Permissioned Blockchain-Based Secure and Privacy-Preserving Data Sharing Protocol

被引:7
|
作者
Wang, Zhiwei [1 ,2 ,3 ,4 ,5 ]
Chen, Qingqing [6 ]
Liu, Lei [6 ]
机构
[1] Guizhou Univ, State Key Lab Publ Big Data, Guizhou 550025, Peoples R China
[2] Nanjing Univ Posts & Telecommun, Sch Comp, Nanjing 210003, Peoples R China
[3] Chinese Acad Sci, State Key Lab Informat Secur, Beijing 100093, Peoples R China
[4] Beijing Univ Aeronaut & Astronaut, Yunan Key Lab Blockchain Applicat Technol, Yunnan Innovat Res Inst, Kunming 650233, Peoples R China
[5] Chengdu Univ Informat Engn, Key Lab Sichuan Prov, Adv Cryptog & Syst Secur, Chengdu 610103, Peoples R China
[6] Nanjing Univ Posts & Telecommun, Sch Comp, Nanjing 210003, Peoples R China
关键词
Blockchains; Access control; Protocols; Internet of Things; Authentication; Public key; Security; Anonymous credential; blockchain; Groth signature; one-out-of-many proof; privacy preserving; SIGNATURE; INTERNET; IOT;
D O I
10.1109/JIOT.2023.3242959
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this Internet of Things era, privacy preserving is one of the most vital barriers for personal data sharing. In this article, we present a secure and privacy-preserving data sharing protocol over the permissioned blockchains which require to certificate the users before they submit the transactions. We use the structure-preserving Groth signature to construct the anonymous credentials for satisfying the requirement of permissioned blockchains, and the anonymous credentials does not disclose the real identities of data owners. We prove that the anonymous credential in our protocol achieves the ideal functionality. For the secure access control and privacy protection of the data accessors, we propose an efficiently anonymous authentication scheme which utilizes the ElGamal commitment and the one-out-of-many proof to ensure a data accessor is authorized, but any unauthorized entities cannot learn the real identity of the data accessor, and even the data owner does not know who (although in the access control list) and when downloads his/her data. The blockchain platform is used to record the data storing, access control list, and the storage addresses, which helps to enhance the security level of the protocol. We implement our protocol over the ThinkPad, the RaspBerry Pi, the Huawei cloud, and the Hyperledger Fabric, and the experiments show the good performances.
引用
收藏
页码:10698 / 10707
页数:10
相关论文
共 50 条
  • [31] Scalable and Privacy-Preserving Data Sharing Based on Blockchain
    Zheng, Bao-Kun
    Zhu, Lie-Huang
    Shen, Meng
    Gao, Feng
    Zhang, Chuan
    Li, Yan-Dong
    Yang, Jing
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2018, 33 (03) : 557 - 567
  • [32] A Blockchain-Based Privacy-Preserving and Fair Data Transaction Model in IoT
    Zhou, Wei
    Zhang, De
    Han, Guangjie
    Zhu, Wenyin
    Wang, Xupeng
    APPLIED SCIENCES-BASEL, 2023, 13 (22):
  • [33] Privacy-preserving blockchain-based authentication and trust management in VANETs
    Ahmed, Waheeb
    Di, Wu
    Mukathe, Daniel
    IET NETWORKS, 2022, 11 (3-4) : 89 - 111
  • [34] Blockchain-based Privacy-Preserving Group Data Auditing with Secure User Revocation
    Qi, Yining
    Luo, Yubo
    Huang, Yongfeng
    Li, Xing
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2023, 45 (01): : 183 - 199
  • [35] SPChain: Blockchain-based medical data sharing and privacy-preserving eHealth system
    Zou, Renpeng
    Lv, Xixiang
    Zhao, Jingsong
    INFORMATION PROCESSING & MANAGEMENT, 2021, 58 (04)
  • [36] Privacy-Preserving Data Sharing in IoV: A Federated Learning and Blockchain-Based Approach
    Xia, Zhuoqun
    Sun, Jiahao
    Tan, Jingjing
    2024 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS, ICC WORKSHOPS 2024, 2024, : 511 - 516
  • [37] AccessChain: A scalable and privacy-preserving access control scheme for blockchain-based IoT
    Piao, Guirong
    Zhu, Jianming
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2025, 18 (02)
  • [38] A Blockchain-Based Privacy-Preserving Healthcare Data Sharing Scheme for Incremental Updates
    Wang, Lianhai
    Liu, Xiaoqian
    Shao, Wei
    Guan, Chenxi
    Huang, Qihao
    Xu, Shujiang
    Zhang, Shuhui
    Chen, Chin-Ling
    SYMMETRY-BASEL, 2024, 16 (01):
  • [39] TrafficChain: A Blockchain-Based Secure and Privacy-Preserving Traffic Map
    Wang, Qianlong
    Ji, Tianxi
    Guo, Yifan
    Yu, Lixing
    Chen, Xuhui
    Li, Pan
    IEEE ACCESS, 2020, 8 : 60598 - 60612
  • [40] A blockchain-based preserving and sharing system for medical data privacy
    Chen, Zeng
    Xu, Weidong
    Wang, Bingtao
    Yu, Hua
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2021, 124 : 338 - 350