信息网络安全 ›› 2022, Vol. 22 ›› Issue (11): 17-23.doi: 10.3969/j.issn.1671-1122.2022.11.003
收稿日期:
2022-06-18
出版日期:
2022-11-10
发布日期:
2022-11-16
通讯作者:
姚亚宁
E-mail:2832644550@qq.com
作者简介:
张学旺(1974—),男,湖南,副教授,博士,主要研究方向为区块链、物联网、数据安全、隐私保护|姚亚宁(1998—),男,河南,硕士研究生,主要研究方向为区块链、互联网软件及安全技术|黎志鸿(1997—),男,四川,硕士研究生,主要研究方向为区块链、互联网软件及安全技术|张豪(1998—),男,湖南,硕士研究生,主要研究方向为区块链、互联网软件及安全技术
基金资助:
ZHANG Xuewang1,2, YAO Yaning1(), LI Zhihong1, ZHANG Hao1
Received:
2022-06-18
Online:
2022-11-10
Published:
2022-11-16
Contact:
YAO Yaning
E-mail:2832644550@qq.com
摘要:
针对现有数据共享方案效率低及联盟链存储压力大的问题,文章提出一种基于联盟链和Asmuth-Bloom秘密共享算法的数据共享方案。该方案通过细粒度访问控制解决敏感数据泄露问题,并提高共享过程中的秘密重构效率;同时通过星际文件系统实现共享数据的安全存储,有效降低联盟链各节点的存储压力。安全性分析及实验结果表明,该方案具有正确性、安全性和高效性。
中图分类号:
张学旺, 姚亚宁, 黎志鸿, 张豪. 基于联盟链和Asmuth-Bloom秘密共享算法的数据共享方案[J]. 信息网络安全, 2022, 22(11): 17-23.
ZHANG Xuewang, YAO Yaning, LI Zhihong, ZHANG Hao. Data Sharing Scheme Based on Consortium Blockchain and Asmuth-Bloom Secret Sharing Algorithm[J]. Netinfo Security, 2022, 22(11): 17-23.
[1] | DING Xiaowei, SU Xinning. Financial Security Intelligence Analysis Based on Blockchain Driven Trustable Big Data and AI[J]. Journal of the China Society for Scientific and Technical Information, 2019, 38(12): 1297-1309. |
丁晓蔚, 苏新宁. 基于区块链可信大数据人工智能的金融安全情报分析[J]. 情报学报, 2019, 38(12):1297-1309. | |
[2] |
WANG Zhijie, HUANG Dijiang, ZHU Yan, et al. Efficient Attribute-Based Comparable Data Access Control[J]. IEEE Transactions on Computers, 2015, 64(12): 3430-3443.
doi: 10.1109/TC.2015.2401033 URL |
[3] |
JUNG T, LI Xiangyang, WAN Zhiguo, et al. Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attribute-Based Encryption[J]. IEEE Transactions on Information Forensics and Security, 2014, 10(1): 190-199.
doi: 10.1109/TIFS.2014.2368352 URL |
[4] |
GAO Sheng, PIAO Guirong, ZHU Jianming, et al. TrustAccess: A Trustworthy Secure Ciphertext-Policy and Attribute Hiding Access Control Scheme Based on Blockchain[J]. IEEE Transactions on Vehicular Technology, 2020, 69(6): 5784-5798.
doi: 10.1109/TVT.2020.2967099 URL |
[5] | HUANG Sui, CHEN Liwei, FAN Bingbing. Data Security Sharing Method Based on CP-ABE and Blockchain[J]. Computer System & Applications, 2019, 28(11): 79-86. |
黄穗, 陈丽炜, 范冰冰. 基于CP-ABE和区块链的数据安全共享方法[J]. 计算机系统应用, 2019, 28(11):79-86. | |
[6] | JEMEL M, SERHROUCHNI A. Decentralized Access Control Mechanism with Temporal Dimension Based on Blockchain[C]// IEEE. 2017 IEEE 14th International Conference on E-Business Engineering(ICEBE). New York:IEEE, 2017: 177-182. |
[7] | LI Xuelian, ZHANG Xiachuan, GAO Juntao, et al. Blockchain Data Sharing Scheme Supporting Attribute and Proxy Re-Encryption[J]. Journal of Xidian University, 2022, 49(1): 1-16. |
李雪莲, 张夏川, 高军涛, 等. 支持属性和代理重加密的区块链数据共享方案[J]. 西安电子科技大学学报, 2022, 49(1):1-16. | |
[8] |
WANG Mengyu, YIN Xinchun, NING Jianting. Lightweight Medical Data Sharing Scheme with Access Policy Hiding and Key Tracking[J]. Computer Science, 2022, 49(3): 77-85.
doi: 10.11896/jsjkx.210800001 |
王梦宇, 殷新春, 宁建廷. 支持访问策略隐藏和密钥追踪的轻量级医疗数据共享方案[J]. 计算机科学, 2022, 49(3):77-85.
doi: 10.11896/jsjkx.210800001 |
|
[9] | NIU Shufen, SONG Mi, FANG Lizhi, et al. Cloud Storage Data Sharing Based on Attribute Encryption in Smart Healthcare[J]. Journal of Electronics & Information Technology, 2022, 44(1): 107-117. |
牛淑芬, 宋蜜, 方丽芝, 等. 智慧医疗中基于属性加密的云存储数据共享[J]. 电子与信息学报, 2022, 44(1):107-117. | |
[10] | FENG Jingyu, WANG Tao, YU Tingting, et al. A Secure Medical Data Scheme Based on Multi-Clouds and Multi-Chains Collaboration[J]. Netinfo Security, 2022, 22(1): 9-18. |
冯景瑜, 汪涛, 于婷婷, 等. 基于多云多链协同的医疗数据安全共享机制[J]. 信息网络安全, 2022, 22(1):9-18. | |
[11] | ZHANG Lei, ZHENG Zhiyong, YUAN Yong. A Controllable Sharing Model for Electronic Health Records Based on Blockchain[J]. Acta Automatica Sinica, 2021, 47(9): 2143-2153. |
张磊, 郑志勇, 袁勇. 基于区块链的电子医疗病历可控共享模型[J]. 自动化学报, 2021, 47(9):2143-2153. | |
[12] | YING Zuobin, SI Yuanping, MA Jianfeng, et al. Blockchain-Based Distributed HER Fine-Grained Traceability Scheme[J]. Journal of Communications, 2021, 42(5): 205-215. |
应作斌, 斯元平, 马建峰, 等. 基于区块链的分布式EHR细粒度可追溯方案[J]. 通信学报, 2021, 42(5):205-215. | |
[13] | TAN Haibo, ZHOU Tong, ZHAO He, et al. Archival Data Protection and Sharing Method Based on Blockchain[J]. Journal of Software, 2019, 30(9): 2620-2635. |
谭海波, 周桐, 赵赫, 等. 基于区块链的档案数据保护与共享方法[J]. 软件学报, 2019, 30(9):2620-2635. | |
[14] | PENG Peifu, ZHANG Guifang, HU Bin. Watermarking Algorithm of Database Based on Expanded Asmuth-Bloom Scheme[J]. Computer Engineering and Application, 2007(7): 179-181. |
彭沛夫, 张桂芳, 胡斌. 基于扩展的Asmuth-Bloom体系的数据库水印算法[J]. 计算机工程与应用, 2007(7):179-181. | |
[15] | ZHANG Guifang, PENG Peifu. A Watermarking Algorithm of Database Based on Improved Sharing Secret Scheme[C]// IEEE. 2010 International Conference on Multimedia Technology. New York: IEEE, 2010: 1-2. |
[16] | LUO Yangxia, MA Jun, ZHANG Zhigang, et al. Dynamic Graph Software Watermark Algorithm Based on Threshold Scheme[J]. Computer Engineering, 2009, 35(1): 153-155, 167. |
罗养霞, 马君, 张志刚, 等. 基于门限方案的动态图软件水印算法[J]. 计算机工程, 2009, 35(1):153-155,167. | |
[17] | ZHU Jianzhong, YAO Zhiqiang. Digital Watermarking Technique Based on Asmuth-Bloom in Wavelet Domain[J]. Netinfo Security, 2012, 12(12): 15-17. |
朱建忠, 姚志强. 基于Asmuth-Bloom门限方案的小波域数字水印技术[J]. 信息网络安全, 2012, 12(12):15-17. | |
[18] | NAKAMOTO S. Bitcoin: A Peer-to-Peer Electronic Cash System[EB/OL]. [2022-03-11]. |
[19] | RESHMA V, GLADWIN S J, THIRUVENKATESAN C. Pairing-Free CP-ABE based Cryptography Combined with Steganography for Multimedia Applications[C]// IEEE. 2019 International Conference on Communication and Signal Processing(ICCSP). New York:IEEE, 2019: 501-505. |
[20] | LI Ning, YAN Zheng, WANG Minjun, et al. Securing Communication Data in Pervasive Social Networking Based on Trust with KP-ABE[J]. ACM Transactions on Cyber-Physical Systems, 2018, 3(1): 1-23. |
[21] |
ASMUTH C, BLOOM J. A Modular Approach to Key Safeguarding[J]. IEEE Transactions on Information Theory, 1983, 29(2): 208-210.
doi: 10.1109/TIT.1983.1056651 URL |
[22] | YU Jingang, ZHANG Hong, LI Shu, et al. Data Sharing Model for Internet of Things Based on Blockchain[J]. Journal of Chinese Computer Systems, 2019, 40(11): 2324-2329. |
于金刚, 张弘, 李姝, 等. 基于区块链的物联网数据共享模型[J]. 小型微型计算机系统, 2019, 40(11):2324-2329. | |
[23] |
LI Ruixuan, SHEN Chenglin, HE Heng, et al. A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing[J]. IEEE Transactions on Cloud Computing, 2017, 6(2): 344-357.
doi: 10.1109/TCC.2017.2649685 URL |
[24] | SHEN Xueli, LYU Yingnan. Research on File Hierarchy Attribute Encryption of Hidden Access Structure[J]. Application Research of Computers, 2019, 36(1): 239-242. |
沈学利, 吕莹楠. 一种隐藏访问结构的文件层次属性加密研究[J]. 计算机应用研究, 2019, 36(1):239-242. | |
[25] | CHENG Xiwen, QU Fengzhong. Ocean Data Sharing Based on Blockchain[C]// IEEE. 2021 IEEE 6th International Conference on Big Data Analytics(ICBDA). New York:IEEE, 2021: 155-159. |
[26] |
JIA Xingxing, GUO Yusheng, LUO Xiangyang, et al. A Perfect Secret Sharing Scheme for General Access Structures[J]. Information Sciences, 2022, 595: 54-69.
doi: 10.1016/j.ins.2022.02.016 URL |
[1] | 于克辰, 郭莉, 阴宏伟, 燕雪松. 面向数据中心场景的基于区块链与博弈论的高价值数据共享模型[J]. 信息网络安全, 2022, 22(6): 73-85. |
[2] | 陈彬杰, 魏福山, 顾纯祥. 基于KNN的具有隐私保护功能的区块链异常交易检测[J]. 信息网络安全, 2022, 23(3): 78-84. |
[3] | 侯雨桐, 马兆丰, 罗守山. 基于区块链的数据安全共享与受控分发技术研究与实现[J]. 信息网络安全, 2022, 22(2): 55-63. |
[4] | 芦效峰, 付淞兵. 属性基加密和区块链结合的可信数据访问控制方案[J]. 信息网络安全, 2021, 21(3): 7-8. |
[5] | 于克辰, 郭莉, 姚萌萌. 基于区块链的高价值数据共享系统设计[J]. 信息网络安全, 2021, 21(11): 75-84. |
[6] | 汪金苗, 谢永恒, 王国威, 李易庭. 基于属性基加密的区块链隐私保护与访问控制方法[J]. 信息网络安全, 2020, 20(9): 47-51. |
[7] | 李莉, 曾庆贤, 文义红, 王士成. 基于区块链与代理重加密的数据共享方案[J]. 信息网络安全, 2020, 20(8): 16-24. |
[8] | 施国峰, 张兴兰. 面向云存储的支持范围密文搜索的属性基加密方案[J]. 信息网络安全, 2020, 20(6): 75-81. |
[9] | 刘鹏, 何倩, 刘汪洋, 程序. 支持撤销属性和外包解密的CP-ABE方案[J]. 信息网络安全, 2020, 20(3): 90-97. |
[10] | 彭如月, 马兆丰, 罗守山. 基于区块链的数字内容服务与安全监管技术研究与实现[J]. 信息网络安全, 2020, 20(10): 49-56. |
[11] | 许盛伟, 王飞杰. 多机构授权下可追踪可隐藏的属性基加密方案[J]. 信息网络安全, 2020, 20(1): 33-39. |
[12] | 郑敏, 王虹, 刘洪, 谭冲. 区块链共识算法研究综述[J]. 信息网络安全, 2019, 19(7): 8-24. |
[13] | 秦中元, 韩尹, 张群芳, 朱雪金. 一种改进的多私钥生成中心云存储访问控制方案[J]. 信息网络安全, 2019, 19(6): 11-18. |
[14] | 闫玺玺, 张棋超, 汤永利, 黄勤龙. 支持叛逆者追踪的密文策略属性基加密方案[J]. 信息网络安全, 2019, 19(5): 47-53. |
[15] | 董庆贺, 何倩, 江炳城, 刘鹏. 面向云数据库的多租户属性基安全隔离与数据保护方案[J]. 信息网络安全, 2018, 18(7): 60-68. |
阅读次数 | ||||||
全文 |
|
|||||
摘要 |
|
|||||