Computer Science ›› 2024, Vol. 51 ›› Issue (10): 372-379.doi: 10.11896/jsjkx.230700094

• Information Security • Previous Articles     Next Articles

Study on Stream Data Authorization Revocation Scheme Based on Smart Contracts

MEN Ruirui, JIA Hongyong, DU Jinru   

  1. School of Cyber Science and Engineering,ZhengZhou University,Zhengzhou 450000,China
  • Received:2023-07-13 Revised:2024-01-15 Online:2024-10-15 Published:2024-10-11
  • About author:MEN Ruirui,born in 1999,postgra-duate.Her main research interests include cryptography and zero trust security.
    JIA Hongyong,born in 1975,Ph.D,lecture.His main research interests include cloud computing security and zero trust security of the IoT system.
  • Supported by:
    Management of Major Science and Technology of Henan Province(221100210900-01) and 2021 China University Industry University Research Innovation Fund(2021ITA11021).

Abstract: IoT devices and services encrypt real-time generated stream data for outsourced storage,and authorize users through access control.When the user's identity or permissions change,authorization to the user needs to be revoked.Existing revocation schemes have problems of frequent key updates and re-encrypted ciphertext,resulting in low revocation efficiency,insufficient flexibility,difficulty in achieving real-time revocation,and the risk of data leakage.In order to solve the real-time authorization revocation in the outsourcing storage scenario of streaming data,a decentralized authorization revocation scheme based on smart contracts is proposed.Under the IoT architecture combined with edge computing and blockchain,the streaming data is divided into blocks according to time intervals,and a large number of unique keys corresponding to the blocks are generated using the HASH tree,and the partitioned data is symmetrically encrypted.The tree nodes create access tokens and share them through proxy re-encryption technology,to implement modifiable access policies and efficient dynamic data sharing.By utilizing smart contract technology to create access control lists and misconduct lists,users are subjected to scheduled and immediate revocation operations,achieving decentralized real-time authorization revocation.Through security analysis and simulation experiments,it has been proven that this scheme provides better security,functionality,communication,and computing costs compared to other rela-ted research schemes,and is more effective.

Key words: Stream data, Edge computing, Blockchain, Smart contracts, Access control, Authorization revocation

CLC Number: 

  • TP309
[1]MACIEL L,BALLINI R,GOMIDE F.Adaptive fuzzy modeling of interval-valued stream data and application in cryptocurrencies prediction[J].Neural Computing and Applications,2023,35(10):7149-7159.
[2]SRIRAMG S.Edge computing vs.Cloud computing:an overview of big data challenges and opportunities for large enterprises[J].International Research Journal of Modernization in Engineering Technology and Science,2022,4(1):1331-1337.
[3]ZHANG T,SHEN J,LAI C F,et al.Multi-server assisted data sharing supporting secure deduplication for metaverse healthcare systems[J].Future Generation Computer Systems,2023,140:299-310.
[4]RASORI M,PERAZZO P,DINI G,et al.Indirect revocable kp-abe with revocation undoing resistance[J].IEEE Transactions on Services Computing,2021,15(5):2854-2868.
[5]DAS S,NAMASUDRA S.Multiauthority CP-ABE-based Ac-cess Control Model for IoT-enabled Healthcare Infrastructure[J].IEEE Transactions on Industrial Informatics,2022,19(1):821-829.
[6]WANG W,HUANG H,YIN Z,et al.Smart contract token-based privacy-preserving access control system for industrial Internet of Things[J].Digital Communications and Networks,2023,9(2):337-346.
[7]SAIDI H,LABRAOUI N,ARI A A A,et al.DSMAC:Privacy-aware Decentralized Self-Management of data Access Control based on blockchain for health data[J].IEEE Access,2022,10:101011-101028.
[8]BURKHALTER L,HITHNAWI A,VIAND A,et al.Time-Crypt:Encrypted Data Stream Processing at Scale with Cryptographic Access Control [C]//17th USENIX Symposium on Networked Systems Design and Implementation.2020:1053-1062.
[9]CHOKSY P,CHAURASIA A,RAO U P,et al.Attribute based access control(ABAC) scheme with a fully flexible delegation mechanism for IoT healthcare[J].Peer-to-Peer Networking and Applications,2023,16(1):1445-1467.
[10]TAO J,CHEN X,MA J.Public Integrity Auditing for SharedDynamic Cloud Data with Group User Revocation[J].IEEE Transactions on Computers,2016,65(8):2363-2373.
[11]WU L,WANG J,ZEADALLY S,et al.Privacy-preserving auditing scheme for shared data in public clouds[J].The Journal of Supercomputing,2018,74(11):6156-6183.
[12]HÖGLUND J,FURUHED M,RAZA S.Lightweight certificate revocation for low-power IoT with end-to-end security[J].Journal of Information Security and Applications,2023,73:103424.
[13]SHAFAGH H,BURKHALTER L,RATNASAMY S,et al.Droplet:Decentralized Authorization and Access Control for Encrypted Data Streams[C]//USENIX Security Symposium.USENIX Association.2020:2469-2486.
[14]YANG Y,SHI R,LI K,et al.Multiple access control scheme for EHRs combining edge computing with smart contracts[J].Future Generation Computer Systems,2022,129:453-463.
[15]ZHANG R,LI J,LU Y,et al.Key escrow-free attribute based encryption with user revocation[J].Information Sciences,2022,600:59-72.
[16]YU K,TAN L,ALOQAILY M,et al.Blockchain-enhanced data sharing with traceable and direct revocation in IIoT[J].IEEE transactions on industrial informatics,2021,17(11):7669-7678.
[17]WIRAATMAJA C,ZHANG Y,SASABE M,et al.Cost-efficient blockchain-based access control for the internet of things[C]//2021IEEE Global Communications Conference.IEEE,2021:1-6.
[18]LI D,HAN D,CRESPI N,et al.A blockchain-based secure sto-rage and access control scheme for supply chain finance[J].The Journal of Supercomputing,2023,79(1):109-138.
[19]LIU J,LIU Z,SUN C,et al.A data transmission approach basedon ant colony optimization and threshold proxy re-encryption in wsns[J].Journal of Artificial Intelligence and Technology,2022,2(1):23-31.
[20]LIN S Y,ZHANG L,LI J,et al.A survey of application research based on blockchain smart contract[J].Wireless Networks,2022,28(2):635-690.
[21]SHI J F,WU H,GAO H R,et al.Overview of parallel execution models for blockchain smart contract transactions [J].Journal of Software,2022,33(11):4084-4106.
[22]AGRAWAL T K,ANGELIS J,KHILJI W A,et al.Demonstration of a blockchain-based framework using smart contracts for supply chain collaboration[J].International Journal of Production Research,2023,61(5):1497-1516.
[23]YIN Y Y,YE B Y,LIANG T T,et al.Research on multi-layer blockchain network model in edge computing scenario [J].Journal of Computer Science,2022,45(1):115-134.
[24]CHEN D,WANG H,ZHANG N,et al.Privacy-preserving encrypted traffic inspection with symmetric cryptographic techniques in IoT[J].IEEE Internet of Things Journal,2022,9(18):17265-17279.
[25]CASACUBERTA S,HESSE J,LEHMANN A.SoK:Oblivious Pseudorandom Functions[C]//2022 IEEE 7th European Symposium on Security and Privacy(EuroS&P).IEEE,2022:625-646.
[1] ZHOU Wenhui, PENG Qinghua, XIE Lei. Study on Adaptive Cloud-Edge Collaborative Scheduling Methods for Multi-object State Perception [J]. Computer Science, 2024, 51(9): 319-330.
[2] WANG Dong, LI Xiaoruo, ZHU Bingnan. Transaction Granularity Modifiable Consortium Blockchain Scheme Based on Dual Merkel Trees Block Structure [J]. Computer Science, 2024, 51(9): 408-415.
[3] REN Jiadong, LI Shangyang, REN Rong, ZHANG Bing, WANG Qian. Web Access Control Vulnerability Detection Approach Based on Site Maps [J]. Computer Science, 2024, 51(9): 416-424.
[4] ZANG Wenyang, LYU Jinlai. Study on Time Rotation Notary Group Model Based on Threshold Signature [J]. Computer Science, 2024, 51(8): 403-411.
[5] XIANG Yanjie, HUANG Xiaofang, XIANG Kefeng, ZHENG Ji’nan. Blockchain Certificateless Encryption Mechanism Based on National Secret Algorithm [J]. Computer Science, 2024, 51(8): 440-446.
[6] SUN Li. Application,Challenge and New Strategy of Block Chain Technology in Metaverse [J]. Computer Science, 2024, 51(7): 373-379.
[7] LI Zhiyuan, XU Binglei, ZHOU Yingyi. Blockchain Anonymous Transaction Tracking Method Based on Node Influence [J]. Computer Science, 2024, 51(7): 422-429.
[8] LIU Dong, WANG Ruijin, ZHAO Yanjun, MA Chaoyang, YUAN Haonan. Study on Key Platform of Edge Computing Server Based on ARM Architecture [J]. Computer Science, 2024, 51(6A): 230600119-8.
[9] WANG Zhongxiao, PENG Qinglan, SUN Ruoxiao, XU Xifeng, ZHENG Wanbo, XIA Yunni. Delay and Energy-aware Task Offloading Approach for Orbit Edge Computing [J]. Computer Science, 2024, 51(6A): 240100188-9.
[10] LIANG Jingyu, MA Bowen, HUANG Jiwei. Reliability-aware VNF Instance Placement in Edge Computing [J]. Computer Science, 2024, 51(6A): 230500064-6.
[11] ZHU Jun, ZHANG Guoyin, WAN Jingjing. Study on Data Security Framework Based on Identity and Blockchain Integration [J]. Computer Science, 2024, 51(6A): 230400056-5.
[12] LAN Yajie, MA Ziqiang, CHEN Jiali, MIAO Li, XU Xin. Survey on Application of Searchable Attribute-based Encryption Technology Based on Blockchain [J]. Computer Science, 2024, 51(6A): 230800016-14.
[13] SUN Jianming, ZHAO Mengxin. Survey of Application of Differential Privacy in Edge Computing [J]. Computer Science, 2024, 51(6A): 230700089-9.
[14] XUE Jianbin, DOU Jun, WANG Tao, MA Yuling. Scheme for Maximizing Secure Communication Capacity in UAV-assisted Edge Computing Networks [J]. Computer Science, 2024, 51(6A): 230800032-7.
[15] TAN Jingqi, XUE Lingyan, HUANG Haiping, CHEN Long, LI Yixuan. Data Security Management Scheme Based on Editable Medical Consortium Chain [J]. Computer Science, 2024, 51(6A): 240400056-8.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!