A Blockchain-based access control scheme with multiple attribute authorities for secure cloud data sharing

被引:72
作者
Qin, Xuanmei [1 ,2 ]
Huang, Yongfeng [1 ,2 ]
Yang, Zhen [1 ,2 ]
Li, Xing [1 ,2 ]
机构
[1] Tsinghua Univ, Dept Elect Engn, Beijing 100084, Peoples R China
[2] Beijing Natl Res Ctr Informat Sci & Technol BNRis, Beijing 100084, Peoples R China
基金
中国国家自然科学基金;
关键词
Attribute-based encryption; Blockchain; Access control; Multiple authorities; Data sharing;
D O I
10.1016/j.sysarc.2020.101854
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Ciphertext-policy attribute-based encryption(CP-ABE) has been widely studied and used in access control schemes for secure data sharing. Since in most of the existing attribute-based encryption methods, all user attributes are managed by a single central authority, it is easy to cause a single point of failure. Therefore, several multi-authority CP-ABE schemes are proposed to manage user attributes by multiple authorities. However, these schemes still do not eliminate the single point of failure in essence or suffer from high computation and communication overhead on data users. In this paper, we propose a Blockchain-based Multi-authority Access Control scheme called BMAC for sharing data securely. Shamir secret sharing scheme and permissioned blockchain (Hyperledger Fabric) are introduced to implement that each attribute is jointly managed by multiple authorities to avoid single point of failure. In addition, we take advantage of blockchain technology to establish trust among multiple authorities and exploit smart contracts to compute tokens for attributes managed across multiple management domains, which reduces communication and computation overhead on the data user side. Moreover, blockchain helps to record the access control process in a secure and auditable way. Finally, we analyze the security of the proposed algorithm. Further analysis and comparison show the performance of the proposed method.
引用
收藏
页数:11
相关论文
共 31 条
[1]  
[Anonymous], 2005, LNCS, V3494, P457, DOI [10.1007/11426639_27, DOI 10.1007/11426639_27]
[2]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[3]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[4]  
Chase M, 2007, LECT NOTES COMPUT SC, V4392, P515
[5]   Blockchain based searchable encryption for electronic health record sharing [J].
Chen, Lanxiang ;
Lee, Wai-Kong ;
Chang, Chin-Chen ;
Choo, Kim-Kwang Raymond ;
Zhang, Nan .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 95 (420-429) :420-429
[6]   TrustAccess: A Trustworthy Secure Ciphertext-Policy and Attribute Hiding Access Control Scheme Based on Blockchain [J].
Gao, Sheng ;
Piao, Guirong ;
Zhu, Jianming ;
Ma, Xindi ;
Ma, Jianfeng .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (06) :5784-5798
[7]   A semi-autonomous distributed blockchain-based framework for UAVs system [J].
Ge, Chunpeng ;
Ma, Xinshu ;
Liu, Zhe .
JOURNAL OF SYSTEMS ARCHITECTURE, 2020, 107
[8]  
Goyal V., 2006, P 13 ACM C COMP COMM, P89, DOI DOI 10.1145/1180405.1180418
[9]  
Guo H, 2019, 2019 INTERNATIONAL CONFERENCE ON BLOCKCHAIN TECHNOLOGY (ICBCT 2019), P6, DOI [10.1145/3320154.3320164, 10.1109/GLOBECOM38437.2019.9013572]
[10]   Fine-grained data access control with attribute-hiding policy for cloud-based IoT [J].
Hao, Jialu ;
Huang, Cheng ;
Ni, Jianbing ;
Rong, Hong ;
Xian, Ming ;
Shen, Xuemin .
COMPUTER NETWORKS, 2019, 153 :1-10