An efficient and scalable vaccine passport verification system based on ciphertext policy attribute-based encryption and blockchain

被引:2
作者
Fugkeaw, Somchart [1 ]
机构
[1] Thammasat Univ, Sirindhorn Int Inst Technol, Pathum Thani 12000, Thailand
来源
JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS | 2023年 / 12卷 / 01期
关键词
Vaccine passport; Access control; Blockchain; CP-ABE; Proxy Re-encryption; Smart contract; AUTHENTICATION; COVID-19; STORAGE;
D O I
10.1186/s13677-023-00486-8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Implementing a trust and secure immunity or vaccine passport verification system is now crucial for many countries. The system typically aims to enable the secure access control and verification of vaccination records which will be used by trusted parties. However, the issues related to the system scalability in supporting a large number of data access requests, the enforcement of the user consent for data sharing, and the flexibility in delegating the access capability to trusted parties have not been resolved by existing works. In this paper, we propose a Universal Vaccine Passport Verification System (UniVAC) to support a decentralized, scalable, secure, and fine-grained, access control for Covid-19 vaccine passport data sharing and verification. At a core of our scheme, we employ the ciphertext policy attribute-based encryption (CP-ABE) to support secure and fine-grained access control and use the blockchain to record access transactions and provide data indexing. Furthermore, we propose a ciphertext retrieval method based on regional blockchain segmentation and introduce the outsourced CP-ABE decryption as a part of the proxy re-encryption (PRE) process to enable scalable and secure ciphertext delivery of the encrypted vaccine passport under the requestor's public key. Finally, we conducted the extensive experiments in real cloud environment and the results showed that our proposed scheme is more efficient and scalable than related works.
引用
收藏
页数:14
相关论文
共 28 条
[1]  
[Anonymous], LIBP2P GITHUB
[2]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[3]  
Chaudhari Sarang, 2021, Intelligent Computing. Proceedings of the 2021 Computing Conference. Lecture Notes in Networks and Systems (LNNS 285), P108, DOI 10.1007/978-3-030-80129-8_9
[4]  
Cheung L, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P456
[5]   IPFS and Friends: A Qualitative Comparison of Next Generation Peer-to-Peer Data Networks [J].
Daniel, Erik ;
Tschorsch, Florian .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2022, 24 (01) :31-52
[6]  
Fan Y, IN PRESS, DOI [10.1002/spe.2753, DOI 10.1002/SPE.2753]
[9]   Enabling Trust and Privacy-Preserving e-KYC System Using Blockchain [J].
Fugkeaw, Somchart .
IEEE ACCESS, 2022, 10 :49028-49039
[10]   An Extended CP-ABE based Access Control Model for Data Outsourced in the Cloud [J].
Fugkeaw, Somchart ;
Sato, Hiroyuki .
IEEE 39TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSAC 2015), VOL 3, 2015, :73-78