Access control scheme based on blockchain and attribute-based searchable encryption in cloud environment

被引:16
|
作者
Yan, Liang [1 ,2 ]
Ge, Lina [1 ,2 ,3 ]
Wang, Zhe [1 ,2 ,3 ]
Zhang, Guifen [1 ,2 ]
Xu, Jingya [2 ,4 ]
Hu, Zheng [1 ,2 ]
机构
[1] Guangxi Minzu Univ, Sch Artificial Intelligence, Nanning 530006, Peoples R China
[2] Guangxi Minzu Univ, Key Lab Network Commun Engn, Nanning 530006, Peoples R China
[3] Guangxi Minzu Univ, Guangxi Key Lab Hybrid Computat & IC Design Anal, Nanning 530006, Peoples R China
[4] Guangxi Minzu Univ, Sch Elect Informat, Nanning 530006, Peoples R China
基金
中国国家自然科学基金;
关键词
Access control; Attribute-based encryption; Blockchain; Secure search; Attribute revocation; UPDATE;
D O I
10.1186/s13677-023-00444-4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid development of cloud computing technology, how to achieve secure access to cloud data has become a current research hotspot. Attribute-based encryption technology provides the feasibility to achieve the above goal. However, most of the existing solutions have high computational and trust costs. Furthermore, the fairness of access authorization and the security of data search can be difficult to guarantee. To address these issues, we propose a novel access control scheme based on blockchain and attribute-based searchable encryption in cloud environment. The proposed scheme achieves fine-grained access control with low computation consumption by implementing proxy encryption and decryption, while supporting policy hiding and attribute revocation. The encrypted file is stored in the IPFS and the metadata ciphertext is stored on the blockchain, which ensures data integrity and confidentiality. Simultaneously, the scheme enables the secure search of ciphertext keyword in an open and transparent blockchain environment. Additionally, an audit contract is designed to constrain user access behavior to dynamically manage access authorization. Security analysis proves that our scheme is resistant to chosen-plaintext attacks and keyword-guessing attacks. Theoretical analysis and experimental results show that our scheme has high computational and storage efficiency, which is more advantageous than other schemes.
引用
收藏
页数:16
相关论文
共 50 条
  • [21] BMDS: A Blockchain-based Medical Data Sharing Scheme with Attribute-Based Searchable Encryption
    Liu, Jingwei
    Wu, Mingli
    Sun, Rong
    Du, Xiaojiang
    Guizani, Mohsen
    IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2021), 2021,
  • [22] Blockchain-Based Multiple Authorities Attribute-Based Encryption for EHR Access Control Scheme
    Yang, Xiaohui
    Zhang, Chenshuo
    APPLIED SCIENCES-BASEL, 2022, 12 (21):
  • [23] An optimized dynamic attribute-based searchable encryption scheme
    Khan, Shahzad
    Khan, Shawal
    Waheed, Abdul
    Mehmood, Gulzar
    Zareei, Mahdi
    Alanazi, Faisal
    PLOS ONE, 2024, 19 (10):
  • [24] Blockchain Data Privacy Access Control Based on Searchable Attribute Encryption
    Feng, Tao
    Pei, Hongmei
    Ma, Rong
    Tian, Youliang
    Feng, Xiaoqin
    CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 66 (01): : 871 - 884
  • [25] Traceable and Weighted Attribute-Based Encryption Scheme in the Cloud Environment
    Yan, Xixi
    Yuan, Xiaohan
    Zhang, Qichao
    Tang, Yongli
    IEEE ACCESS, 2020, 8 : 38285 - 38295
  • [26] Attribute-based Searchable Proxy Re-encryption Blockchain Data Sharing Scheme
    Xu, Guangxia
    Huang, Yuling
    Ma, Chuang
    2023 IEEE 12TH INTERNATIONAL CONFERENCE ON CLOUD NETWORKING, CLOUDNET, 2023, : 372 - 380
  • [27] MicroSCOPE: Enabling Access Control in Searchable Encryption with the Use of Attribute-Based Encryption and SGX
    Michalas, Antonis
    Bakas, Alexandros
    Dang, Hai-Van
    Zalitko, Alexandr
    SECURE IT SYSTEMS, NORDSEC 2019, 2019, 11875 : 254 - 270
  • [28] SACS-ABE&B: Supervised Access Control Scheme Based on Attribute-Based Encryption and Blockchain
    Guo Kaiyang
    Han Yiliang
    Wu Riming
    Liu Kai
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [29] Attribute-based encryption scheme supporting attribute revocation in cloud storage environment
    Sun L.
    Zhao Z.
    Wang J.
    Zhu Z.
    Tongxin Xuebao/Journal on Communications, 2019, 40 (05): : 47 - 56
  • [30] Extended File Hierarchy Access Control Scheme with Attribute-Based Encryption in Cloud Computing
    Li, Jiguo
    Chen, Ningyu
    Zhang, Yichen
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2021, 9 (02) : 983 - 993