Permissioned Blockchain-Based Secure and Privacy-Preserving Data Sharing Protocol

被引:6
|
作者
Wang, Zhiwei [1 ,2 ,3 ,4 ,5 ]
Chen, Qingqing [6 ]
Liu, Lei [6 ]
机构
[1] Guizhou Univ, State Key Lab Publ Big Data, Guizhou 550025, Peoples R China
[2] Nanjing Univ Posts & Telecommun, Sch Comp, Nanjing 210003, Peoples R China
[3] Chinese Acad Sci, State Key Lab Informat Secur, Beijing 100093, Peoples R China
[4] Beijing Univ Aeronaut & Astronaut, Yunan Key Lab Blockchain Applicat Technol, Yunnan Innovat Res Inst, Kunming 650233, Peoples R China
[5] Chengdu Univ Informat Engn, Key Lab Sichuan Prov, Adv Cryptog & Syst Secur, Chengdu 610103, Peoples R China
[6] Nanjing Univ Posts & Telecommun, Sch Comp, Nanjing 210003, Peoples R China
关键词
Blockchains; Access control; Protocols; Internet of Things; Authentication; Public key; Security; Anonymous credential; blockchain; Groth signature; one-out-of-many proof; privacy preserving; SIGNATURE; INTERNET; IOT;
D O I
10.1109/JIOT.2023.3242959
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this Internet of Things era, privacy preserving is one of the most vital barriers for personal data sharing. In this article, we present a secure and privacy-preserving data sharing protocol over the permissioned blockchains which require to certificate the users before they submit the transactions. We use the structure-preserving Groth signature to construct the anonymous credentials for satisfying the requirement of permissioned blockchains, and the anonymous credentials does not disclose the real identities of data owners. We prove that the anonymous credential in our protocol achieves the ideal functionality. For the secure access control and privacy protection of the data accessors, we propose an efficiently anonymous authentication scheme which utilizes the ElGamal commitment and the one-out-of-many proof to ensure a data accessor is authorized, but any unauthorized entities cannot learn the real identity of the data accessor, and even the data owner does not know who (although in the access control list) and when downloads his/her data. The blockchain platform is used to record the data storing, access control list, and the storage addresses, which helps to enhance the security level of the protocol. We implement our protocol over the ThinkPad, the RaspBerry Pi, the Huawei cloud, and the Hyperledger Fabric, and the experiments show the good performances.
引用
收藏
页码:10698 / 10707
页数:10
相关论文
共 50 条
  • [41] Toward Secure, Privacy-Preserving, and Interoperable Medical Data Sharing via Blockchain
    Jin, Hao
    Xu, Chen
    Luo, Yan
    Li, Peilong
    Cao, Yu
    Mathew, Jomol
    2019 IEEE 25TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS), 2019, : 852 - 861
  • [42] Privacy-preserving Blockchain-based Global Data Sharing for Federated Learning with Non-IID Data
    Lian, Zhuotao
    Zeng, Qingkui
    Su, Chunhua
    2022 IEEE 42ND INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS (ICDCSW), 2022, : 193 - 198
  • [43] A Privacy-Preserving Medical Data Sharing Scheme Based on Blockchain
    Xu, Guangquan
    Qi, Chen
    Dong, Wenyu
    Gong, Lixiao
    Liu, Shaoying
    Chen, Si
    Liu, Jian
    Zheng, Xi
    IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, 2023, 27 (02) : 698 - 709
  • [44] Blockchain-Based Privacy-Preserving Sensor Data Sharing with Fine-Grained Authorization in Microgrid
    Yu J.
    Han Y.
    Zhang K.
    Chen S.
    Li J.
    Security and Communication Networks, 2023, 2023
  • [45] Conditional Data-Sharing Privacy-Preserving Scheme in Blockchain-Based Social Internet of Vehicles
    Xia, Zhuoqun
    Man, Jiahuan
    Gu, Ke
    Li, Xiong
    Huang, Longfei
    IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING, 2025, 10 (02): : 378 - 395
  • [46] A Blockchain-Based Privacy-Preserving Publish-Subscribe Model in IoT Multidomain Data Sharing
    Liu, Zhendong
    Meng, Liang
    Zhao, Qingyuan
    Li, Fei
    Song, Manrui
    Dai, Dongxu
    Yang, Xiujuan
    Guan, Song
    Wang, Yue
    Tian, Hongliang
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [47] FPPB: A Fast and Privacy-preserving Method Based on the Permissioned Blockchain for Fair Transactions in Sharing Economy
    Li, Bin
    Wang, Yijie
    Shi, Peichang
    Chen, Huan
    Cheng, Li
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 1368 - 1373
  • [48] A Blockchain-based Privacy-Preserving Recommendation Mechanism
    Lin, Liangjie
    Tian, Yuchen
    Liu, Yang
    2021 IEEE 5TH INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, SECURITY AND PRIVACY (ICCSP), 2021, : 74 - 78
  • [49] A framework of blockchain-based secure and privacy-preserving E-government system
    Noe Elisa
    Longzhi Yang
    Fei Chao
    Yi Cao
    Wireless Networks, 2023, 29 : 1005 - 1015
  • [50] A framework of blockchain-based secure and privacy-preserving E-government system
    Elisa, Noe
    Yang, Longzhi
    Chao, Fei
    Cao, Yi
    WIRELESS NETWORKS, 2023, 29 (03) : 1005 - 1015