| Peer-Reviewed

Research on Data Sharing Access Control Based on Blockchain Technology

Received: 18 April 2022     Published: 20 April 2022
Views:       Downloads:
Abstract

Blockchain is now widely used in various industries due to its openness, transparency, autonomy, imtamability, decentralization, and traceability. With the wide application of blockchain technology, its security problems have also brought significant challenges, seriously affecting the implementation of blockchain applications. Data on the traditional blockchain is open to the entire network node. The update operation of data records is also transparent, accompanied by the leakage of user information. Although blockchain has the characteristics of anonymity and privacy, with its development, it has not been easy to meet users' needs. How to effectively protect user data privacy, realize data sharing on the blockchain, and ensure the security of data integrity, transmission efficiency, storage efficiency, and application is very important to break through the bottleneck of the development of blockchain technology and promote its application. This paper proposes a traffic data resource access control scheme based on blockchain technology by combining the attribute encryption access control system based on ciphertext strategy based on blockchain's distributed ledger technology and the openness and imtamability it brings. In this scheme, the task of attribute encryption is to ensure the security involved in the process of plaintext and ciphertext conversion and the efficiency of data sharing, and to implement a one-to-many access sharing policy, to enhance the safety of the access sharing system and improve the efficiency of the access control module. This paper introduces the access control mechanism from two aspects of system architecture and the access sharing process. Then the attribute encryption mechanism is designed. The design process includes symbol description, primary structure, algorithm design idea and algorithm construction. Finally, the functionality and security of the access control mechanism are analysed.

Published in Automation, Control and Intelligent Systems (Volume 10, Issue 1)
DOI 10.11648/j.acis.20221001.12
Page(s) 8-13
Creative Commons

This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited.

Copyright

Copyright © The Author(s), 2022. Published by Science Publishing Group

Keywords

Blockchain, Cryptography, Access Control

References
[1] Liu Bo, Wang Xinyan, Zhang Hongyan, Guo Jianxun, Qin Long, Zhang Jing, Chen Xin. A Data Access Control Method Based on Block Chain [P]. Henan Province: CN112257112A, 2021-01-22.
[2] Zhang Yuanyu, Nakanishi Ruka, Sasabe Masahiro, Kasahara Shoji. Combining IOTA and Attribute-Based Encryption for Access Control in the Internet of Things † [J]. Sensors, 2021, 21 (15).
[3] Ding Yan, Huang Chenlin, Feng Chi, Tan Yusong, Dong Pan, Li Bao, Ren Yi, Tan Shuang, Zhang Jianfeng, Song Liantao. Access Control Method and System of alliance Data Sharing based on Blockchain [P]. Hunan Province: CN112364366A, 2021-02-12.
[4] Zhang Xiaohong, Sun Lanlan. Blockchain Ciphertext Cloud storage Sharing Method Based on property Broker Reencryption [P]. Jiangxi Province: CN109189727B, 2021-07-23.
[5] Raman R K, Vaculin R, Hind M, et al. Trusted multi-party computation and verifiable simulations: A scalable blockchain approach [J]. arXiv preprint arXiv: 1809.08438, 2018.
[6] Chen L, Lee W K, Chang C C, et al. Blockchain based searchable encryption for electronic health record sharing [J]. Future Generation Computer Systems, 2019, 95: 420-429.
[7] Zhang P, White J, Schmidt D C, et al. FHIRChain: applying blockchain to securely and scalably share clinical data [J]. Computational and structural biotechnology journal, 2018, 16: 267-278.
[8] Liang X, Zhao J, Shetty S, et al. Integrating blockchain for data sharing and collaboration in mobile healthcare applications [C]. 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC). IEEE, 2017: 1-5.
[9] Xia Q, Sifah E B, Smahi A, et al. BBDS: Blockchain-based data sharing for electronic medical records in cloud environments [J]. Information, 2017, 8 (2): 44.
[10] Zhang A, Lin X. Towards secure and privacy-preserving data sharing in e-health systems via consortium blockchain [J]. Journal of medical systems, 2018, 42 (8): 140.
[11] Boneh, D, Di Crescenzo, G, Ostrovsky, R, & Persiano, G. Public key encryption with keyword search [C]//In International conference on the theory and applications of cryptographic techniques. Springer, Berlin, Heidelberg, 2004: 506-522.
[12] Ateniese G, Fu K, Green M, et al. Improved proxy re-encryption schemes with applications to secure distributed storage [J]. ACM Transactions on Information and System Security (TISSEC), 2006, 9 (1): 1-30.
[13] Zhang R, Xue R, Yu T, et al. Dynamic and Efficient Private Keyword Search over Inverted Index--Based Encrypted Data [J]. ACM Transactions on Internet Technology (TOIT), 2016, 16 (3): 21.
[14] Cai C, Yuan X, Wang C. Towards trustworthy and private keyword search in encrypted decentralized storage [C]. 2017 IEEE International Conference on Communications (ICC). IEEE, 2017: 1-7.
[15] Wang Z, Tian Y, Zhu J. Data Sharing and Tracing Scheme Based on Blockchain [C]. 2018 8th International Conference on Logistics, Informatics and Service Sciences (LISS). IEEE, 2018: 1-6.
[16] Li H, Tian H, Zhang F, et al. Blockchain-based searchable symmetric encryption scheme [J] Computers & Electrical Engineering, vol. ED-73, 2019: 32-45.
[17] Meiklejohn, S, Pomarole, M, Jordan, G, Levchenko, K, McCoy, D, Voelker, G. M. A fistful of bitcoins: characterizing payments among men with no names [C]// In Proceedings of on Internet measurement conference. ACM, 2013: 127-140.
[18] Conti, Mauro. A survey on security and privacy issues of bitcoin [C]. IEEE Communications Surveys & Tutorials, Vol. 4, 2018: 3416-3452.
[19] Noether, S, Mackenzie, A. Ring confidential transactions [J], J. Ledger, 2016: 1-18.
[20] Jiang P, Guo F, Liang K, et al. Searchain: Blockchainbased private keyword search in decentralized storage [J]. Future Generation Computer Systems, 2020, 107: 781-792.
[21] Bouchaala Mariem, Ghazel Cherif, Saidane Leila Azzouz. TRAK-CPABE: A novel Traceable, Revocable and Accountable Ciphertext-Policy Attribute-Based Encryption scheme in cloud computing [J]. Journal of Information Security and Applications, 2021, 61.
[22] Zhang Y, Wang Y, Zhang Y, et al. A study on the data privacy access control and sharing mechanism of blockchain [J]. Lanzhou University of Technology, 2020.
Cite This Article
  • APA Style

    Zhang Zichen, Yan Changshun. (2022). Research on Data Sharing Access Control Based on Blockchain Technology. Automation, Control and Intelligent Systems, 10(1), 8-13. https://doi.org/10.11648/j.acis.20221001.12

    Copy | Download

    ACS Style

    Zhang Zichen; Yan Changshun. Research on Data Sharing Access Control Based on Blockchain Technology. Autom. Control Intell. Syst. 2022, 10(1), 8-13. doi: 10.11648/j.acis.20221001.12

    Copy | Download

    AMA Style

    Zhang Zichen, Yan Changshun. Research on Data Sharing Access Control Based on Blockchain Technology. Autom Control Intell Syst. 2022;10(1):8-13. doi: 10.11648/j.acis.20221001.12

    Copy | Download

  • @article{10.11648/j.acis.20221001.12,
      author = {Zhang Zichen and Yan Changshun},
      title = {Research on Data Sharing Access Control Based on Blockchain Technology},
      journal = {Automation, Control and Intelligent Systems},
      volume = {10},
      number = {1},
      pages = {8-13},
      doi = {10.11648/j.acis.20221001.12},
      url = {https://doi.org/10.11648/j.acis.20221001.12},
      eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.acis.20221001.12},
      abstract = {Blockchain is now widely used in various industries due to its openness, transparency, autonomy, imtamability, decentralization, and traceability. With the wide application of blockchain technology, its security problems have also brought significant challenges, seriously affecting the implementation of blockchain applications. Data on the traditional blockchain is open to the entire network node. The update operation of data records is also transparent, accompanied by the leakage of user information. Although blockchain has the characteristics of anonymity and privacy, with its development, it has not been easy to meet users' needs. How to effectively protect user data privacy, realize data sharing on the blockchain, and ensure the security of data integrity, transmission efficiency, storage efficiency, and application is very important to break through the bottleneck of the development of blockchain technology and promote its application. This paper proposes a traffic data resource access control scheme based on blockchain technology by combining the attribute encryption access control system based on ciphertext strategy based on blockchain's distributed ledger technology and the openness and imtamability it brings. In this scheme, the task of attribute encryption is to ensure the security involved in the process of plaintext and ciphertext conversion and the efficiency of data sharing, and to implement a one-to-many access sharing policy, to enhance the safety of the access sharing system and improve the efficiency of the access control module. This paper introduces the access control mechanism from two aspects of system architecture and the access sharing process. Then the attribute encryption mechanism is designed. The design process includes symbol description, primary structure, algorithm design idea and algorithm construction. Finally, the functionality and security of the access control mechanism are analysed.},
     year = {2022}
    }
    

    Copy | Download

  • TY  - JOUR
    T1  - Research on Data Sharing Access Control Based on Blockchain Technology
    AU  - Zhang Zichen
    AU  - Yan Changshun
    Y1  - 2022/04/20
    PY  - 2022
    N1  - https://doi.org/10.11648/j.acis.20221001.12
    DO  - 10.11648/j.acis.20221001.12
    T2  - Automation, Control and Intelligent Systems
    JF  - Automation, Control and Intelligent Systems
    JO  - Automation, Control and Intelligent Systems
    SP  - 8
    EP  - 13
    PB  - Science Publishing Group
    SN  - 2328-5591
    UR  - https://doi.org/10.11648/j.acis.20221001.12
    AB  - Blockchain is now widely used in various industries due to its openness, transparency, autonomy, imtamability, decentralization, and traceability. With the wide application of blockchain technology, its security problems have also brought significant challenges, seriously affecting the implementation of blockchain applications. Data on the traditional blockchain is open to the entire network node. The update operation of data records is also transparent, accompanied by the leakage of user information. Although blockchain has the characteristics of anonymity and privacy, with its development, it has not been easy to meet users' needs. How to effectively protect user data privacy, realize data sharing on the blockchain, and ensure the security of data integrity, transmission efficiency, storage efficiency, and application is very important to break through the bottleneck of the development of blockchain technology and promote its application. This paper proposes a traffic data resource access control scheme based on blockchain technology by combining the attribute encryption access control system based on ciphertext strategy based on blockchain's distributed ledger technology and the openness and imtamability it brings. In this scheme, the task of attribute encryption is to ensure the security involved in the process of plaintext and ciphertext conversion and the efficiency of data sharing, and to implement a one-to-many access sharing policy, to enhance the safety of the access sharing system and improve the efficiency of the access control module. This paper introduces the access control mechanism from two aspects of system architecture and the access sharing process. Then the attribute encryption mechanism is designed. The design process includes symbol description, primary structure, algorithm design idea and algorithm construction. Finally, the functionality and security of the access control mechanism are analysed.
    VL  - 10
    IS  - 1
    ER  - 

    Copy | Download

Author Information
  • Faculty of Information Technology, Beijing University of Technology, Beijing, China

  • Faculty of Information Technology, Beijing University of Technology, Beijing, China

  • Sections