My data, my control: A secure data sharing and access scheme over blockchain

被引:24
作者
Chiu, Wei-Yang [1 ]
Meng, Weizhi [1 ]
Jensen, Christian D. [1 ]
机构
[1] Tech Univ Denmark, Dept Appl Math & Comp Sci, Lyngby, Denmark
基金
欧盟地平线“2020”;
关键词
Data encryption; Blockchain technology; Access control; Data security and privacy; Smart contract; TECHNOLOGY;
D O I
10.1016/j.jisa.2021.103020
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the fast growth of networked devices, the shared data volume keeps increasing over time, i.e., the Internet of Things (IoT) devices may generate zettabytes of data in the coming few years. According to the recent version of General Data Protection Regulation (GDPR), users have the right to fully control their personal data. Many web service providers also provide some options for users to control the data. However, it is still a challenge to investigate how they enforce these actions. There is a need to deploy additional measures to secure the data access. Focused on this challenge, in this work, we design a scheme that uses smart contract and blockchain to provide a secure data sharing and access environment. In our scheme, there are three major parties and each of them has its own key pair for encrypting and signing the data. We also develop four main smart contracts for different parties, and discuss what kinds of data should be immutable and placed on-chain. In the evaluation, we explore the performance of our scheme under different platforms such as Ethereum with EtHash, Ethereum with Clique, and Hyperledger. With the analysis of several potential attacks, our results indicate the viability and effectiveness of our scheme.
引用
收藏
页数:11
相关论文
共 28 条
[1]  
Ali M, 2016, PROCEEDINGS OF USENIX ATC '16: 2016 USENIX ANNUAL TECHNICAL CONFERENCE, P181
[2]  
Almakhour M, ICBC 2020, P94
[3]  
[Anonymous], 2020, EOSIO EOS VM
[4]  
[Anonymous], Bitcoin: A Peer -to -Peer Electronic Cash System, DOI 10.2139/ssrn.3440802
[5]  
Atzei N, 2018, 6 INT C PRINC SEC TR
[6]   Practical byzantine fault tolerance and proactive recovery [J].
Castro, M ;
Liskov, B .
ACM TRANSACTIONS ON COMPUTER SYSTEMS, 2002, 20 (04) :398-461
[7]  
Chan R., 2019, BUSINESS INSIDE 1005
[8]  
Chiu Wei-Yang, 2020, Frontiers in Cyber Security: Third International Conference, FCS 2020. Communications in Computer and Information Science (1286), P197, DOI 10.1007/978-981-15-9739-8_16
[9]   Towards Decentralized Bicycle Insurance System Based on Blockchain [J].
Chiu, Wei-Yang ;
Meng, Weizhi .
36TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, SAC 2021, 2021, :249-256
[10]  
Chiu WY, PEER PEER NETW APPL