A Blockchain-Based Access Control System for Cloud Storage

被引:0
作者
Sukhodolskiy, Ilya [1 ]
Zapechnikov, Sergey [1 ]
机构
[1] Natl Res Nucl Univ MEPhI, Dept Cryptol & Cybersecur, Moscow Engn Phys Inst, Moscow, Russia
来源
PROCEEDINGS OF THE 2018 IEEE CONFERENCE OF RUSSIAN YOUNG RESEARCHERS IN ELECTRICAL AND ELECTRONIC ENGINEERING (EICONRUS) | 2018年
关键词
cloud storage; attribute-based access control; ciphertext-policy attribute-based encryption; blockchain;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, we present a prototype of multi-user system for access control to datasets stored in an untrusted cloud environment. Cloud storage like any other untrusted environment needs the ability to secure share information. Our approach provides an access control over the data stored in the cloud without the provider participation. The main tool of access control mechanism is ciphertext-policy attribute-based encryption scheme with dynamic attributes. Using a blockchain-based decentralized ledger, our system provides immutable log of all meaningful security events, such as key generation, access policy assignment, change or revocation, access request. We propose a set of cryptographic protocols ensuring privacy of cryptographic operations requiring secret or private keys. Only ciphertexts of hash codes are transferred through the blockchain ledger. The prototype of our system is implemented using smart contracts and tested on Ethereum blockchain platform.
引用
收藏
页码:1575 / 1578
页数:4
相关论文
共 9 条
[1]  
[Anonymous], 2015, CRYPTOGRAPHIC PROTEC
[2]  
[Anonymous], 2013, EXTENSIBLE ACC CONTR
[3]  
Horváth M, 2015, LECT NOTES COMPUT SC, V8939, P566, DOI 10.1007/978-3-662-46078-8_47
[4]  
Lewko AllisonB., 2011, Decentralizing Attribute-Based Encryption, P568, DOI DOI 10.1007/978-3-642-20465-4_31
[5]  
McConaghy T., 2016, BIGCHAINDB WHITEPAPE
[6]  
Poddar R., 2016, CRYPTOLOGY EPRINT AR, V2016, P591
[7]  
Popa RA, 2011, SOSP 11: PROCEEDINGS OF THE TWENTY-THIRD ACM SYMPOSIUM ON OPERATING SYSTEMS PRINCIPLES, P85
[8]  
Sukhodolskiy IA, 2017, IEEE NW RUSS YOUNG, P578, DOI 10.1109/EIConRus.2017.7910620
[9]  
Yuan W., 2016, IACR Cryptology ePrint Archive, V2016, P457