Blockchain-based Multi-layer Data Security Sharing Model

被引:0
作者
Wei, Yishan [1 ]
Cao, Xiaomei [1 ]
机构
[1] Nanjing Univ Posts & Telecommun, Coll Comp, Nanjing, Peoples R China
来源
2022 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY, CYBERC | 2022年
关键词
blockchain; smart contract; data sharing; attribute-based access control; reputation level;
D O I
10.1109/CyberC55534.2022.00020
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Facing the era of big data, the traditional data sharing model has many problems such as low execution efficiency, opaque data sharing process, and inflexible processing, which can no longer meet the demand for secure data sharing. So we present a blockchain-based multi-layer data security sharing model (ML-DSM). The model not only combines blockchain and attribute-based access control technology, but also introduces malicious access behavior judgment and user rating mechanism. Judging malicious access behavior helps detect malicious users in time at the early stage of access control, and effectively prevents malicious attacks such as DoS. In the user rating mechanism, the smart contract evaluates the user's reputation level based on the user's current and historical reputation scores and judges whether the reputation level is higher than the level of the requested data. The rating mechanism not only dynamically adjusts the access rights of the requestor but also effectively reduces the average judgment time of access control. The final experimental analysis results show that the data sharing model in this paper can improve the execution efficiency of access control while ensuring the security of the shared data. Thus ML-DSM achieves more secure and efficient data sharing.
引用
收藏
页码:57 / 65
页数:9
相关论文
共 23 条
[1]   Blockchain-Based Multi-Party Authorization for Accessing IPFS Encrypted Data [J].
Battah, Ammar Ayman ;
Madine, Mohammad Moussa ;
Alzaabi, Hamad ;
Yaqoob, Ibrar ;
Salah, Khaled ;
Jayaraman, Raja .
IEEE ACCESS, 2020, 8 :196813-196825
[2]   RBAC-SC: Role-Based Access Control Using Smart Contract [J].
Cruz, Jason Paul ;
Kaji, Yuichi ;
Yanai, Naoto .
IEEE ACCESS, 2018, 6 :12240-12251
[3]  
Fang L., 2017, Journal of Computer Science, V40, P1680
[4]  
Hu V, 2015, IEEE INT C INFORM RE
[5]   An attribute aggregation architecture with trust-based evaluation for access control [J].
Lee, Jaewon ;
Kim, Heeyoul ;
Hong, Joon Sung .
2008 IEEE NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, VOLS 1 AND 2, 2008, :1011-1014
[6]  
Li Y, 2020, DSIT 2020 2020 3 INT
[7]  
Liu A. D., 2019, J SOFTWARE J SOFTWARE, V30, P19
[8]   SMACS: Smart Contract Access Control Service [J].
Liu, Bowen ;
Sun, Siwei ;
Szalachowski, Pawel .
2020 50TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN 2020), 2020, :221-232
[9]  
Liu S, 2019, 2019 INT C INTELLIGE
[10]  
Liu Y, 2022, COMPUTER APPL RES, V39, P7