Cross-chain data traceability mechanism for cross-domain access

被引:7
作者
Cao, Lifeng [1 ]
Zhao, Shoucai [1 ]
Gao, ZhenSheng [1 ]
Du, Xuehui [1 ]
机构
[1] Henan Prov Key Lab Informat Secur, Zhengzhou, Peoples R China
关键词
Blockchain; Data traceability; Cross-domain access; Cross-chain technology; Notary groups; Data fingerprinting;
D O I
10.1007/s11227-022-04793-w
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
To address the cross-domain data traceability for data flowing under different trust domains, this paper proposes a cross-chain data traceability mechanism for cross-domain access. By building authorization chains globally and access chains within each trust domain, combined with the cross-chain technology based on notary groups, the mechanism achieves global authorization and transaction of data assets and cross-domain data access and traceability. Meanwhile, the mechanism enhances the trustworthiness of notary groups and solves the trust problem among cross-domain users by introducing a notary group election model based on reputation values. Through the proposed cross-domain data traceability mechanism based on data fingerprinting, the global data ownership transactions, access control policies, and user access records are correlated and tracked, and the traceability of cross-domain data transactions, permission grants, and user access behaviors is achieved. The experimental results show that the mechanism can meet the requirements of cross-domain data traceability.
引用
收藏
页码:4944 / 4961
页数:18
相关论文
共 19 条
[1]  
Cui Yong-rui, 2009, Journal of Chinese Computer Systems, V30, P1383
[2]   Fortified-Chain: A Blockchain-Based Framework for Security and Privacy-Assured Internet of Medical Things With Effective Access Control [J].
Egala, Bhaskara S. ;
Pradhan, Ashok K. ;
Badarla, Venkataramana ;
Mohanty, Saraju P. .
IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (14) :11717-11731
[3]  
Ganglong Duan, 2019, International Journal of Intelligent Systems Technologies and Applications, V18, P323
[4]  
Hang Xu, 2019, 2019 IEEE Fourth International Conference on Data Science in Cyberspace (DSC). Proceedings, P618, DOI 10.1109/DSC.2019.00100
[5]   Federated Authorization over Access to Personal Data for Decentralized Identity Management [J].
Hardjono T. .
IEEE Communications Standards Magazine, 2019, 3 (04) :32-38
[6]  
Hongyi Jiang, 2020, Artificial Intelligence and Security. 6th International Conference (ICAIS 2020). Proceedings. Lecture Notes in Computer Science (LNCS 12239), P707, DOI 10.1007/978-3-030-57884-8_62
[7]   Interledger: Creating a Standard for Payments [J].
Hope-Bailie, Adrian ;
Thomas, Stefan .
PROCEEDINGS OF THE 25TH INTERNATIONAL CONFERENCE ON WORLD WIDE WEB (WWW'16 COMPANION), 2016, :281-282
[8]   Blockchain-based mobile fingerprint verification and automatic log-in platform for future computing [J].
Huh, Jun-Ho ;
Seo, Kyungryong .
JOURNAL OF SUPERCOMPUTING, 2019, 75 (06) :3123-3139
[9]   Performance analysis of Hyperledger Fabric platform: A hierarchical model approach [J].
Jiang, Lili ;
Chang, Xiaolin ;
Liu, Yuhang ;
Misic, Jelena ;
Misic, Vojislav B. .
PEER-TO-PEER NETWORKING AND APPLICATIONS, 2020, 13 (03) :1014-1025
[10]   A Cross-Chain Solution to Integrating Multiple Blockchains for IoT Data Management [J].
Jiang, Yiming ;
Wang, Chenxu ;
Wang, Yawei ;
Gao, Lang .
SENSORS, 2019, 19 (09)