International Journal of

ADVANCED AND APPLIED SCIENCES

EISSN: 2313-3724, Print ISSN: 2313-626X

Frequency: 12

line decor
  
line decor

 Volume 9, Issue 8 (August 2022), Pages: 28-40

----------------------------------------------

 Original Research Paper

 An efficient dynamic access control and security sharing scheme using blockchain

 Author(s): Sultan Alkhliwi *

 Affiliation(s):

 Department of Computer Science, Faculty of Science, Northern Border University, Arar, Saudi Arabia

  Full Text - PDF          XML

 * Corresponding Author. 

  Corresponding author's ORCID profile: https://orcid.org/0000-0002-3481-549X

 Digital Object Identifier: 

 https://doi.org/10.21833/ijaas.2022.08.004

 Abstract:

This study seeks to understand the role of institutions and organizations that have used cloud service providers to store and share data as ensuring third-party access to storage is a major challenge to avoid data theft and unwanted access. Hence, in this paper, Blockchain-Based Data Access and Secure Sharing Method (BDASS) is introduced to enhance security processes related to personal data through data access control and secure sharing method, the proposed method uses blockchain aggregation, file system (IPFS), dynamic access control (DAC), and ciphertext-attribute-based encryption (CP-ABE) to enhance the security of personal data. To keep the owner safe, a blockchain-based DAC is designed. To keep data storage and sharing secure, the blockchain-based CP-ABE is designed. In this proposed methodology, the data owner encrypts the data they have stored in IPFS, thus enhancing data security, which has been improved with the help of CP-ABE regarding detailed access policy and data owner. Policy parameters are managed by the DAC. In the proposed methodology, the data owner uses the blockchain to control security and access to the data. Finally, the paper has come up with a set of findings in order to achieve data security and access control for the data owner through the blockchain-based approach. To evaluate the performance of the proposed method, MATLAB was used. The proposed technology also contrasts with existing technologies, such as the Blockchain-Based Security Sharing Scheme for Personal Data (BSSPD) as well as the Rivest-Shamir-Adleman Algorithm (RSA) and Elliptic Curve Cryptography (ECC).

 © 2022 The Authors. Published by IASE.

 This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).

 Keywords: Blockchain technology, Encryption, Decryption, Access control, Data security

 Article History: Received 9 January 2022, Received in revised form 12 April 2022, Accepted 11 May 2022

 Acknowledgment 

No Acknowledgment.

 Compliance with ethical standards

 Conflict of interest: The author(s) declared no potential conflicts of interest with respect to the research, authorship, and/or publication of this article.

 Citation:

 Alkhliwi S (2022). An efficient dynamic access control and security sharing scheme using blockchain. International Journal of Advanced and Applied Sciences, 9(8): 28-40

 Permanent Link to this page

 Figures

 Fig. 1 Fig. 2 Fig. 3 Fig. 4 Fig. 5 Fig. 6 Fig. 7 Fig. 8 Fig. 9 Fig. 10 Fig. 11 Fig. 12 Fig. 13 Fig. 14 Fig. 15 Fig. 16 

 Tables

 Table 1

----------------------------------------------    

 References (25)

  1. Asuncion A and Newman D (2007). UCI machine learning repository. University of California, School of Information and Computer Science, Irvine, USA.   [Google Scholar]
  2. Campanile L, Iacono M, Marulli F, and Mastroianni M (2021). Designing a GDPR compliant blockchain-based IoV distributed information tracking system. Information Processing and Management, 58(3): 102511.‏ https://doi.org/10.1016/j.ipm.2021.102511   [Google Scholar]
  3. Chen J, Wang W, Zhou Y, Ahmed SH, and Wei W (2021). Exploiting 5G and blockchain for medical applications of drones. IEEE Network, 35(1): 30-36.‏ https://doi.org/10.1109/MNET.011.2000144   [Google Scholar]
  4. Eltayieb N, Elhabob R, Hassan A, and Li F (2020). A blockchain-based attribute-based signcryption scheme to secure data sharing in the cloud. Journal of Systems Architecture, 102: 101653. https://doi.org/10.1016/j.sysarc.2019.101653   [Google Scholar]
  5. Esposito C, Ficco M, and Gupta BB (2021). Blockchain-based authentication and authorization for smart city applications. Information Processing and Management, 58(2): 102468.‏ https://doi.org/10.1016/j.ipm.2020.102468   [Google Scholar]
  6. Ghiasi M, Dehghani M, Niknam T, Kavousi-Fard A, Siano P, and Alhelou HH (2021). Cyber-attack detection and cyber-security enhancement in smart dc-microgrid based on blockchain technology and Hilbert Huang transform. IEEE Access, 9: 29429-29440.‏ https://doi.org/10.1109/ACCESS.2021.3059042   [Google Scholar]
  7. Guo L, Yang X, and Yau WC (2021). TABE-DAC: Efficient traceable attribute-based encryption scheme with dynamic access control based on blockchain. IEEE Access, 9: 8479-8490.‏ https://doi.org/10.1109/ACCESS.2021.3049549   [Google Scholar]
  8. Guruprakash J and Koppu S (2020). EC-ElGamal and genetic algorithm-based enhancement for lightweight scalable blockchain in IoT domain. IEEE Access, 8: 141269-141281. https://doi.org/10.1109/ACCESS.2020.3013282   [Google Scholar]
  9. Honar Pajooh H, Rashid M, Alam F, and Demidenko S (2021). Multi-layer blockchain-based security architecture for internet of things. Sensors, 21(3): 772. https://doi.org/10.3390/s21030772   [Google Scholar] PMid:33498860 PMCid:PMC7865640
  10. Hussien HM, Yasin SM, Udzir NI, Ninggal MIH, and Salman S (2021). Blockchain technology in the healthcare industry: Trends and opportunities. Journal of Industrial Information Integration, 22: 100217‏. https://doi.org/10.1016/j.jii.2021.100217   [Google Scholar]
  11. Kim J and Park N (2021). Role‐based access control video surveillance mechanism modeling in smart contract environment. Transactions on Emerging Telecommunications Technologies, 33: e4227.‏ https://doi.org/10.1002/ett.4227   [Google Scholar]
  12. Kumar R and Tripathi R (2021). Scalable and secure access control policy for healthcare system using blockchain and enhanced Bell–LaPadula model. Journal of Ambient Intelligence and Humanized Computing, 12(2): 2321-2338.‏ https://doi.org/10.1007/s12652-020-02346-8   [Google Scholar]
  13. Lin C, He D, Huang X, Choo KKR, and Vasilakos AV (2018). BSeIn: A blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0. Journal of Network and Computer Applications, 116: 42-52. https://doi.org/10.1016/j.jnca.2018.05.005   [Google Scholar]
  14. Mittal A, Gupta MP, Chaturvedi M, Chansarkar SR, and Gupta S (2021). Cybersecurity enhancement through blockchain training (CEBT)–A serious game approach. International Journal of Information Management Data Insights, 1(1): 100001. https://doi.org/10.1016/j.jjimei.2020.100001   [Google Scholar]
  15. Narayanan U, Paul V, and Joseph S (2022). Decentralized blockchain based authentication for secure data sharing in Cloud-IoT. Journal of Ambient Intelligence and Humanized Computing, 13(2): 769-787. https://doi.org/10.1007/s12652-021-02929-z   [Google Scholar]
  16. Rivera Sánchez YK, Demurjian SA, and Gnirke L (2017). Attaining role-based, mandatory, and discretionary access control for services by intercepting API calls in mobile systems. In the International Conference on Web Information Systems and Technologies, Springer, Porto, Portugal: 221-248. https://doi.org/10.1007/978-3-319-93527-0_11   [Google Scholar]
  17. Wang S, Zhang Y, and Zhang Y (2018). A blockchain-based framework for data sharing with fine-grained access control in decentralized storage systems. IEEE Access, 6: 38437-38450.‏ https://doi.org/10.1109/ACCESS.2018.2851611   [Google Scholar]
  18. Wu A, Zhang Y, Zheng X, Guo R, Zhao Q, and Zheng D (2019). Efficient and privacy-preserving traceable attribute-based encryption in blockchain. Annals of Telecommunications, 74(7): 401-411. https://doi.org/10.1007/s12243-018-00699-y   [Google Scholar]
  19. Xu H, He Q, Li X, Jiang B, and Qin K (2020). BDSS-FA: A blockchain-based data security sharing platform with fine-grained access control. IEEE Access, 8: 87552-87561. https://doi.org/10.1109/ACCESS.2020.2992649   [Google Scholar]
  20. Xu Z, Zhang J, Song Z, Liu Y, Li J, and Zhou J (2021). A scheme for intelligent blockchain-based manufacturing industry supply chain management. Computing, 103(8): 1771-1790. https://doi.org/10.1007/s00607-020-00880-z   [Google Scholar]
  21. Yan Z and Lee JH (2021). BGPChain: Constructing a secure, smart, and agile routing infrastructure based on blockchain. ICT Express, 7(3): 376-379. https://doi.org/10.1016/j.icte.2020.12.005   [Google Scholar]
  22. Yazdinejad A, Parizi RM, Dehghantanha A, Zhang Q, and Choo KKR (2020). An energy-efficient SDN controller architecture for IoT networks with blockchain-based security. IEEE Transactions on Services Computing, 13(4): 625-638.‏ https://doi.org/10.1109/TSC.2020.2966970   [Google Scholar]
  23. Zhang J, Lu C, Cheng G, Guo T, Kang J, Zhang X, and Yan X (2021a). A blockchain-based trusted edge platform in edge computing environment. Sensors, 21(6): 2126.‏ https://doi.org/10.3390/s21062126   [Google Scholar] PMid:33803561 PMCid:PMC8003011
  24. Zhang Y, Liu T, Cattani C, Cui Q, and Liu S (2021b). Diffusion-based image inpainting forensics via weighted least squares filtering enhancement. Multimedia Tools and Applications, 80(20): 30725-30739.‏ https://doi.org/10.1007/s11042-021-10623-7   [Google Scholar]
  25. Zhang Y, Liu W, Xia Z, Wang Z, Liu L, Zhang W, and Fang B (2021c). Blockchain-based DNS root zone management decentralization for internet of things. Wireless Communications and Mobile Computing, 2021: 6620236‏. https://doi.org/10.1155/2021/6620236   [Google Scholar] PMid:35573891