Abstract
The CP-ABE access control method based on blockchain realizes fine-grained access control of data and ensures the storage of ciphertext security. However, there are some problems in updating the access control policy. For example, the blockchain cannot be used as ample data storage. The ciphertext size increases with the number of attributes and the complexity of the access control policy, and the CP-ABE based on bilinear mapping is expensive to calculate. Therefore, this paper proposes dividing the ciphertext into data-related ciphertext and policy-related ciphertext, which are stored in blockchain and IPFS. It is worth noting that this paper uses the RSA-based CP-ABE encryption method, which can effectively reduce the computational cost of encryption and decryption and achieve a constant ciphertext size. In addition, we also systematically analyze and compare the advantages and costs generated by CP-ABE based on bilinear mapping and CP-ABE based on RSA. Through experimental analysis, security analysis, and formal analysis, compared with the existing access control policy update methods, the scheme proposed in this paper shows better performance when frequently updating the access control policy.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: 2007 IEEE symposium on security and privacy (SP'07), pp. 321–334. Berkeley, California (2007)
Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system. Consulted (2008)
Wen, Q., Gao, Y., Chen, Z., Wu, D.: A blockchain-based data sharing scheme in the supply chain by IIoT. In: 2019 IEEE International Conference on Industrial Cyber Physical Systems (ICPS), pp. 695–700. Taipei, China (2019)
Huang, D., Chung, C.J., Dong, Q., Luo J., Kang, M.: Building private blockchains over public blockchains (PoP) an attribute-based access control approach. In: Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, pp. 355–363. Limassol, Cyprus (2019)
Yan, B., Yu, J., Wang, Y., Guo, Q., Chai B., Liu, S.: Blockchain-based service recommendation supporting data sharing. In: International Conference on Wireless Algorithms, Systems, and Applications, pp. 580–589. Qingdao, China (2020)
Huang, S., Chen, L.W., Fam, B.B.: Data security sharing method based on CP-ABE and blockchain. Comput. Syst. App. 28(11), 79–86 (2019)
Qiu, Y.X., Zhang, H.X., Cao, Q., Zhang, J.C., Chen, X.S., Jin, H.J.: Blockchain data access control scheme based on CP-ABE algorithm. Chinese J. Netw. Inf. Secur. 6(3), 88–98 (2020)
Qin, X., Huang, Y., Yang, Z., Li, X.: A blockchain-based access control scheme with multiple attribute authorities for secure cloud data sharing. J. Syst. Architect. 112, 101854 (2021)
Yu, G., et al.: Enabling attribute revocation for fine-grained access control in blockchain-IoT systems. IEEE Trans. Eng. Manage. 67(4), 1213–1230 (2020)
Tian, Y.L., Yang, K.D., Wang, Z., Feng, T.: Algorithm of blockchain data provenance based on ABE. J. Commun. 40(11), 101–111 (2019)
Zhang, Y., He, D., Choo, K.K.R.: BaDS: blockchain-based architecture for data sharing with ABS and CP-ABE in IoT. In: Wireless Communications and Mobile Computing, pp. 1–9 (2018)
Gao, H., Ma, Z., Luo, S., Xu, Y., Wu, Z.: BSSPD: a blockchain-based security sharing scheme for personal data with fine-grained access control. In: Wireless Communications and Mobile Computing, pp. 1–20 (2021)
Benet, J.: IPFS - content addressed, versioned, P2P file system (DRAFT 3). arXiv preprint arXiv:1407.3561 (2014)
Odelu, V., Das, A.K., Khan, M.K., Choo, K.K.R., Jo, M.: Expressive CP-ABE scheme for mobile devices in IoT satisfying constant-size keys and ciphertexts. IEEE Access 5, 3273–3283 (2017)
Khandla, D., Shahy, H., Bz, M.K., Pais, A.R., Raj, N.: Expressive CP-ABE scheme satisfying constant-size keys and ciphertexts. In: IACR Cryptol. ePrint Arch, p. 1257 (2019)
Jiang, S., Liu, J., Wang, L., Yoo, S.M.: Verifiable search meets blockchain: A privacy-preserving framework for outsourced encrypted data. In: ICC 2019–2019 IEEE International Conference on Communications (ICC), pp. 1–6. Tokio, Japan (2019)
Sun, S., Du, R., Chen, S.: A secure and computable blockchain-based data sharing scheme in IoT system. Information 12(2), 47 (2021)
Li, X., Tan, M.: Electronic certificate sharing scheme with searchable attribute-based encryption on blockchain. J. Phys: Conf. Ser. 1757(1), 012161 (2021)
Sun, J., Yao, X., Wang, S., Wu, Y.: Blockchain-based secure storage and access scheme for electronic medical records in IPFS. IEEE Access 8, 59389–59401 (2020)
Pham, V.D., et al.: B-Box-a decentralized storage system using IPFS, attributed-based encryption, and blockchain. In: 2020 RIVF International Conference on Computing and Communication Technologies (RIVF), pp. 1–6. Ho Chi Minh City, Vietnam (2020)
Tan, H.B., et al.: Archival data protection and sharing method based on blockchain. J. Softw. 30(9), 2620–2635 (2019)
Mounnan, O., Mouatasim, A.E., Manad, O., Outchakoucht, A., Es-samaali H., Boubchir, L.: A novel approach based on blockchain to enhance security with dynamic policy updating. In: 2020 7th International Conference on Internet of Things: Systems, Management and Security (IOTSMS), pp. 1-6. Paris, France (2020)
Ma, W., et al.: Attribute revocable data sharing scheme based on blockchain and CP-ABE. In: Proceedings of the 4th International Conference on Computer Science and Application Engineering, pp. 1–7. Sanya, China (2020)
Guo, R., Yang, G., Shi, H., Zhang, Y., Zheng, D.: O3-R-CP-ABE: an efficient and revocable attribute-based encryption scheme in the cloud-assisted IoMT system. IEEE Internet of Things J. 8(11), 8949–8963 (2021). https://doi.org/10.1109/JIOT.2021.3055541
Herranz, J., Laguillaumie, F., Rà fols, C.: Constant size ciphertexts in threshold attribute-based encryption. In: Nguyen, P.Q., Pointcheval, D. (eds.) Public Key Cryptography – PKC 2010. LNCS, vol. 6056, pp. 19–34. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-13013-7_2
Susilo, W., Yang, G., Guo, F., Huang, Q.: Constant-size ciphertexts in threshold attribute-based encryption without dummy attributes. Inf. Sci. 429, 349–360 (2018). https://doi.org/10.1016/j.ins.2017.11.037
Ge, A., Zhang, R., Chen, C., Ma, C., Zhang, Z.: Threshold ciphertext policy attribute-based encryption with constant size ciphertexts. In: Susilo, W., Mu, Y., Seberry, J. (eds.) Information Security and Privacy. LNCS, vol. 7372, pp. 336–349. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-31448-3_25
Emura, K., Miyaji, A., Nomura, A., Omote, K., Soshi, M.: A ciphertext-policy attribute-based encryption scheme with constant ciphertext length. In: Bao, F., Li, H., Wang, G. (eds.) Information Security Practice and Experience. LNCS, vol. 5451, pp. 13–23. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-00843-6_2
Lewko, A., Okamoto, T., Sahai, A., Takashima, K., Waters, B.: Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption. In: Gilbert, H. (ed.) Advances in Cryptology – EUROCRYPT 2010. LNCS, vol. 6110, pp. 62–91. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-13190-5_4
Waters, B.: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) Public Key Cryptography – PKC 2011. LNCS, vol. 6571, pp. 53–70. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-19379-8_4
Lewko, A., Waters, B.: New proof methods for attribute-based encryption: achieving full security through selective techniques. In: Safavi-Naini, R., Canetti, R. (eds.) Advances in Cryptology – CRYPTO 2012. LNCS, vol. 7417, pp. 180–198. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-32009-5_12
Agrawal, S., Chase, M.: FAME: fast attribute-based message encryption. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp.665–682. Dallas, TX, USA (2017)
Malluhi, Q.M., Shikfa, A., Trinh, V.C.: A ciphertext-policy attribute-based encryption scheme with optimized ciphertext size and fast decryption. In: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, pp. 230–240. United Arab Emirates, Dubai (2017)
Doshi, N., Jinwala, D.C.: Fully secure ciphertext policy attribute-based encryption with constant length ciphertext and faster decryption. Sec. Commun. Netwv 7(11), 1988–2002 (2014)
Zhang, Y., Zheng, D., Chen, X., Li, J., Li, H.: Computationally efficient ciphertext-policy attribute-based encryption with constant-size ciphertexts. In: Chow, S.S.M., Liu, J.K., Hui, L.C.K., Yiu, S.M. (eds.) Provable Security. LNCS, vol. 8782, pp. 259–273. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-12475-9_18
Cheung, L., Newport, C.: Provably secure ciphertext policy ABE. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS 2007, pp. 456–465. New York, NY, USA (2007)
Zhou, Z.B., Huang, D.J.: On efficient ciphertext-policy attribute based encryption and broadcast encryption: extended abstract. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS 2010, pp. 753–755. New York, NY, USA (2010)
Guo, F., Mu, Y., Susilo, W., Wong, D.S., Varadharajan, V.: CP-ABE with constant size keys for lightweight devices. IEEE Trans. Inf. Forensics Secur. 9(5), 763–771 (2014)
ang, W., Wang, R., Guan, Z., Wu, L., Du, X.J., Guizani, M.: A lightweight attribute based encryption scheme with constant size ciphertext for Internet of Things. In: ICC 2020 IEEE International Conference on Communications (ICC), pp. 1–6. Dublin, Ireland (2020)
Acknowledgment
This paper is supported by the National Natural Science Foundation of China (61962042) and Natural Science Foundation of Inner Mongolia (2018MS06028, 2022MS06020) and Science and Technology Program of Inner Mongolia Autonomous Region (2019GG376, 2020GG0188), and Open Topic of Inner Mongolia Discipline Inspection and Supervision Big Data Laboratory (IMDBD202008).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Hao, Y., Cui, B., Li, R., Song, T., Hou, W. (2022). Research on the Update Method of CP-ABE Access Control Strategy Based on Smart Contract. In: Gao, H., Wang, X., Wei, W., Dagiuklas, T. (eds) Collaborative Computing: Networking, Applications and Worksharing. CollaborateCom 2022. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 460 . Springer, Cham. https://doi.org/10.1007/978-3-031-24383-7_27
Download citation
DOI: https://doi.org/10.1007/978-3-031-24383-7_27
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-24382-0
Online ISBN: 978-3-031-24383-7
eBook Packages: Computer ScienceComputer Science (R0)