Customized Data Sharing Scheme Based on Blockchain and Weighted Attribute

被引:3
作者
Huang, Longxia [1 ,2 ]
Zhang, Gongxuan [1 ]
Yu, Shui [3 ,4 ]
Fu, Anmin [1 ]
Yearwood, John [2 ]
机构
[1] Nanjing Univ Sci & Technol, Sch Comp Sci & Engn, Nanjing, Jiangsu, Peoples R China
[2] Deakin Univ, Sch Informat Technol, Burwood, Australia
[3] Guangzhou Univ, Sch Comp Sci, Guangzhou, Guangdong, Peoples R China
[4] Univ Technol Sydney, Sch Software, Sydney, NSW, Australia
来源
2018 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM) | 2018年
基金
中国国家自然科学基金;
关键词
D O I
10.1109/GLOCOM.2018.8647309
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In data sharing schemes, the file owners should obtain rewards by sharing files with others as they put energy in these files. Therefore, we proposed an incentive data sharing scheme in this paper which encourages users to share data and also supports customization. Customization allows the owners to decide the threshold of access, the importance of each attributive classification which determines users' priority level of file modification and file ownership obtaining when the original owner leaves according to the priority level value. To support a convincing customized data sharing scheme, we introduce the knowledge of blockchain and construct a suitable access structure based on weighted attributes. The blockchain is used to ensure the fairness in incentive. Based on weighted attributes, an attribute set is disposed to a numerical value and the owner of the attribute set is able to obtain the file when the value is not less than the threshold, which is different from the normal access control policy. We prove the security from integrity, privacy and the availability of access key. The performance of the proposed scheme is evaluated at the end of this paper.
引用
收藏
页数:6
相关论文
共 15 条
  • [1] Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
  • [2] Baden R, 2009, SIGCOMM 2009, P135
  • [3] Short signatures from the Weil pairing
    Boneh, D
    Lynn, B
    Shacham, H
    [J]. JOURNAL OF CRYPTOLOGY, 2004, 17 (04) : 297 - 319
  • [4] Hu S., 2018, INFOCOM
  • [5] Huang L, 2018, WIRELESS PERS COMMUN, P1
  • [6] SeShare: Secure cloud data sharing based on blockchain and public auditing
    Huang, Longxia
    Zhang, Gongxuan
    Yu, Shui
    Fu, Anmin
    Yearwood, John
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2019, 31 (22)
  • [7] Improving Security and Efficiency in Attribute-Based Data Sharing
    Hur, Junbeom
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2013, 25 (10) : 2271 - 2282
  • [8] Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation
    Jiang, Tao
    Chen, Xiaofeng
    Ma, Jianfeng
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (08) : 2363 - 2373
  • [9] Liu XM, 2014, IEEE INT CONF COMM, P694, DOI 10.1109/ICCW.2014.6881280
  • [10] Pinno O.J.A., 2017, GLOB 2017 2017 IEEE, P1