4.5 Article

A traceable and revocable multi-authority attribute-based access control scheme for mineral industry data secure storage in blockchain

期刊

JOURNAL OF SUPERCOMPUTING
卷 79, 期 13, 页码 14743-14779

出版社

SPRINGER
DOI: 10.1007/s11227-023-05222-2

关键词

CP-ABE; Traceability; Revocation; Mineral industry; Blockchain; IPFS

向作者/读者索取更多资源

With the rapid development of the mineral industry, the amount of data generated by this industry has increased significantly. To address the challenges of data storage and security, we propose a reliable on-chain and off-chain storage system that combines blockchain technology and Interplanetary file system (IPFS). We also introduce a traceable and revocable multi-authority ciphertext-policy attributed-based encryption (CP-ABE) algorithm to ensure privacy protection and dynamic fine-grained access control. Furthermore, our scheme enables distributed authorization and regulatory capabilities while accurately tracing malicious users and supporting immediate user and attribute revocation.
With the rapid advancements of the mineral industry, the data generated by this industry chain have increased dramatically. To reduce the growing pressure of data storage and security risks, we design a credible on-chain and off-chain collaborative dual storage system that integrates blockchain technology and Interplanetary file system (IPFS), also construct a traceable and revocable multi-authority ciphertext-policy attributed-based encryption (CP-ABE) algorithm to meet the demand of privacy protection and dynamic fine-grained access control. Furthermore, the multi-authority layered authorization with a central authority model distributes system overhead while enabling the platform can be regulated. More importantly, our scheme achieves accurate trace of the malicious users by white-box traceability and capable of implementing indirect immediate user and attribute revocation without requiring key or ciphertext updates. Finally, the proposed scheme is indistinguishably secure under chosen-plaintext attack (IND-CPA) in the standard model. And the performance analysis demonstrates that our scheme is feature-rich, practical and efficient.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.5
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据