Construction of a Secure Sharing Model for Digital Educational Resources Using Blockchain and Cipher Policy Attribute Based Encryption in Smart Education

被引:0
|
作者
Lu, Wenxiao [1 ]
机构
[1] Heilongjiang Institute of Teacher Development, Harbin,150080, China
来源
Informatica (Slovenia) | 2024年 / 48卷 / 22期
关键词
D O I
10.31449/inf.v48i22.6627
中图分类号
学科分类号
摘要
As the rapid advancement of information technology, the importance of digital educational resources in the field of education has become increasingly prominent. However, traditional access control techniques can hardly meet the demand for fine-grained sharing of digital educational resources in complex educational environments. Therefore, the study adopts attribute-based encryption based on ciphertext policy and combines it with the decentralised and tamper-proof features of blockchain to design a secure sharing model combining blockchain technology and attribute-based encryption algorithms to achieve secure and precisely controlled sharing of digital educational resources. The outcomes denote that the average encryption and decryption time of the designed model were 1.66 s and 1.65 s, respectively. Compared with attribute based key policy encryption and policy based attribute based encryption, the average encryption time was reduced by 0.65 s and 2.61 s, respectively, and the average decryption time was reduced by 0.69 s and 2.04 s, respectively, proving that it is more efficient in processing tasks. The ciphertext upload time of the design model remains constant at 9.2 ms, proving that it can scale better to more users without increasing the latency. Meanwhile, as the amount of attributes increases, the design model is able to keep the ciphertext length small, proving that it can effectively reduce the storage space requirement and raise the overall efficiency of the system. The model provides a powerful solution to the data sharing problem in smart education, as well as a reference for other domains that require secure data sharing. © 2024 Slovene Society Informatika. All rights reserved.
引用
收藏
页码:63 / 74
相关论文
共 50 条
  • [1] Secure document sharing model based on blockchain technology and attribute-based encryption
    Verma, Garima
    Kanrar, Soumen
    MULTIMEDIA TOOLS AND APPLICATIONS, 2024, 83 (06) : 16377 - 16394
  • [2] Secure document sharing model based on blockchain technology and attribute-based encryption
    Garima Verma
    Soumen Kanrar
    Multimedia Tools and Applications, 2024, 83 : 16377 - 16394
  • [3] ERSChain: Towards secure and flexible educational resource sharing using consortium blockchain and revocable ciphertext-policy attribute-based encryption
    Zhao, Gang
    He, Hui
    Di, Bingbing
    Wu, Tong
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2024, 36 (05):
  • [4] Secure cloud file sharing scheme using blockchain and attribute-based encryption
    Almasian, Mohammadpayam
    Shafieinejad, Alireza
    COMPUTER STANDARDS & INTERFACES, 2024, 87
  • [5] Secure digital documents sharing using blockchain and attribute-based cryptosystem
    Verma, Garima
    Kanrar, Soumen
    MULTIAGENT AND GRID SYSTEMS, 2022, 18 (3-4) : 365 - 379
  • [6] A blockchain based secure and privacy aware medical data sharing using smart contract and encryption scheme
    Vidhya, S.
    Kalaivani, V.
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2023, 16 (02) : 900 - 913
  • [7] A blockchain based secure and privacy aware medical data sharing using smart contract and encryption scheme
    S. Vidhya
    V. Kalaivani
    Peer-to-Peer Networking and Applications, 2023, 16 : 900 - 913
  • [8] BDAE: A Blockchain-Based and Decentralized Attribute-Based Encryption Scheme for Secure Data Sharing
    YANG Shuangxi
    WuhanUniversityJournalofNaturalSciences, 2024, 29 (03) : 228 - 238
  • [9] Secure sharing of big digital twin data for smart manufacturing based on blockchain
    Shen, Weidong
    Hu, Tianliang
    Zhang, Chengrui
    Ma, Songhua
    JOURNAL OF MANUFACTURING SYSTEMS, 2021, 61 : 338 - 350
  • [10] A Revocable and Key Secure Ciphertext-Policy Attribute-based Encryption Scheme Based on Blockchain
    Zhou, Xingyu
    Li, Wenmin
    Zhang, Huimin
    PROCEEDINGS OF 2024 3RD INTERNATIONAL CONFERENCE ON CYBER SECURITY, ARTIFICIAL INTELLIGENCE AND DIGITAL ECONOMY, CSAIDE 2024, 2024, : 7 - 10