Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Research on the Update Method of CP-ABE Access Control Strategy Based on Smart Contract

  • Conference paper
  • First Online:
Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2022)

Abstract

The CP-ABE access control method based on blockchain realizes fine-grained access control of data and ensures the storage of ciphertext security. However, there are some problems in updating the access control policy. For example, the blockchain cannot be used as ample data storage. The ciphertext size increases with the number of attributes and the complexity of the access control policy, and the CP-ABE based on bilinear mapping is expensive to calculate. Therefore, this paper proposes dividing the ciphertext into data-related ciphertext and policy-related ciphertext, which are stored in blockchain and IPFS. It is worth noting that this paper uses the RSA-based CP-ABE encryption method, which can effectively reduce the computational cost of encryption and decryption and achieve a constant ciphertext size. In addition, we also systematically analyze and compare the advantages and costs generated by CP-ABE based on bilinear mapping and CP-ABE based on RSA. Through experimental analysis, security analysis, and formal analysis, compared with the existing access control policy update methods, the scheme proposed in this paper shows better performance when frequently updating the access control policy.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: 2007 IEEE symposium on security and privacy (SP'07), pp. 321–334. Berkeley, California (2007)

    Google Scholar 

  2. Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system. Consulted (2008)

    Google Scholar 

  3. Wen, Q., Gao, Y., Chen, Z., Wu, D.: A blockchain-based data sharing scheme in the supply chain by IIoT. In: 2019 IEEE International Conference on Industrial Cyber Physical Systems (ICPS), pp. 695–700. Taipei, China (2019)

    Google Scholar 

  4. Huang, D., Chung, C.J., Dong, Q., Luo J., Kang, M.: Building private blockchains over public blockchains (PoP) an attribute-based access control approach. In: Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, pp. 355–363. Limassol, Cyprus (2019)

    Google Scholar 

  5. Yan, B., Yu, J., Wang, Y., Guo, Q., Chai B., Liu, S.: Blockchain-based service recommendation supporting data sharing. In: International Conference on Wireless Algorithms, Systems, and Applications, pp. 580–589. Qingdao, China (2020)

    Google Scholar 

  6. Huang, S., Chen, L.W., Fam, B.B.: Data security sharing method based on CP-ABE and blockchain. Comput. Syst. App. 28(11), 79–86 (2019)

    Google Scholar 

  7. Qiu, Y.X., Zhang, H.X., Cao, Q., Zhang, J.C., Chen, X.S., Jin, H.J.: Blockchain data access control scheme based on CP-ABE algorithm. Chinese J. Netw. Inf. Secur. 6(3), 88–98 (2020)

    Google Scholar 

  8. Qin, X., Huang, Y., Yang, Z., Li, X.: A blockchain-based access control scheme with multiple attribute authorities for secure cloud data sharing. J. Syst. Architect. 112, 101854 (2021)

    Article  Google Scholar 

  9. Yu, G., et al.: Enabling attribute revocation for fine-grained access control in blockchain-IoT systems. IEEE Trans. Eng. Manage. 67(4), 1213–1230 (2020)

    Article  Google Scholar 

  10. Tian, Y.L., Yang, K.D., Wang, Z., Feng, T.: Algorithm of blockchain data provenance based on ABE. J. Commun. 40(11), 101–111 (2019)

    Google Scholar 

  11. Zhang, Y., He, D., Choo, K.K.R.: BaDS: blockchain-based architecture for data sharing with ABS and CP-ABE in IoT. In: Wireless Communications and Mobile Computing, pp. 1–9 (2018)

    Google Scholar 

  12. Gao, H., Ma, Z., Luo, S., Xu, Y., Wu, Z.: BSSPD: a blockchain-based security sharing scheme for personal data with fine-grained access control. In: Wireless Communications and Mobile Computing, pp. 1–20 (2021)

    Google Scholar 

  13. Benet, J.: IPFS - content addressed, versioned, P2P file system (DRAFT 3). arXiv preprint arXiv:1407.3561 (2014)

  14. Odelu, V., Das, A.K., Khan, M.K., Choo, K.K.R., Jo, M.: Expressive CP-ABE scheme for mobile devices in IoT satisfying constant-size keys and ciphertexts. IEEE Access 5, 3273–3283 (2017)

    Article  Google Scholar 

  15. Khandla, D., Shahy, H., Bz, M.K., Pais, A.R., Raj, N.: Expressive CP-ABE scheme satisfying constant-size keys and ciphertexts. In: IACR Cryptol. ePrint Arch, p. 1257 (2019)

    Google Scholar 

  16. Jiang, S., Liu, J., Wang, L., Yoo, S.M.: Verifiable search meets blockchain: A privacy-preserving framework for outsourced encrypted data. In: ICC 2019–2019 IEEE International Conference on Communications (ICC), pp. 1–6. Tokio, Japan (2019)

    Google Scholar 

  17. Sun, S., Du, R., Chen, S.: A secure and computable blockchain-based data sharing scheme in IoT system. Information 12(2), 47 (2021)

    Article  Google Scholar 

  18. Li, X., Tan, M.: Electronic certificate sharing scheme with searchable attribute-based encryption on blockchain. J. Phys: Conf. Ser. 1757(1), 012161 (2021)

    Google Scholar 

  19. Sun, J., Yao, X., Wang, S., Wu, Y.: Blockchain-based secure storage and access scheme for electronic medical records in IPFS. IEEE Access 8, 59389–59401 (2020)

    Article  Google Scholar 

  20. Pham, V.D., et al.: B-Box-a decentralized storage system using IPFS, attributed-based encryption, and blockchain. In: 2020 RIVF International Conference on Computing and Communication Technologies (RIVF), pp. 1–6. Ho Chi Minh City, Vietnam (2020)

    Google Scholar 

  21. Tan, H.B., et al.: Archival data protection and sharing method based on blockchain. J. Softw. 30(9), 2620–2635 (2019)

    Google Scholar 

  22. Mounnan, O., Mouatasim, A.E., Manad, O., Outchakoucht, A., Es-samaali H., Boubchir, L.: A novel approach based on blockchain to enhance security with dynamic policy updating. In: 2020 7th International Conference on Internet of Things: Systems, Management and Security (IOTSMS), pp. 1-6. Paris, France (2020)

    Google Scholar 

  23. Ma, W., et al.: Attribute revocable data sharing scheme based on blockchain and CP-ABE. In: Proceedings of the 4th International Conference on Computer Science and Application Engineering, pp. 1–7. Sanya, China (2020)

    Google Scholar 

  24. Guo, R., Yang, G., Shi, H., Zhang, Y., Zheng, D.: O3-R-CP-ABE: an efficient and revocable attribute-based encryption scheme in the cloud-assisted IoMT system. IEEE Internet of Things J. 8(11), 8949–8963 (2021). https://doi.org/10.1109/JIOT.2021.3055541

    Article  Google Scholar 

  25. Herranz, J., Laguillaumie, F., Ràfols, C.: Constant size ciphertexts in threshold attribute-based encryption. In: Nguyen, P.Q., Pointcheval, D. (eds.) Public Key Cryptography – PKC 2010. LNCS, vol. 6056, pp. 19–34. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-13013-7_2

    Chapter  Google Scholar 

  26. Susilo, W., Yang, G., Guo, F., Huang, Q.: Constant-size ciphertexts in threshold attribute-based encryption without dummy attributes. Inf. Sci. 429, 349–360 (2018). https://doi.org/10.1016/j.ins.2017.11.037

    Article  MATH  Google Scholar 

  27. Ge, A., Zhang, R., Chen, C., Ma, C., Zhang, Z.: Threshold ciphertext policy attribute-based encryption with constant size ciphertexts. In: Susilo, W., Mu, Y., Seberry, J. (eds.) Information Security and Privacy. LNCS, vol. 7372, pp. 336–349. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-31448-3_25

    Chapter  Google Scholar 

  28. Emura, K., Miyaji, A., Nomura, A., Omote, K., Soshi, M.: A ciphertext-policy attribute-based encryption scheme with constant ciphertext length. In: Bao, F., Li, H., Wang, G. (eds.) Information Security Practice and Experience. LNCS, vol. 5451, pp. 13–23. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-00843-6_2

    Chapter  Google Scholar 

  29. Lewko, A., Okamoto, T., Sahai, A., Takashima, K., Waters, B.: Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption. In: Gilbert, H. (ed.) Advances in Cryptology – EUROCRYPT 2010. LNCS, vol. 6110, pp. 62–91. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-13190-5_4

    Chapter  Google Scholar 

  30. Waters, B.: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) Public Key Cryptography – PKC 2011. LNCS, vol. 6571, pp. 53–70. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-19379-8_4

    Chapter  Google Scholar 

  31. Lewko, A., Waters, B.: New proof methods for attribute-based encryption: achieving full security through selective techniques. In: Safavi-Naini, R., Canetti, R. (eds.) Advances in Cryptology – CRYPTO 2012. LNCS, vol. 7417, pp. 180–198. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-32009-5_12

    Chapter  Google Scholar 

  32. Agrawal, S., Chase, M.: FAME: fast attribute-based message encryption. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp.665–682. Dallas, TX, USA (2017)

    Google Scholar 

  33. Malluhi, Q.M., Shikfa, A., Trinh, V.C.: A ciphertext-policy attribute-based encryption scheme with optimized ciphertext size and fast decryption. In: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, pp. 230–240. United Arab Emirates, Dubai (2017)

    Google Scholar 

  34. Doshi, N., Jinwala, D.C.: Fully secure ciphertext policy attribute-based encryption with constant length ciphertext and faster decryption. Sec. Commun. Netwv 7(11), 1988–2002 (2014)

    Article  Google Scholar 

  35. Zhang, Y., Zheng, D., Chen, X., Li, J., Li, H.: Computationally efficient ciphertext-policy attribute-based encryption with constant-size ciphertexts. In: Chow, S.S.M., Liu, J.K., Hui, L.C.K., Yiu, S.M. (eds.) Provable Security. LNCS, vol. 8782, pp. 259–273. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-12475-9_18

    Chapter  Google Scholar 

  36. Cheung, L., Newport, C.: Provably secure ciphertext policy ABE. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS 2007, pp. 456–465. New York, NY, USA (2007)

    Google Scholar 

  37. Zhou, Z.B., Huang, D.J.: On efficient ciphertext-policy attribute based encryption and broadcast encryption: extended abstract. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS 2010, pp. 753–755. New York, NY, USA (2010)

    Google Scholar 

  38. Guo, F., Mu, Y., Susilo, W., Wong, D.S., Varadharajan, V.: CP-ABE with constant size keys for lightweight devices. IEEE Trans. Inf. Forensics Secur. 9(5), 763–771 (2014)

    Article  Google Scholar 

  39. ang, W., Wang, R., Guan, Z., Wu, L., Du, X.J., Guizani, M.: A lightweight attribute based encryption scheme with constant size ciphertext for Internet of Things. In: ICC 2020 IEEE International Conference on Communications (ICC), pp. 1–6. Dublin, Ireland (2020)

    Google Scholar 

Download references

Acknowledgment

This paper is supported by the National Natural Science Foundation of China (61962042) and Natural Science Foundation of Inner Mongolia (2018MS06028, 2022MS06020) and Science and Technology Program of Inner Mongolia Autonomous Region (2019GG376, 2020GG0188), and Open Topic of Inner Mongolia Discipline Inspection and Supervision Big Data Laboratory (IMDBD202008).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bo Cui .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Hao, Y., Cui, B., Li, R., Song, T., Hou, W. (2022). Research on the Update Method of CP-ABE Access Control Strategy Based on Smart Contract. In: Gao, H., Wang, X., Wei, W., Dagiuklas, T. (eds) Collaborative Computing: Networking, Applications and Worksharing. CollaborateCom 2022. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 460 . Springer, Cham. https://doi.org/10.1007/978-3-031-24383-7_27

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-24383-7_27

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-24382-0

  • Online ISBN: 978-3-031-24383-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics