《電子技術(shù)應(yīng)用》
您所在的位置:首頁 > 通信与网络 > 设计应用 > 基于策略和属性隐藏的区块链访问控制方法研究
基于策略和属性隐藏的区块链访问控制方法研究
网络安全与数据治理 10期
杨志谋,文 强,张 帅,张功国,孙 锐
(1.中国人民解放军31202部队,广东广州510510; 2.重庆邮电大学通信与信息工程学院,重庆400065)
摘要: 针对访问控制过程中缺乏对用户隐私保护的问题,提出了一种基于策略和属性隐藏的区块链访问控制方案。首先,基于Hyperledger Fabric平台编写访问请求、属性管理和策略管理链码,搭建基本的基于属性的访问控制模型,实现了细粒度的访问控制。其次,使用AES对称加密算法和属性基加密算法将资源进行加密存储,再将存储地址和资源哈希上传到区块链上,确保数据的安全性和完整性。最后,使用Paillier同态加密算法将用户属性和访问策略加密并上传到区块链上,确保访问过程中用户的隐私安全。通过方案对比和仿真实验说明了本文方案能够有效保护用户的隐私。
中圖分類號(hào):TP309
文獻(xiàn)標(biāo)識(shí)碼:A
DOI:10.19358/j.issn.2097-1788.2023.10.007
引用格式:楊志謀,文強(qiáng),張帥,等.基于策略和屬性隱藏的區(qū)塊鏈訪問控制方法研究[J].網(wǎng)絡(luò)安全與數(shù)據(jù)治理,2023,42(10):40-48.
Research on blockchain access control methods based on policy and attribute hiding
Yang Zhimou 1,Wen Qiang 1,Zhang Shuai 1,Zhang Gongguo 2,Sun Rui 2
(1.31202 Unit of People′s Liberation Army, Guangzhou 510510, China; 2. School of Communication and Information Engineering, Chongqing University of Posts and Communications, Chongqing 400065, China)
Abstract: Aiming at the lack of privacy protection in the process of access control, an access control scheme based on blockchain policy and attribute hiding is proposed. Firstly, access request, attribute management and policy management chain codes are written based on Hyperledger Fabric platform, and basic attribute based access control model is built to achieve finegrained access control. Secondly, the AES symmetric encryption algorithm and attributebased encryption algorithm are used to encrypt resources for storage, and then the storage address and resource hash are uploaded to the blockchain to ensure the security and integrity of the data. Finally, the Paillier homomorphic encryption algorithm is used to encrypt and upload user attributes and access policies to the blockchain, ensuring the privacy of users during access. Through comparison of schemes and simulation experimental results, it is proved that this scheme can effectively protect user privacy.
Key words : blockchain; access control; privacy protection; encryption algorithm

0     引言

隨著通信技術(shù)、云計(jì)算和物聯(lián)網(wǎng)等技術(shù)的飛速發(fā)展,大量的數(shù)據(jù)產(chǎn)生并存儲(chǔ)在了互聯(lián)網(wǎng)上,這些數(shù)據(jù)可能涉及用戶的個(gè)人隱私,一旦泄露將會(huì)對(duì)用戶安全造成巨大的威脅[1-2]。訪問控制技術(shù)作為保護(hù)數(shù)據(jù)安全的重要技術(shù)之一[3],其通過預(yù)設(shè)的訪問策略能夠有效防止未經(jīng)授權(quán)的訪問和不當(dāng)?shù)氖褂?。目前主流的訪問控制方案分為基于角色的訪問控制(Role Based Access Control,RBAC)[4]、基于權(quán)能的訪問控制(Capability Based Access Control,CapBAC)[5]、基于屬性的訪問控制(Attributes Based Access Control,ABAC)[6]和基于屬性基加密(Attribute Based Encryption,ABE)[7]的訪問控制。其中,屬性基加密以屬性作為決策要素,通過與、或、非和門限操作能夠制定細(xì)粒度的訪問控制策略,實(shí)現(xiàn)從一對(duì)一加密到一對(duì)多加密的提升,使得它在數(shù)據(jù)發(fā)布和數(shù)據(jù)共享方面具有良好的應(yīng)用前景。



本文詳細(xì)內(nèi)容請(qǐng)下載:http://ihrv.cn/resource/share/2000005737




作者信息:

楊志謀1,文強(qiáng)1,張帥1,張功國(guó)2,孫銳2

(1.中國(guó)人民解放軍31202部隊(duì),廣東廣州510510;2.重慶郵電大學(xué)通信與信息工程學(xué)院,重慶400065)


微信圖片_20210517164139.jpg

此內(nèi)容為AET網(wǎng)站原創(chuàng),未經(jīng)授權(quán)禁止轉(zhuǎn)載。