016, Tendermint: Byzantine fault tolerance in the age of blockchains
[3]   A Review of Distributed Access Control for Blockchain Systems Towards Securing the Internet of Things [J].
Butun, Ismail ;
Osterberg, Patrik .
IEEE ACCESS, 2021, 9 :5428-5441
[4]  
Camenisch J, 2004, LECT NOTES COMPUT SC, V3152, P56
[5]   Efficient Attributes for Anonymous Credentials [J].
Camenisch, Jan ;
Gro, Thomas .
ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2012, 15 (01)
[6]   Shorter Non-interactive Zero-Knowledge Arguments and ZAPs for Algebraic Languages [J].
Couteau, Geoffroy ;
Hartmann, Dominik .
ADVANCES IN CRYPTOLOGY - CRYPTO 2020, PT III, 2020, 12172 :768-798
[7]   Privacy preserving authentication system based on non-interactive zero knowledge proof suitable for Internet of Things [J].
Dwivedi, Ashutosh Dhar ;
Singh, Rajani ;
Ghosh, Uttam ;
Mukkamala, Raghava Rao ;
Tolba, Amr ;
Said, Omar .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 13 (10) :4639-4649
[8]   A PUBLIC KEY CRYPTOSYSTEM AND A SIGNATURE SCHEME BASED ON DISCRETE LOGARITHMS [J].
ELGAMAL, T .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1985, 31 (04) :469-472
[9]  
Escala A, 2013, LECT NOTES COMPUT SC, V8043, P129, DOI 10.1007/978-3-642-40084-1_8
[10]  
Eyal I, 2016, 13TH USENIX SYMPOSIUM ON NETWORKED SYSTEMS DESIGN AND IMPLEMENTATION (NSDI '16), P45