计算机科学 ›› 2022, Vol. 49 ›› Issue (5): 325-332.doi: 10.11896/jsjkx.210900075

• 信息安全 • 上一篇    下一篇

基于区块链与改进CP-ABE的众测知识产权保护技术研究

阳真, 黄松, 郑长友   

  1. 陆军工程大学指挥控制工程学院 南京210007
  • 收稿日期:2021-09-09 修回日期:2021-12-05 出版日期:2022-05-15 发布日期:2022-05-06
  • 通讯作者: 黄松(huangsong@aeu.edu.cn)
  • 作者简介:(yangzhen@aeu.edu.cn)
  • 基金资助:
    国家重点研发计划(2018YFB1403400);国家自然科学基金(61702544)

Study on Crowdsourced Testing Intellectual Property Protection Technology Based on Blockchain and Improved CP-ABE

YANG Zhen, HUANG Song, ZHENG Chang-you   

  1. Institute of Command and Control Engineering,Army Engineering University of PLA,Nanjing 210007,China
  • Received:2021-09-09 Revised:2021-12-05 Online:2022-05-15 Published:2022-05-06
  • About author:YANG Zhen,born in 1997,postgra-duate.Her main research interests include crowdsourced testing and blockchain.
    HUANG Song,born in 1970,professor,Ph.D supervisor,is a senior member of China Computer Federation.His main research interests include software engineering and software testing.
  • Supported by:
    National Key R & D Program of China(2018YFB1403400) and National Natural Science Foundation of China(61702544).

摘要: 众包测试是众包技术在软件测试领域的应用,它以分布、协作的方式开展测试,得到业界的广泛关注。然而,开放的众测环境和集中式的存储模式使众测知识产权存在泄露和被篡改的风险。为了实现众测知识产权的隐私保护以及可信存储,文中针对不同知识产权提出对应的保护方法。首先,针对众测任务与被测代码,使用AES算法和改进的CP-ABE算法对其进行细粒度的数据访问控制。该算法中的复杂加密操作被外包给可信第三方完成,降低了请求者的计算成本。同时该算法还支持属性的动态撤销,满足前向与后向安全性。此外,利用区块链技术和IPFS,该算法实现了大规模知识产权数据的分布式可信存储与一致性确权,确保存储的知识产权数据不被篡改,并可对链下知识产权进行确权,有助于解决知识产权纠纷。最后,进行性能测试与对比评估,验证了该方法的加解密效率相比以往方法有所提升,区块链性能表现较好;并进行安全性分析,证明了该方案满足安全需求。

关键词: CP-ABE, 访问控制, 可信存储, 区块链, 知识产权, 众包测试

Abstract: Crowdsourced testing is the application of crowdsourcing in software testing.It performs testing in a distributed and collaborative way,which has received widespread attention.However,the open crowdsourced testing environment and centralized storage mode put the intellectual property at risk of leakage and being manipulated.In order to realize the privacy protection and trusted storage of crowdsourced testing intellectual property,this paper proposes corresponding protection methods for different intellectual property.For the test tasks and the tested codes,AES and the improved CP-ABE algorithm are used for fine-grained data access control.By outsourcing complex encryption operations to the trusted third party,the proposed algorithm reduces the computing cost of requester.Meanwhile,it also supports the dynamic attribute revocation and meets the forward and backward security.In addition,using blockchain and InterPlanetary File System (IPFS),a distributed trusted storage and consistency right confirmation method of large-scale intellectual property data is realized.It protects intellectual property data from tampering and helps to solve intellectual property disputes.Finally,the performance test and comparative evaluation verify that the encryption and decryption efficiency of this method is improved compared with previous methods,and the blockchain has a high perfor-mance.Security analysis shows that the scheme meets the security requirements.

Key words: Access control, Blockchain, CP-ABE, Crowdsourced testing, Intellectual property, Trusted storage

中图分类号: 

  • TP311.5
[1]HOWE J.The Rise of Crowdsourcing[J].Wired,2006,14(6):1-4.
[2]ZHANG X F,FENG Y,LIU D,et al.Research Progress ofCrowdsourced Software Testing[J].Journal of Software,2018,29(1):69-88.
[3]FENG J H,LI G L,FENG J H.A Survey on Crowdsourcing[J].Chinese Journal of Computers,2015,38(9):1713-1726.
[4]NAGAI Y,UCHIDA Y,SAKAZAWA S,et al.Digital watermarking for deep neural networks[J].International Journal of Multimedia Information Retrieval,2018,7(1):3-16.
[5]ZHANG Z,ZHAO L.A design of digital rights management mechanism based on blockchain technology[C]//International Conference on Blockchain.Cham:Springer,2018:32-46.
[6]LU Y,TANG Q,WANG G.Zebralancer:Private and anonymous crowdsourcing system atop open blockchain[C]//2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS).Vienna:IEEE Press,2018:853-865.
[7]SUN Z,WANG Y,CAI Z,et al.A two-stage privacy protection mechanism based on blockchain in mobile crowdsourcing[J].International Journal of Intelligent Systems,2021,36(5):2058-2080.
[8]GUO J,LI C,ZHANG G,et al.Blockchain-enabled digital rights management for multimedia resources of online education[J].Multimedia Tools and Applications,2020,79(15):9735-9755.
[9]XU Q D.Design and Implementation of Multimedia ContentCopyright Protection System on Android Platform[D].Beijing:Beijing University of Posts and Telecommunications,2014.
[10]HUANG Q L,MA Z F,FU J Y,et al.Privacy-preserving digital rights management scheme in cloud computing[J].Journal on Communications,2014,35(2):95-103.
[11]LU Y,TANG Q,WANG G.Zebralancer:Private and anony-mous crowdsourcing system atop open blockchain[C]//2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS).IEEE,2018:853-865.
[12]NAKAMOTO S.Bitcoin:A peer-to-peer electronic cash system[EB/OL].[2009-03-24].https://bitcoin.org/bitcoin.pdf.
[13]BETHENCOURT J,SAHAI A,WATERS B.Ciphertext-policy attribute-based encryption[C]//2007 IEEE Symposium on Security and Privacy (SP’07).Berkeley:IEEE Press,2007:321-334.
[14]GAO J X,SUN J M,QIN J.Traceable Outsourcing Attribute-Based Encryption with Attribute Revocation.Journal of Computer Research and Development[J].Journal of Computer Research and Development,2019,56(10):2160-2169.
[15]BANERJEE S,BERA B,DAS A K,et al.Private blockchain-envisioned multi-authority CP-ABE-based user access control scheme in IIoT[J].Computer Communications,2021,169:99-113.
[16]GUAN Z,LU X,YANG W,et al.Achieving efficient and Privacy-preserving energy trading based on blockchain and ABE in smart grid[J].Journal of Parallel and Distributed Computing,2021,147:34-45.
[17]MA X X,HUANG Y.Publicly Traceable Accountable Ciphertext Policy Attribute Based Encryption Scheme Supporting Large Univers[J].Computer Science,2020,47(S1):420-423.
[18]DAEMEN J,RIJMEN V.The design of Rijndael:AES-the advancedencryption standard[M]// Springer Science & Business Media.India:Springer,2013.
[19]HAN X,YUAN Y,WANG F Y.Security Problems on Blockchain:The State of the Art and Future Trends[J].Acta Automatica Sinica,2019,45(1):206-225.
[20]BENET J.IPFS-Content Addressed,Versioned,P2P File System[EB/OL][2014-07-14].https://arxiv.org/pdf/1407.3561.pdf.
[21]GOYAL V,PANDEY O,SAHAI A,et al.Attribute-based encryption for fine-grained access control of encrypted data[C]//Proceedings of the 13th ACM Conference on Computer and Communications Security.2006:89-98.
[22]ANDROULAKI E,BARGER A,BORTNIKOV V,et al.Hy-perledger fabric:a distributed operating system for permissioned blockchains[C]//EuroSys’18:Proceedings of the thirteenth EuroSys conference.New York:Association for Computing Machinery,2018:1-15.
[23]YIN H,XIONG Y,DENG T,et al.A privacy-preservingandidentity-based personalized recommendation scheme for encryp-ted tasks in crowdsourcing[J].IEEE Access,2019,7:138857-138871.
[1] 郭鹏军, 张泾周, 杨远帆, 阳申湘.
飞机机内无线通信网络架构与接入控制算法研究
Study on Wireless Communication Network Architecture and Access Control Algorithm in Aircraft
计算机科学, 2022, 49(9): 268-274. https://doi.org/10.11896/jsjkx.210700220
[2] 王子凯, 朱健, 张伯钧, 胡凯.
区块链与智能合约并行方法研究与实现
Research and Implementation of Parallel Method in Blockchain and Smart Contract
计算机科学, 2022, 49(9): 312-317. https://doi.org/10.11896/jsjkx.210800102
[3] 周航, 姜河, 赵琰, 解相朋.
适用于各单元共识交易的电力区块链系统优化调度研究
Study on Optimal Scheduling of Power Blockchain System for Consensus Transaction ofEach Unit
计算机科学, 2022, 49(6A): 771-776. https://doi.org/10.11896/jsjkx.210600241
[4] 李博, 向海昀, 张宇翔, 廖浩德.
面向食品溯源场景的PBFT优化算法应用研究
Application Research of PBFT Optimization Algorithm for Food Traceability Scenarios
计算机科学, 2022, 49(6A): 723-728. https://doi.org/10.11896/jsjkx.210800018
[5] 傅丽玉, 陆歌皓, 吴义明, 罗娅玲.
区块链技术的研究及其发展综述
Overview of Research and Development of Blockchain Technology
计算机科学, 2022, 49(6A): 447-461. https://doi.org/10.11896/jsjkx.210600214
[6] 高健博, 张家硕, 李青山, 陈钟.
RegLang:一种面向监管的智能合约编程语言
RegLang:A Smart Contract Programming Language for Regulation
计算机科学, 2022, 49(6A): 462-468. https://doi.org/10.11896/jsjkx.210700016
[7] 毛典辉, 黄晖煜, 赵爽.
符合监管合规性的自动合成新闻检测方法研究
Study on Automatic Synthetic News Detection Method Complying with Regulatory Compliance
计算机科学, 2022, 49(6A): 523-530. https://doi.org/10.11896/jsjkx.210300083
[8] 王思明, 谭北海, 余荣.
面向6G可信可靠智能的区块链分片与激励机制
Blockchain Sharding and Incentive Mechanism for 6G Dependable Intelligence
计算机科学, 2022, 49(6): 32-38. https://doi.org/10.11896/jsjkx.220400004
[9] 孙浩, 毛瀚宇, 张岩峰, 于戈, 徐石成, 何光宇.
区块链跨链技术发展及应用
Development and Application of Blockchain Cross-chain Technology
计算机科学, 2022, 49(5): 287-295. https://doi.org/10.11896/jsjkx.210800132
[10] 任畅, 赵洪, 蒋华.
一种量子安全拜占庭容错共识机制
Quantum Secured-Byzantine Fault Tolerance Blockchain Consensus Mechanism
计算机科学, 2022, 49(5): 333-340. https://doi.org/10.11896/jsjkx.210400154
[11] 冯了了, 丁滟, 刘坤林, 马科林, 常俊胜.
区块链BFT共识算法研究进展
Research Advance on BFT Consensus Algorithms
计算机科学, 2022, 49(4): 329-339. https://doi.org/10.11896/jsjkx.210700011
[12] 杨昕宇, 彭长根, 杨辉, 丁红发.
基于演化博弈的理性拜占庭容错共识算法
Rational PBFT Consensus Algorithm with Evolutionary Game
计算机科学, 2022, 49(3): 360-370. https://doi.org/10.11896/jsjkx.210900110
[13] 王鑫, 周泽宝, 余芸, 陈禹旭, 任昊文, 蒋一波, 孙凌云.
一种面向电能量数据的联邦学习可靠性激励机制
Reliable Incentive Mechanism for Federated Learning of Electric Metering Data
计算机科学, 2022, 49(3): 31-38. https://doi.org/10.11896/jsjkx.210700195
[14] 张潆藜, 马佳利, 刘子昂, 刘新, 周睿.
以太坊Solidity智能合约漏洞检测方法综述
Overview of Vulnerability Detection Methods for Ethereum Solidity Smart Contracts
计算机科学, 2022, 49(3): 52-61. https://doi.org/10.11896/jsjkx.210700004
[15] 范家幸, 王志伟.
基于门限环签名的分级匿名表决方案
Hierarchical Anonymous Voting Scheme Based on Threshold Ring Signature
计算机科学, 2022, 49(1): 321-327. https://doi.org/10.11896/jsjkx.201000032
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!