Permissioned Blockchain-Based Secure and Privacy-Preserving Data Sharing Protocol

被引:6
|
作者
Wang, Zhiwei [1 ,2 ,3 ,4 ,5 ]
Chen, Qingqing [6 ]
Liu, Lei [6 ]
机构
[1] Guizhou Univ, State Key Lab Publ Big Data, Guizhou 550025, Peoples R China
[2] Nanjing Univ Posts & Telecommun, Sch Comp, Nanjing 210003, Peoples R China
[3] Chinese Acad Sci, State Key Lab Informat Secur, Beijing 100093, Peoples R China
[4] Beijing Univ Aeronaut & Astronaut, Yunan Key Lab Blockchain Applicat Technol, Yunnan Innovat Res Inst, Kunming 650233, Peoples R China
[5] Chengdu Univ Informat Engn, Key Lab Sichuan Prov, Adv Cryptog & Syst Secur, Chengdu 610103, Peoples R China
[6] Nanjing Univ Posts & Telecommun, Sch Comp, Nanjing 210003, Peoples R China
关键词
Blockchains; Access control; Protocols; Internet of Things; Authentication; Public key; Security; Anonymous credential; blockchain; Groth signature; one-out-of-many proof; privacy preserving; SIGNATURE; INTERNET; IOT;
D O I
10.1109/JIOT.2023.3242959
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this Internet of Things era, privacy preserving is one of the most vital barriers for personal data sharing. In this article, we present a secure and privacy-preserving data sharing protocol over the permissioned blockchains which require to certificate the users before they submit the transactions. We use the structure-preserving Groth signature to construct the anonymous credentials for satisfying the requirement of permissioned blockchains, and the anonymous credentials does not disclose the real identities of data owners. We prove that the anonymous credential in our protocol achieves the ideal functionality. For the secure access control and privacy protection of the data accessors, we propose an efficiently anonymous authentication scheme which utilizes the ElGamal commitment and the one-out-of-many proof to ensure a data accessor is authorized, but any unauthorized entities cannot learn the real identity of the data accessor, and even the data owner does not know who (although in the access control list) and when downloads his/her data. The blockchain platform is used to record the data storing, access control list, and the storage addresses, which helps to enhance the security level of the protocol. We implement our protocol over the ThinkPad, the RaspBerry Pi, the Huawei cloud, and the Hyperledger Fabric, and the experiments show the good performances.
引用
收藏
页码:10698 / 10707
页数:10
相关论文
共 50 条
  • [1] A blockchain-based scheme for privacy-preserving and secure sharing of medical data
    Huang, Haiping
    Zhu, Peng
    Xiao, Fu
    Sun, Xiang
    Huang, Qinglong
    COMPUTERS & SECURITY, 2020, 99
  • [2] Blockchain-Based Secure and Privacy-Preserving Clinical Data Sharing and Integration
    Jin, Hao
    Xu, Chen
    Luo, Yan
    Li, Peilong
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2020, PT III, 2020, 12454 : 93 - 109
  • [3] PrivySharing: A blockchain-based framework for privacy-preserving and secure data sharing in smart cities
    Makhdoom, Imran
    Zhou, Ian
    Abolhasan, Mehran
    Lipman, Justin
    Ni, Wei
    COMPUTERS & SECURITY, 2020, 88
  • [4] Secure and Privacy-Preserving Stored Surveillance Video Sharing atop Permissioned Blockchain
    Fitwi, Alem
    Chen, Yu
    30TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN 2021), 2021,
  • [5] A privacy-preserving model for blockchain-based data sharing in the industrial internet
    Xue, Yudai
    Wang, Jinsong
    Shi, Kai
    Zhang, Hongwei
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2024, 35 (04)
  • [6] A Blockchain-based Conditional Privacy-Preserving Traffic Data Sharing in Cloud
    Liu, Jingwei
    Zhang, Gaojian
    Sun, Rong
    Du, Xiaojiang
    Guizani, Mohsen
    ICC 2020 - 2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2020,
  • [7] Blockchain-Based Privacy-Preserving and Rewarding Private Data Sharing for IoT
    Li, Tian
    Wang, Huaqun
    He, Debiao
    Yu, Jia
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (16): : 15138 - 15149
  • [8] Blockchain-Based Privacy-Preserving Dynamic Spectrum Sharing
    Tu, Zhitian
    Zhu, Kun
    Yi, Changyan
    Wang, Ran
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, PT I, 2020, 12384 : 444 - 456
  • [9] Blockchain-based verifiable privacy-preserving data classification protocol for medical data
    Zheng, Xiaokun
    Zhao, Yanqi
    Li, Huilin
    Chen, Ruonan
    Zheng, Dong
    COMPUTER STANDARDS & INTERFACES, 2022, 82
  • [10] Blockchain-based Privacy-Preserving Electronic Voting Protocol
    Chai, Wenqiang
    Liu, Momeng
    Zhang, Zeyu
    Lv, Liping
    International Journal of Network Security, 2022, 24 (02): : 230 - 237