Computer Science ›› 2022, Vol. 49 ›› Issue (5): 325-332.doi: 10.11896/jsjkx.210900075

• Information Security • Previous Articles     Next Articles

Study on Crowdsourced Testing Intellectual Property Protection Technology Based on Blockchain and Improved CP-ABE

YANG Zhen, HUANG Song, ZHENG Chang-you   

  1. Institute of Command and Control Engineering,Army Engineering University of PLA,Nanjing 210007,China
  • Received:2021-09-09 Revised:2021-12-05 Online:2022-05-15 Published:2022-05-06
  • About author:YANG Zhen,born in 1997,postgra-duate.Her main research interests include crowdsourced testing and blockchain.
    HUANG Song,born in 1970,professor,Ph.D supervisor,is a senior member of China Computer Federation.His main research interests include software engineering and software testing.
  • Supported by:
    National Key R & D Program of China(2018YFB1403400) and National Natural Science Foundation of China(61702544).

Abstract: Crowdsourced testing is the application of crowdsourcing in software testing.It performs testing in a distributed and collaborative way,which has received widespread attention.However,the open crowdsourced testing environment and centralized storage mode put the intellectual property at risk of leakage and being manipulated.In order to realize the privacy protection and trusted storage of crowdsourced testing intellectual property,this paper proposes corresponding protection methods for different intellectual property.For the test tasks and the tested codes,AES and the improved CP-ABE algorithm are used for fine-grained data access control.By outsourcing complex encryption operations to the trusted third party,the proposed algorithm reduces the computing cost of requester.Meanwhile,it also supports the dynamic attribute revocation and meets the forward and backward security.In addition,using blockchain and InterPlanetary File System (IPFS),a distributed trusted storage and consistency right confirmation method of large-scale intellectual property data is realized.It protects intellectual property data from tampering and helps to solve intellectual property disputes.Finally,the performance test and comparative evaluation verify that the encryption and decryption efficiency of this method is improved compared with previous methods,and the blockchain has a high perfor-mance.Security analysis shows that the scheme meets the security requirements.

Key words: Access control, Blockchain, CP-ABE, Crowdsourced testing, Intellectual property, Trusted storage

CLC Number: 

  • TP311.5
[1]HOWE J.The Rise of Crowdsourcing[J].Wired,2006,14(6):1-4.
[2]ZHANG X F,FENG Y,LIU D,et al.Research Progress ofCrowdsourced Software Testing[J].Journal of Software,2018,29(1):69-88.
[3]FENG J H,LI G L,FENG J H.A Survey on Crowdsourcing[J].Chinese Journal of Computers,2015,38(9):1713-1726.
[4]NAGAI Y,UCHIDA Y,SAKAZAWA S,et al.Digital watermarking for deep neural networks[J].International Journal of Multimedia Information Retrieval,2018,7(1):3-16.
[5]ZHANG Z,ZHAO L.A design of digital rights management mechanism based on blockchain technology[C]//International Conference on Blockchain.Cham:Springer,2018:32-46.
[6]LU Y,TANG Q,WANG G.Zebralancer:Private and anonymous crowdsourcing system atop open blockchain[C]//2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS).Vienna:IEEE Press,2018:853-865.
[7]SUN Z,WANG Y,CAI Z,et al.A two-stage privacy protection mechanism based on blockchain in mobile crowdsourcing[J].International Journal of Intelligent Systems,2021,36(5):2058-2080.
[8]GUO J,LI C,ZHANG G,et al.Blockchain-enabled digital rights management for multimedia resources of online education[J].Multimedia Tools and Applications,2020,79(15):9735-9755.
[9]XU Q D.Design and Implementation of Multimedia ContentCopyright Protection System on Android Platform[D].Beijing:Beijing University of Posts and Telecommunications,2014.
[10]HUANG Q L,MA Z F,FU J Y,et al.Privacy-preserving digital rights management scheme in cloud computing[J].Journal on Communications,2014,35(2):95-103.
[11]LU Y,TANG Q,WANG G.Zebralancer:Private and anony-mous crowdsourcing system atop open blockchain[C]//2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS).IEEE,2018:853-865.
[12]NAKAMOTO S.Bitcoin:A peer-to-peer electronic cash system[EB/OL].[2009-03-24].https://bitcoin.org/bitcoin.pdf.
[13]BETHENCOURT J,SAHAI A,WATERS B.Ciphertext-policy attribute-based encryption[C]//2007 IEEE Symposium on Security and Privacy (SP’07).Berkeley:IEEE Press,2007:321-334.
[14]GAO J X,SUN J M,QIN J.Traceable Outsourcing Attribute-Based Encryption with Attribute Revocation.Journal of Computer Research and Development[J].Journal of Computer Research and Development,2019,56(10):2160-2169.
[15]BANERJEE S,BERA B,DAS A K,et al.Private blockchain-envisioned multi-authority CP-ABE-based user access control scheme in IIoT[J].Computer Communications,2021,169:99-113.
[16]GUAN Z,LU X,YANG W,et al.Achieving efficient and Privacy-preserving energy trading based on blockchain and ABE in smart grid[J].Journal of Parallel and Distributed Computing,2021,147:34-45.
[17]MA X X,HUANG Y.Publicly Traceable Accountable Ciphertext Policy Attribute Based Encryption Scheme Supporting Large Univers[J].Computer Science,2020,47(S1):420-423.
[18]DAEMEN J,RIJMEN V.The design of Rijndael:AES-the advancedencryption standard[M]// Springer Science & Business Media.India:Springer,2013.
[19]HAN X,YUAN Y,WANG F Y.Security Problems on Blockchain:The State of the Art and Future Trends[J].Acta Automatica Sinica,2019,45(1):206-225.
[20]BENET J.IPFS-Content Addressed,Versioned,P2P File System[EB/OL][2014-07-14].https://arxiv.org/pdf/1407.3561.pdf.
[21]GOYAL V,PANDEY O,SAHAI A,et al.Attribute-based encryption for fine-grained access control of encrypted data[C]//Proceedings of the 13th ACM Conference on Computer and Communications Security.2006:89-98.
[22]ANDROULAKI E,BARGER A,BORTNIKOV V,et al.Hy-perledger fabric:a distributed operating system for permissioned blockchains[C]//EuroSys’18:Proceedings of the thirteenth EuroSys conference.New York:Association for Computing Machinery,2018:1-15.
[23]YIN H,XIONG Y,DENG T,et al.A privacy-preservingandidentity-based personalized recommendation scheme for encryp-ted tasks in crowdsourcing[J].IEEE Access,2019,7:138857-138871.
[1] GUO Peng-jun, ZHANG Jing-zhou, YANG Yuan-fan, YANG Shen-xiang. Study on Wireless Communication Network Architecture and Access Control Algorithm in Aircraft [J]. Computer Science, 2022, 49(9): 268-274.
[2] WANG Zi-kai, ZHU Jian, ZHANG Bo-jun, HU Kai. Research and Implementation of Parallel Method in Blockchain and Smart Contract [J]. Computer Science, 2022, 49(9): 312-317.
[3] FU Li-yu, LU Ge-hao, WU Yi-ming, LUO Ya-ling. Overview of Research and Development of Blockchain Technology [J]. Computer Science, 2022, 49(6A): 447-461.
[4] GAO Jian-bo, ZHANG Jia-shuo, LI Qing-shan, CHEN Zhong. RegLang:A Smart Contract Programming Language for Regulation [J]. Computer Science, 2022, 49(6A): 462-468.
[5] MAO Dian-hui, HUANG Hui-yu, ZHAO Shuang. Study on Automatic Synthetic News Detection Method Complying with Regulatory Compliance [J]. Computer Science, 2022, 49(6A): 523-530.
[6] LI Bo, XIANG Hai-yun, ZHANG Yu-xiang, LIAO Hao-de. Application Research of PBFT Optimization Algorithm for Food Traceability Scenarios [J]. Computer Science, 2022, 49(6A): 723-728.
[7] ZHOU Hang, JIANG He, ZHAO Yan, XIE Xiang-peng. Study on Optimal Scheduling of Power Blockchain System for Consensus Transaction ofEach Unit [J]. Computer Science, 2022, 49(6A): 771-776.
[8] WANG Si-ming, TAN Bei-hai, YU Rong. Blockchain Sharding and Incentive Mechanism for 6G Dependable Intelligence [J]. Computer Science, 2022, 49(6): 32-38.
[9] SUN Hao, MAO Han-yu, ZHANG Yan-feng, YU Ge, XU Shi-cheng, HE Guang-yu. Development and Application of Blockchain Cross-chain Technology [J]. Computer Science, 2022, 49(5): 287-295.
[10] REN Chang, ZHAO Hong, JIANG Hua. Quantum Secured-Byzantine Fault Tolerance Blockchain Consensus Mechanism [J]. Computer Science, 2022, 49(5): 333-340.
[11] FENG Liao-liao, DING Yan, LIU Kun-lin, MA Ke-lin, CHANG Jun-sheng. Research Advance on BFT Consensus Algorithms [J]. Computer Science, 2022, 49(4): 329-339.
[12] WANG Xin, ZHOU Ze-bao, YU Yun, CHEN Yu-xu, REN Hao-wen, JIANG Yi-bo, SUN Ling-yun. Reliable Incentive Mechanism for Federated Learning of Electric Metering Data [J]. Computer Science, 2022, 49(3): 31-38.
[13] ZHANG Ying-li, MA Jia-li, LIU Zi-ang, LIU Xin, ZHOU Rui. Overview of Vulnerability Detection Methods for Ethereum Solidity Smart Contracts [J]. Computer Science, 2022, 49(3): 52-61.
[14] YANG Xin-yu, PENG Chang-gen, YANG Hui, DING Hong-fa. Rational PBFT Consensus Algorithm with Evolutionary Game [J]. Computer Science, 2022, 49(3): 360-370.
[15] FAN Jia-xing, WANG Zhi-wei. Hierarchical Anonymous Voting Scheme Based on Threshold Ring Signature [J]. Computer Science, 2022, 49(1): 321-327.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!