Loading…
A Collusion-Resistant Blockchain-Enabled Data Sharing Scheme with Decryption Outsourcing under Time Restriction
With the ever-increasing demands on decentralization and transparency of cloud storage, CP-ABE (Ciphertext Policy-Attribute-Based Encryption) has become a promising technology for blockchain-enabled data sharing methods due to its flexibility. However, real-world blockchain applications usually have...
Saved in:
Published in: | Security and communication networks 2021, Vol.2021, p.1-11 |
---|---|
Main Authors: | , , , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c337t-222ee99ca71e030fcb3df7b5fdf93a914e79e88bc46dab3f478c73bf25dbe8993 |
---|---|
cites | cdi_FETCH-LOGICAL-c337t-222ee99ca71e030fcb3df7b5fdf93a914e79e88bc46dab3f478c73bf25dbe8993 |
container_end_page | 11 |
container_issue | |
container_start_page | 1 |
container_title | Security and communication networks |
container_volume | 2021 |
creator | Shen, Xieyang Huang, Chuanhe Shen, Xiajiong Shi, Jiaoli Wang, Danxin |
description | With the ever-increasing demands on decentralization and transparency of cloud storage, CP-ABE (Ciphertext Policy-Attribute-Based Encryption) has become a promising technology for blockchain-enabled data sharing methods due to its flexibility. However, real-world blockchain applications usually have some special requirements like time restrictions or power limitations. Thus, decryption outsourcing is widely used in data sharing scenarios and also causes concerns about data security. In this paper, we proposed a secure access control scheme based on CP-ABE, which could share contents during a particular time slot in blockchain-enabled data sharing systems. Specifically, we bind the time period with both ciphertexts and the keys to archive the goal of only users who have the required attributes in a particular time slot can decrypt the content. Besides, we use time slots as a token to protect the data and access control scheme when users want to outsource the decryption phase. The security analysis shows that our scheme can provide collusion resistance ability under a time restriction, and performance evaluations indicate that our scheme uses less time in decryption compared to other schemes while ensuring security. |
doi_str_mv | 10.1155/2021/7249470 |
format | article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2569272640</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2569272640</sourcerecordid><originalsourceid>FETCH-LOGICAL-c337t-222ee99ca71e030fcb3df7b5fdf93a914e79e88bc46dab3f478c73bf25dbe8993</originalsourceid><addsrcrecordid>eNp90F1LwzAUBuAiCs7pnT8g4KXW5atNczm3-QGDgZvXJU0Tm9mlM0kZ-_emTLz06pyLh_cc3iS5RfARoSybYIjRhGHKKYNnyQhxwlOIMD7_2xG9TK6830KYI8roKOmmYNa1be9NZ9N35Y0Pwgbw1HbySzbC2HRhRdWqGsxFEGDdCGfsJ1jLRu0UOJjQgLmS7rgPMQCs-uC73smB9LZWDmxMZDE3OCMHcp1caNF6dfM7x8nH82Ize02Xq5e32XSZSkJYSDHGSnEuBUMKEqhlRWrNqkzXmhPBEVWMq6KoJM1rURFNWSEZqTTO6koVnJNxcnfK3bvuu4_3y218zMaTJc5yjhnOKYzq4aSk67x3Spd7Z3bCHUsEy6HScqi0_K008vsTb4ytxcH8r38AocZ3lQ</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2569272640</pqid></control><display><type>article</type><title>A Collusion-Resistant Blockchain-Enabled Data Sharing Scheme with Decryption Outsourcing under Time Restriction</title><source>Publicly Available Content Database (Proquest) (PQ_SDU_P3)</source><source>Open Access: Wiley-Blackwell Open Access Journals</source><source>Coronavirus Research Database</source><creator>Shen, Xieyang ; Huang, Chuanhe ; Shen, Xiajiong ; Shi, Jiaoli ; Wang, Danxin</creator><contributor>Zhang, Yinghui ; Yinghui Zhang</contributor><creatorcontrib>Shen, Xieyang ; Huang, Chuanhe ; Shen, Xiajiong ; Shi, Jiaoli ; Wang, Danxin ; Zhang, Yinghui ; Yinghui Zhang</creatorcontrib><description>With the ever-increasing demands on decentralization and transparency of cloud storage, CP-ABE (Ciphertext Policy-Attribute-Based Encryption) has become a promising technology for blockchain-enabled data sharing methods due to its flexibility. However, real-world blockchain applications usually have some special requirements like time restrictions or power limitations. Thus, decryption outsourcing is widely used in data sharing scenarios and also causes concerns about data security. In this paper, we proposed a secure access control scheme based on CP-ABE, which could share contents during a particular time slot in blockchain-enabled data sharing systems. Specifically, we bind the time period with both ciphertexts and the keys to archive the goal of only users who have the required attributes in a particular time slot can decrypt the content. Besides, we use time slots as a token to protect the data and access control scheme when users want to outsource the decryption phase. The security analysis shows that our scheme can provide collusion resistance ability under a time restriction, and performance evaluations indicate that our scheme uses less time in decryption compared to other schemes while ensuring security.</description><identifier>ISSN: 1939-0114</identifier><identifier>EISSN: 1939-0122</identifier><identifier>DOI: 10.1155/2021/7249470</identifier><language>eng</language><publisher>London: Hindawi</publisher><subject>Access control ; Algorithms ; Blockchain ; Cloud computing ; COVID-19 ; Cryptography ; Data retrieval ; Encryption ; Information sharing ; Outsourcing ; Performance evaluation ; Personal health ; Security ; Security management ; Servers</subject><ispartof>Security and communication networks, 2021, Vol.2021, p.1-11</ispartof><rights>Copyright © 2021 Xieyang Shen et al.</rights><rights>Copyright © 2021 Xieyang Shen et al. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c337t-222ee99ca71e030fcb3df7b5fdf93a914e79e88bc46dab3f478c73bf25dbe8993</citedby><cites>FETCH-LOGICAL-c337t-222ee99ca71e030fcb3df7b5fdf93a914e79e88bc46dab3f478c73bf25dbe8993</cites><orcidid>0000-0001-5554-4871 ; 0000-0003-4807-823X ; 0000-0002-8908-1921</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://www.proquest.com/docview/2569272640?pq-origsite=primo$$EHTML$$P50$$Gproquest$$Hfree_for_read</linktohtml><link.rule.ids>314,780,784,4024,25753,27923,27924,27925,37012,38516,43895,44590</link.rule.ids></links><search><contributor>Zhang, Yinghui</contributor><contributor>Yinghui Zhang</contributor><creatorcontrib>Shen, Xieyang</creatorcontrib><creatorcontrib>Huang, Chuanhe</creatorcontrib><creatorcontrib>Shen, Xiajiong</creatorcontrib><creatorcontrib>Shi, Jiaoli</creatorcontrib><creatorcontrib>Wang, Danxin</creatorcontrib><title>A Collusion-Resistant Blockchain-Enabled Data Sharing Scheme with Decryption Outsourcing under Time Restriction</title><title>Security and communication networks</title><description>With the ever-increasing demands on decentralization and transparency of cloud storage, CP-ABE (Ciphertext Policy-Attribute-Based Encryption) has become a promising technology for blockchain-enabled data sharing methods due to its flexibility. However, real-world blockchain applications usually have some special requirements like time restrictions or power limitations. Thus, decryption outsourcing is widely used in data sharing scenarios and also causes concerns about data security. In this paper, we proposed a secure access control scheme based on CP-ABE, which could share contents during a particular time slot in blockchain-enabled data sharing systems. Specifically, we bind the time period with both ciphertexts and the keys to archive the goal of only users who have the required attributes in a particular time slot can decrypt the content. Besides, we use time slots as a token to protect the data and access control scheme when users want to outsource the decryption phase. The security analysis shows that our scheme can provide collusion resistance ability under a time restriction, and performance evaluations indicate that our scheme uses less time in decryption compared to other schemes while ensuring security.</description><subject>Access control</subject><subject>Algorithms</subject><subject>Blockchain</subject><subject>Cloud computing</subject><subject>COVID-19</subject><subject>Cryptography</subject><subject>Data retrieval</subject><subject>Encryption</subject><subject>Information sharing</subject><subject>Outsourcing</subject><subject>Performance evaluation</subject><subject>Personal health</subject><subject>Security</subject><subject>Security management</subject><subject>Servers</subject><issn>1939-0114</issn><issn>1939-0122</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><sourceid>COVID</sourceid><sourceid>PIMPY</sourceid><recordid>eNp90F1LwzAUBuAiCs7pnT8g4KXW5atNczm3-QGDgZvXJU0Tm9mlM0kZ-_emTLz06pyLh_cc3iS5RfARoSybYIjRhGHKKYNnyQhxwlOIMD7_2xG9TK6830KYI8roKOmmYNa1be9NZ9N35Y0Pwgbw1HbySzbC2HRhRdWqGsxFEGDdCGfsJ1jLRu0UOJjQgLmS7rgPMQCs-uC73smB9LZWDmxMZDE3OCMHcp1caNF6dfM7x8nH82Ize02Xq5e32XSZSkJYSDHGSnEuBUMKEqhlRWrNqkzXmhPBEVWMq6KoJM1rURFNWSEZqTTO6koVnJNxcnfK3bvuu4_3y218zMaTJc5yjhnOKYzq4aSk67x3Spd7Z3bCHUsEy6HScqi0_K008vsTb4ytxcH8r38AocZ3lQ</recordid><startdate>2021</startdate><enddate>2021</enddate><creator>Shen, Xieyang</creator><creator>Huang, Chuanhe</creator><creator>Shen, Xiajiong</creator><creator>Shi, Jiaoli</creator><creator>Wang, Danxin</creator><general>Hindawi</general><general>Hindawi Limited</general><scope>RHU</scope><scope>RHW</scope><scope>RHX</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>COVID</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><orcidid>https://orcid.org/0000-0001-5554-4871</orcidid><orcidid>https://orcid.org/0000-0003-4807-823X</orcidid><orcidid>https://orcid.org/0000-0002-8908-1921</orcidid></search><sort><creationdate>2021</creationdate><title>A Collusion-Resistant Blockchain-Enabled Data Sharing Scheme with Decryption Outsourcing under Time Restriction</title><author>Shen, Xieyang ; Huang, Chuanhe ; Shen, Xiajiong ; Shi, Jiaoli ; Wang, Danxin</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c337t-222ee99ca71e030fcb3df7b5fdf93a914e79e88bc46dab3f478c73bf25dbe8993</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Access control</topic><topic>Algorithms</topic><topic>Blockchain</topic><topic>Cloud computing</topic><topic>COVID-19</topic><topic>Cryptography</topic><topic>Data retrieval</topic><topic>Encryption</topic><topic>Information sharing</topic><topic>Outsourcing</topic><topic>Performance evaluation</topic><topic>Personal health</topic><topic>Security</topic><topic>Security management</topic><topic>Servers</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Shen, Xieyang</creatorcontrib><creatorcontrib>Huang, Chuanhe</creatorcontrib><creatorcontrib>Shen, Xiajiong</creatorcontrib><creatorcontrib>Shi, Jiaoli</creatorcontrib><creatorcontrib>Wang, Danxin</creatorcontrib><collection>Hindawi Publishing Complete</collection><collection>Hindawi Publishing Subscription Journals</collection><collection>Hindawi Publishing Open Access</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>AUTh Library subscriptions: ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>Coronavirus Research Database</collection><collection>ProQuest Central</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer science database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ProQuest advanced technologies & aerospace journals</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>Publicly Available Content Database (Proquest) (PQ_SDU_P3)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><jtitle>Security and communication networks</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Shen, Xieyang</au><au>Huang, Chuanhe</au><au>Shen, Xiajiong</au><au>Shi, Jiaoli</au><au>Wang, Danxin</au><au>Zhang, Yinghui</au><au>Yinghui Zhang</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Collusion-Resistant Blockchain-Enabled Data Sharing Scheme with Decryption Outsourcing under Time Restriction</atitle><jtitle>Security and communication networks</jtitle><date>2021</date><risdate>2021</risdate><volume>2021</volume><spage>1</spage><epage>11</epage><pages>1-11</pages><issn>1939-0114</issn><eissn>1939-0122</eissn><abstract>With the ever-increasing demands on decentralization and transparency of cloud storage, CP-ABE (Ciphertext Policy-Attribute-Based Encryption) has become a promising technology for blockchain-enabled data sharing methods due to its flexibility. However, real-world blockchain applications usually have some special requirements like time restrictions or power limitations. Thus, decryption outsourcing is widely used in data sharing scenarios and also causes concerns about data security. In this paper, we proposed a secure access control scheme based on CP-ABE, which could share contents during a particular time slot in blockchain-enabled data sharing systems. Specifically, we bind the time period with both ciphertexts and the keys to archive the goal of only users who have the required attributes in a particular time slot can decrypt the content. Besides, we use time slots as a token to protect the data and access control scheme when users want to outsource the decryption phase. The security analysis shows that our scheme can provide collusion resistance ability under a time restriction, and performance evaluations indicate that our scheme uses less time in decryption compared to other schemes while ensuring security.</abstract><cop>London</cop><pub>Hindawi</pub><doi>10.1155/2021/7249470</doi><tpages>11</tpages><orcidid>https://orcid.org/0000-0001-5554-4871</orcidid><orcidid>https://orcid.org/0000-0003-4807-823X</orcidid><orcidid>https://orcid.org/0000-0002-8908-1921</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1939-0114 |
ispartof | Security and communication networks, 2021, Vol.2021, p.1-11 |
issn | 1939-0114 1939-0122 |
language | eng |
recordid | cdi_proquest_journals_2569272640 |
source | Publicly Available Content Database (Proquest) (PQ_SDU_P3); Open Access: Wiley-Blackwell Open Access Journals; Coronavirus Research Database |
subjects | Access control Algorithms Blockchain Cloud computing COVID-19 Cryptography Data retrieval Encryption Information sharing Outsourcing Performance evaluation Personal health Security Security management Servers |
title | A Collusion-Resistant Blockchain-Enabled Data Sharing Scheme with Decryption Outsourcing under Time Restriction |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-29T11%3A27%3A22IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Collusion-Resistant%20Blockchain-Enabled%20Data%20Sharing%20Scheme%20with%20Decryption%20Outsourcing%20under%20Time%20Restriction&rft.jtitle=Security%20and%20communication%20networks&rft.au=Shen,%20Xieyang&rft.date=2021&rft.volume=2021&rft.spage=1&rft.epage=11&rft.pages=1-11&rft.issn=1939-0114&rft.eissn=1939-0122&rft_id=info:doi/10.1155/2021/7249470&rft_dat=%3Cproquest_cross%3E2569272640%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c337t-222ee99ca71e030fcb3df7b5fdf93a914e79e88bc46dab3f478c73bf25dbe8993%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2569272640&rft_id=info:pmid/&rfr_iscdi=true |