BACC: Blockchain-Based Access Control For Cloud Data

被引:16
作者
Sohrabi, Nasrin [1 ]
Yi, Xun [1 ]
Tari, Zahir [1 ]
Khalil, Ibrahim [1 ]
机构
[1] RMIT Univ, Melbourne, Vic, Australia
来源
PROCEEDINGS OF THE AUSTRALASIAN COMPUTER SCIENCE WEEK MULTICONFERENCE (ACSW 2020) | 2020年
关键词
Blockchain; Smart Contract; Access Control; Cloud Computing; Shamir Secret Sharing Scheme; INTERNET;
D O I
10.1145/3373017.3373027
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Controlling the access over the stored data in the cloud is one of the fundamental security requirements, especially with the wide usage of cloud storage servers for nearly most of the enterprise applications. Traditional cloud-based access control solutions are based on a centralized approach (i.e. a cloud server becomes the central authority to control accesses to the data), which makes it difficult to prevent malicious cloud servers from disclosing user's data; and therefore compromising the privacy of the stored data. Additionally, the centralization of authority can cause a single point of failure. Furthermore, to provide confidentiality, which is one of the essential security requirements, user's data is encrypted before it is stored on the cloud. Most of the cloud servers store the decryption keys, after they encrypt the data, in their premises. This compromises data privacy. In this paper we propose a new model that addresses the aforementioned issues. To address the centralization problem, we distributed the access control tasks to smart contracts over a decentralized network, i.e. blockchain. To address the latter, we used Shamir secret sharing scheme to manage the encryption keys. Then we introduced a new type of node, called master node, to our blockchain platform, to store the decryption key parts.
引用
收藏
页数:10
相关论文
共 27 条
[1]  
[Anonymous], 2017, NOVEL PRIVACY PRESER
[2]  
Antonopoulos A.M., 2017, Mastering Bitcoin, V2nd
[3]  
Bano S., 2017, CONSENSUS AGE BLOCKC
[4]  
Bashir I., 2018, MASTERING BLOCKCHAIN, V2nd ed.
[5]   Blockchains and Smart Contracts for the Internet of Things [J].
Christidis, Konstantinos ;
Devetsikiotis, Michael .
IEEE ACCESS, 2016, 4 :2292-2303
[6]  
Duncan A. J., 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), P857, DOI 10.1109/TrustCom.2012.188
[7]  
Ethereum-IDE Remix, REM DOC
[8]  
Freier A., 2011, TECHNICAL REPORT
[9]  
Goodrich Michael T., 2011, INTRO COMPUTERE SECU
[10]   Attribute-Based Access Control [J].
Hu, Vincent C. ;
Kuhn, D. Richard ;
Ferraiolo, David F. .
COMPUTER, 2015, 48 (02) :85-88