A Cross-Domain Ciphertext Sharing Scheme Supporting Access Behavior Identity Tracing

被引:0
|
作者
Shen, Yuan [1 ,2 ]
Song, Wei [1 ,3 ]
Zhao, Changsheng [1 ]
Peng, Zhiyong [1 ,3 ]
机构
[1] School of Computer Science, Wuhan University, Wuhan,430072, China
[2] School of Software, Pingdingshan University, Henan, Pingdingshan,467041, China
[3] Intellectual Computing Laboratory for Cultural Heritage, Wuhan University, Wuhan,430072, China
关键词
Blockchain;
D O I
10.7544/issn1000-1239.202330618
中图分类号
学科分类号
摘要
As a widely used ciphertext authorization access mechanism in cloud environments, ciphertext-policy attribute-based encryption (CP-ABE) has fine-grained, one-to-many and owner-controlled properties. However, the traditional CP-ABE mechanism is difficult to obtain the identities of authorized users who maliciously abuse their decryption privileges since multiple users may have the same attribute set. Although numerous existing studies achieve the identity tracking for some specific decryption privilege abuses (i.e., white-box attacks and black-box attacks), they are challenging to audit authorized users’ identities for ciphertext access behaviors, which may lead to potential data security and owners’ right-to-be-informed compliance issues. Based on CP-ABE mechanism, to realize identity tracing of ciphertext data access behavior in real application scenarios, this scheme designs a cross-domain ciphertext data sharing method, which generates the access request by binding the traceable decryption key with the authorized user’s access behavior. The integrity of access requests is protected by blockchain. Meanwhile, this scheme introduces an encrypted inverted index structure to address the inefficiency of the identity traceability caused by blockchain traversal. The privacy-preserving of index queries is achieved through the BLS signature and privacy set intersection. Theoretical analysis and experimental results demonstrate that the proposed cross-domain ciphertext sharing scheme with authorized users’ access behaviors audit trail is efficient and practical. © 2024 Science Press. All rights reserved.
引用
收藏
页码:1611 / 1628
相关论文
共 50 条
  • [1] Ciphertext policy hidden access control scheme based on blockchain and supporting data sharing
    Du, Ruizhong
    Zhang, Tianhe
    Shi, Pengliang
    Tongxin Xuebao/Journal on Communications, 2022, 43 (06): : 168 - 178
  • [2] A Cross-domain Data Sharing Scheme for VANETs Based on Blockchain
    Shang, Wan-Yu
    Mu, Hai-Bing
    Liu, Jian-Xiong
    JOURNAL OF INTERNET TECHNOLOGY, 2024, 25 (06): : 843 - 850
  • [3] CD-ABSE: Attribute-Based Searchable Encryption Scheme Supporting Cross-Domain Sharing on Blockchain
    Guo, Kaiyang
    Han, Yiliang
    Wu, Riming
    Liu, Kai
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [4] A Secure Cross-domain Access Control Scheme in Social Networks
    Fan, Kai
    Bai, Yuhan
    Xu, Huiyue
    Pan, Qiang
    Li, Hui
    Yang, Yintang
    ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2019,
  • [5] Auditable and dynamic access control scheme with behavior and identity tracing
    Zhang, Qianhui
    Yuan, Lingyun
    Xie, Tianyu
    Chen, Han
    COMPUTER NETWORKS, 2024, 251
  • [6] An efficient credential-based scheme for cross-domain file sharing
    Chen, Lanxiang
    Feng, Dan
    CIS: 2007 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PROCEEDINGS, 2007, : 614 - +
  • [7] Cross-Domain based Data Sharing Scheme in Cooperative Edge Computing
    Fan, Kai
    Pan, Qiang
    Wang, Junxiong
    Liu, Tingting
    Li, Hui
    Yang, Yintang
    2018 IEEE INTERNATIONAL CONFERENCE ON EDGE COMPUTING (IEEE EDGE), 2018, : 87 - 92
  • [8] XSACd Cross-domain resource sharing & access control for smart environments
    Fysarakis, Konstantinos
    Soultatos, Othonas
    Manifavas, Charalampos
    Papaefstathiou, Ioannis
    Askoxylakis, Ioannis
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 80 : 572 - 582
  • [9] Cross-domain identity authentication scheme based on blockchain and PKI system
    Zhang, Hai
    Zhao, Feng
    HIGH-CONFIDENCE COMPUTING, 2023, 3 (01):
  • [10] A distributed identity management and cross-domain authentication scheme for the Internet of Things
    Wang, Miaomiao
    Wang, Ze
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2025, 169