A Cross-Domain Ciphertext Sharing Scheme Supporting Access Behavior Identity Tracing

被引:0
|
作者
Shen, Yuan [1 ,2 ]
Song, Wei [1 ,3 ]
Zhao, Changsheng [1 ]
Peng, Zhiyong [1 ,3 ]
机构
[1] School of Computer Science, Wuhan University, Wuhan,430072, China
[2] School of Software, Pingdingshan University, Henan, Pingdingshan,467041, China
[3] Intellectual Computing Laboratory for Cultural Heritage, Wuhan University, Wuhan,430072, China
来源
Jisuanji Yanjiu yu Fazhan/Computer Research and Development | 2024年 / 61卷 / 07期
关键词
Blockchain;
D O I
10.7544/issn1000-1239.202330618
中图分类号
学科分类号
摘要
As a widely used ciphertext authorization access mechanism in cloud environments, ciphertext-policy attribute-based encryption (CP-ABE) has fine-grained, one-to-many and owner-controlled properties. However, the traditional CP-ABE mechanism is difficult to obtain the identities of authorized users who maliciously abuse their decryption privileges since multiple users may have the same attribute set. Although numerous existing studies achieve the identity tracking for some specific decryption privilege abuses (i.e., white-box attacks and black-box attacks), they are challenging to audit authorized users’ identities for ciphertext access behaviors, which may lead to potential data security and owners’ right-to-be-informed compliance issues. Based on CP-ABE mechanism, to realize identity tracing of ciphertext data access behavior in real application scenarios, this scheme designs a cross-domain ciphertext data sharing method, which generates the access request by binding the traceable decryption key with the authorized user’s access behavior. The integrity of access requests is protected by blockchain. Meanwhile, this scheme introduces an encrypted inverted index structure to address the inefficiency of the identity traceability caused by blockchain traversal. The privacy-preserving of index queries is achieved through the BLS signature and privacy set intersection. Theoretical analysis and experimental results demonstrate that the proposed cross-domain ciphertext sharing scheme with authorized users’ access behaviors audit trail is efficient and practical. © 2024 Science Press. All rights reserved.
引用
收藏
页码:1611 / 1628
相关论文
共 50 条
  • [21] A Survey on Identity and Access Management for Cross-Domain Dynamic Users: Issues, Solutions, and Challenges
    Badirova, Aytaj
    Dabbaghi, Shirin
    Moghaddam, Faraz Fatemi
    Wieder, Philipp
    Yahyapour, Ramin
    IEEE ACCESS, 2023, 11 : 61660 - 61679
  • [22] A Blockchain-Based Cross-Domain and Autonomous Access Control Scheme for Internet of Things
    Hao, Xiaohan
    Ren, Wei
    Fei, Yangyang
    Zhu, Tianqing
    Choo, Kim-Kwang Raymond
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (02) : 773 - 786
  • [23] Three-Factor Cross-Domain Signcryption Access Control Scheme for IoT Environment
    Huang L.-K.
    Tian Y.-L.
    Xie H.-T.
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2023, 51 (09): : 2578 - 2587
  • [24] Cross-domain access control via PKI
    Denker, G
    Millen, J
    Miyake, Y
    THIRD INTERNATION WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS, PROCEEDINGS, 2002, : 202 - 205
  • [25] Cross-Domain Access Control in a Military SOA
    Nordbotten, Nils Agne
    MILITARY COMMUNICATIONS CONFERENCE, 2010 (MILCOM 2010), 2010, : 448 - 455
  • [26] An ontology based access control service for cross-domain e-learning resource sharing
    Wu, Jiaoyu
    Huang, Changqin
    Wang, Xianqing
    Wu, Zhanjie
    Zheng, Xiaolin
    DYNAMICS OF CONTINUOUS DISCRETE AND IMPULSIVE SYSTEMS-SERIES B-APPLICATIONS & ALGORITHMS, 2007, 14 : 786 - 792
  • [27] Rating Knowledge Sharing in Cross-Domain Collaborative Filtering
    Li, Bin
    Zhu, Xingquan
    Li, Ruijiang
    Zhang, Chengqi
    IEEE TRANSACTIONS ON CYBERNETICS, 2015, 45 (05) : 1054 - 1068
  • [28] Agnostic Protocol Translation for Cross-Domain Information Sharing
    Liu, Chen
    Shen, Bao-Hong
    Oh, Soon Y.
    Gerla, Mario
    Palsberg, Jens
    Banner, Clif
    Butler, Richard
    2013 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2013), 2013, : 1447 - 1452
  • [29] BSCDA: Blockchain-Based Secure Cross-Domain Data Access Scheme for Internet of Things
    Chai, Baobao
    Yu, Jiguo
    Yan, Biwei
    Yu, Yong
    Wang, Shengling
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2024, 21 (04): : 4006 - 4023
  • [30] Secure and Efficient Access Control Scheme for Wireless Sensor Networks in the Cross-Domain Context of the IoT
    Luo, Ming
    Luo, Yi
    Wan, Yuwei
    Wang, Ze
    SECURITY AND COMMUNICATION NETWORKS, 2018,