4.6 Article

A Blockchain-based access control scheme with multiple attribute authorities for secure cloud data sharing

Journal

JOURNAL OF SYSTEMS ARCHITECTURE
Volume 112, Issue -, Pages -

Publisher

ELSEVIER
DOI: 10.1016/j.sysarc.2020.101854

Keywords

Attribute-based encryption; Blockchain; Access control; Multiple authorities; Data sharing

Funding

  1. National Key RAMP
  2. D Program of China [2016YFB0800402]
  3. National Natural Science Foundation of China [U1836204, U1705261]

Ask authors/readers for more resources

The paper proposes a Blockchain-based Multi-authority Access Control scheme called BMAC, which utilizes Shamir secret sharing scheme and permissioned blockchain (Hyperledger Fabric) to jointly manage user attributes by multiple authorities, reducing the risk of single point of failure and lowering the computation and communication overhead on the data user side.
Ciphertext-policy attribute-based encryption(CP-ABE) has been widely studied and used in access control schemes for secure data sharing. Since in most of the existing attribute-based encryption methods, all user attributes are managed by a single central authority, it is easy to cause a single point of failure. Therefore, several multi-authority CP-ABE schemes are proposed to manage user attributes by multiple authorities. However, these schemes still do not eliminate the single point of failure in essence or suffer from high computation and communication overhead on data users. In this paper, we propose a Blockchain-based Multi-authority Access Control scheme called BMAC for sharing data securely. Shamir secret sharing scheme and permissioned blockchain (Hyperledger Fabric) are introduced to implement that each attribute is jointly managed by multiple authorities to avoid single point of failure. In addition, we take advantage of blockchain technology to establish trust among multiple authorities and exploit smart contracts to compute tokens for attributes managed across multiple management domains, which reduces communication and computation overhead on the data user side. Moreover, blockchain helps to record the access control process in a secure and auditable way. Finally, we analyze the security of the proposed algorithm. Further analysis and comparison show the performance of the proposed method.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available