4.6 Article

Redactable Blockchain-Enabled Hierarchical Access Control Framework for Data Sharing in Electronic Medical Records

期刊

IEEE SYSTEMS JOURNAL
卷 17, 期 2, 页码 1962-1973

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JSYST.2022.3186145

关键词

Blockchains; Authorization; Periodic structures; Performance analysis; Organizations; Medical diagnostic imaging; Logic gates; Attribute-based encryption (ABE); blockchain; chameleon hash; data sharing

向作者/读者索取更多资源

This study introduces a hierarchical access control redactable blockchain model for data sharing through attribute-based encryption and a chameleon hash to address the limitation of deleting malicious data in an untrusted environment. The proposed scheme ensures data owners' full control over rights and regulates the behavior of modifiers.
The application of blockchain to data sharing in an untrusted environment has received widespread industry attention in recent years. However, the tamper-proof property of blockchain brings protection for sharing data and also leads to a new limitation for the deletion of malicious data. Nowadays, many methods based on redactable blockchain with a chameleon hash is proposed to attempt to solve the above problem, but loss of effective access control to the modifiers can easily lead to breaking the positive characteristics of the blockchain. To address the aforementioned problem, a hierarchical access control redactable blockchain model for data sharing through attribute-based encryption and a chameleon hash is introduced. Under this model, the data owner can specify who can modify their data by setting an access policy and authenticating the modifier with a digital signature. The data owner's full control over rights is guaranteed, while the modifier's behavior is regulated. In addition, the hierarchical access control decentralized technique solves the overpowerful problem of center authority and single-point-of-failure problems in the existing works. The security analysis indicates that the proposed scheme achieves indistinguishable chosen plaintext attack security as well as collision resistance security. Performance analysis shows that the proposed scheme is more complete and has better efficiency compared with other schemes.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据