《電子技術(shù)應(yīng)用》
您所在的位置:首頁 > 通信與網(wǎng)絡(luò) > 設(shè)計應(yīng)用 > 基于策略和屬性隱藏的區(qū)塊鏈訪問控制方法研究
基于策略和屬性隱藏的區(qū)塊鏈訪問控制方法研究
網(wǎng)絡(luò)安全與數(shù)據(jù)治理 10期
楊志謀,文 強(qiáng),張 帥,張功國,孫 銳
(1.中國人民解放軍31202部隊,廣東廣州510510; 2.重慶郵電大學(xué)通信與信息工程學(xué)院,重慶400065)
摘要: 針對訪問控制過程中缺乏對用戶隱私保護(hù)的問題,提出了一種基于策略和屬性隱藏的區(qū)塊鏈訪問控制方案。首先,基于Hyperledger Fabric平臺編寫訪問請求、屬性管理和策略管理鏈碼,搭建基本的基于屬性的訪問控制模型,實現(xiàn)了細(xì)粒度的訪問控制。其次,使用AES對稱加密算法和屬性基加密算法將資源進(jìn)行加密存儲,再將存儲地址和資源哈希上傳到區(qū)塊鏈上,確保數(shù)據(jù)的安全性和完整性。最后,使用Paillier同態(tài)加密算法將用戶屬性和訪問策略加密并上傳到區(qū)塊鏈上,確保訪問過程中用戶的隱私安全。通過方案對比和仿真實驗說明了本文方案能夠有效保護(hù)用戶的隱私。
中圖分類號:TP309
文獻(xiàn)標(biāo)識碼:A
DOI:10.19358/j.issn.2097-1788.2023.10.007
引用格式:楊志謀,文強(qiáng),張帥,等.基于策略和屬性隱藏的區(qū)塊鏈訪問控制方法研究[J].網(wǎng)絡(luò)安全與數(shù)據(jù)治理,2023,42(10):40-48.
Research on blockchain access control methods based on policy and attribute hiding
Yang Zhimou 1,Wen Qiang 1,Zhang Shuai 1,Zhang Gongguo 2,Sun Rui 2
(1.31202 Unit of People′s Liberation Army, Guangzhou 510510, China; 2. School of Communication and Information Engineering, Chongqing University of Posts and Communications, Chongqing 400065, China)
Abstract: Aiming at the lack of privacy protection in the process of access control, an access control scheme based on blockchain policy and attribute hiding is proposed. Firstly, access request, attribute management and policy management chain codes are written based on Hyperledger Fabric platform, and basic attribute based access control model is built to achieve finegrained access control. Secondly, the AES symmetric encryption algorithm and attributebased encryption algorithm are used to encrypt resources for storage, and then the storage address and resource hash are uploaded to the blockchain to ensure the security and integrity of the data. Finally, the Paillier homomorphic encryption algorithm is used to encrypt and upload user attributes and access policies to the blockchain, ensuring the privacy of users during access. Through comparison of schemes and simulation experimental results, it is proved that this scheme can effectively protect user privacy.
Key words : blockchain; access control; privacy protection; encryption algorithm

0     引言

隨著通信技術(shù)、云計算和物聯(lián)網(wǎng)等技術(shù)的飛速發(fā)展,大量的數(shù)據(jù)產(chǎn)生并存儲在了互聯(lián)網(wǎng)上,這些數(shù)據(jù)可能涉及用戶的個人隱私,一旦泄露將會對用戶安全造成巨大的威脅[1-2]。訪問控制技術(shù)作為保護(hù)數(shù)據(jù)安全的重要技術(shù)之一[3],其通過預(yù)設(shè)的訪問策略能夠有效防止未經(jīng)授權(quán)的訪問和不當(dāng)?shù)氖褂谩D壳爸髁鞯脑L問控制方案分為基于角色的訪問控制(Role Based Access Control,RBAC)[4]、基于權(quán)能的訪問控制(Capability Based Access Control,CapBAC)[5]、基于屬性的訪問控制(Attributes Based Access Control,ABAC)[6]和基于屬性基加密(Attribute Based Encryption,ABE)[7]的訪問控制。其中,屬性基加密以屬性作為決策要素,通過與、或、非和門限操作能夠制定細(xì)粒度的訪問控制策略,實現(xiàn)從一對一加密到一對多加密的提升,使得它在數(shù)據(jù)發(fā)布和數(shù)據(jù)共享方面具有良好的應(yīng)用前景。



本文詳細(xì)內(nèi)容請下載:http://theprogrammingfactory.com/resource/share/2000005737




作者信息:

楊志謀1,文強(qiáng)1,張帥1,張功國2,孫銳2

(1.中國人民解放軍31202部隊,廣東廣州510510;2.重慶郵電大學(xué)通信與信息工程學(xué)院,重慶400065)


微信圖片_20210517164139.jpg

此內(nèi)容為AET網(wǎng)站原創(chuàng),未經(jīng)授權(quán)禁止轉(zhuǎn)載。