Blockchain-Based Access Control and Data Sharing Mechanism in Cloud Decentralized Storage System
Keywords:Data sharing, cloud storage system, Blockchain, smart agreement, Interplanetary File System (IPFS).
Access control is a major factor in enhancing data security in the cloud storage system. However, the existing data sharing and the access control method have privacy data leakage and key abuse, which is a major challenge in the research community. Therefore, an effective method named Blockchain-based access control and data sharing approach is developed in the cloud storage system to increase data security. The proposed Blockchain-based access control and data sharing approach effectively solve single-point failure in the cloud system. It provides more benefits by increasing the throughput and reducing the cost. The Data user (DU) makes the registration request using the ID and password and forwards it to the Data Owner (DO), which processes the request and authenticates the Data user. The information of the data owner is embedded in the transactional blockchain using the encrypted master key. The Data owner achieves the data encryption process, and encrypted files are uploaded to the Interplanetary File System (IPFS). Based on the encrypted file location and encrypted key, the Data owner generates the ciphertext metadata and is embedded in the transactional blockchain. The proposed Blockchain-based access control and data sharing approach achieved better performance using the metrics, like a better genuine user detection rate of 95% and lower responsiveness of 25sec with the blockchain of 100 sizes.
Rajput, AR, Li, Q., Ahvanooey, M.T. and Masood, I., “EACMS: Emergency Access Control Management System for Personal Health Record based on Blockchain”, IEEE Access. 2019.
Ding, S., Cao, J., Li, C., Fan, K. and Li, H., “A Novel Attribute-Based Access Control Scheme Using Block chain for IoT”, IEEE Access, vol. 7, pp. 38431–38441, 2019.
Ma, M., Shi, G. and Li, F., “Privacy-Oriented Blockchain-based Distributed Key Management Architecture for Hierarchical Access Control in the IoT Scenario”, IEEE Access, vol. 7, pp. 34045–34059, 2019.
Ouaddah, A., Elkalam, A.A. and Ouahman, A.A., “Towards a novel privacy-preserving access control model based on blockchain technology in IoT”, In Europe and MENA Cooperation Advances in Information and Communication Technologies, pp. 523–533, Springer, Cham, 2017.
Ali, G., Ahmad, N., Cao, Y., Asif, M., Cruickshank, H. and Ali, Q.E., “Blockchain based Permission Delegation and Access Control in Internet of Things (BACI)”, Computers & Security, 2019.
Dagher, G.G., Mohler, J., Milojkovic, M. and Marella, P.B., “Ancile: Privacy-preserving framework for access control and interoperability of electronic health records using blockchain technology”, Sustainable Cities and Society, vol. 39, pp. 283–297, 2018.
Lin, C., He, D., Huang, X., Choo, K.K.R. and Vasilakos, A.V., “BSeIn: A blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0”, Journal of Network and Computer Applications, vol. 116, pp. 42–52, 2018.
Wang, S., Zhang, Y. and Zhang, Y., “A blockchain-based framework for data sharing with fine-grained access control in decentralized storage systems”, IEEE Access, vol. 6, pp. 38437–38450, 2018.
Benchoufi, M. and Ravaud, P., “Blockchain technology for improving clinical research quality”, Trials, vol. 18, no. 1, p. 335, 2017.
Es-Samaali, H., Outchakoucht, A. and Leroy, J.P., “A blockchain-based access control for big data”, International Journal of Computer Networks and Communications Security, vol. 5, no. 7, p. 137, 2017.
Iansiti, M. and Lakhani, K.R., “The truth about blockchain”, Harvard Business Review, vol. 95, no. 1, pp. 118–127, 2017.
R. Chen, I.P. Tu, K.E. Chuang, Q.X. Lin, S.W. Liao and W. Liao, “Endex: Degree of Mining Power Decentralization for Proof-of-Work Based Blockchain Systems,” IEEE Network, vol. 34, no. 6, pp. 266–271, 2020.
Rahulamathavan, Y., Phan, R.C.W., Rajarajan, M., Misra, S. and Kondoz, A., “Privacy-preserving blockchain based IoT ecosystem using attribute-based encryption”, IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS), pp. 1–6, December 2017.
Dillon, T., Wu, C. and Chang, E., “Cloud computing: issues and challenges”, IEEE international conference on advanced information networking and applications, pp. 27–33, April 2010.
Ammar Ayman Battah, Mohammad Moussa Madine,Hamad Alzaabi, Ibrar Yaqoob, Khaled Salah, And Raja Jayaraman, “Blockchain-Based Multi-Party Authorization for Accessing IPFS Encrypted Data”, IEEE Access Vol. 8, 2020.
Umesh Bodkhe, Sudeep Tanwar, Karan Parekh, Pimal Khanpara, Sudhanshu Tyagi, Neeraj Kumar, and Mamoun Alazab, “Blockchain for Industry 4.0: A Comprehensive Review”, IEEE Access, vol. 8. 2020.
Seyed Mojtaba Hosseini Bamakan, Amirhossein Motavali, Alireza Babaei Bondarti, “A survey of blockchain consensus algorithms performance evaluation criteria”, Expert Systems with Applications, Vol. 154, 2020.
Adia Khalid, Muhammad Sohaib Iftikhar, A.s. Al-Mogren, Rabiya Khalid, Muhammad Khalil Afzal, and Nadeem Javaid, A Blockchain-based Incentive Provisioning Scheme for Traffic Event Validation and Information Storage in VANETs”, Information Processing & Management, vol. 58, No. 2, 2020.
Christidis, K. and Devetsikiotis, M., “Blockchains and smart contracts for the internet of things”, IEEE Access, vol. 4, pp. 2292–2303, 2016.
Islam, S.H., Khan, M.K. and Al-Khouri, A.M., “Anonymous and provably secure certificateless multireceiver encryption without bilinear pairing”, Security and communication networks, vol. 8, no. 13, pp. 2214–2231, 2015.
Hong Xu, Qian He, Xuecong Li, Bingcheng Jiang, and Kuangyu Qin, “BDSS-FA: A Blockchain-Based Data Security Sharing Platform With Fine-Grained Access Control”, IEEE Access, vol. 8, 2020.
Caixia Yang, Liang Tan, Na Shi, Bolei Xu, Yang Cao, and Keping Yu, “AuthPrivacyChain: A Blockchain-Based Access Control Framework With Privacy Protection in Cloud”, IEEE Access, vol. 8, 2020.
Hernández-Ramos, J.L., Jara, A.J., Marín, L. and Skarmeta Gómez, A.F., “DCapBAC: embedding authorization logic into smart things through ECC optimizations”, International Journal of Computer Mathematics, vol. 93, no. 2, pp. 345–366, 2016.
Alam, M., Zhang, X., Khan, K. and Ali, G., “xDAuth: a scalable and lightweight framework for cross domain access control and delegation”, In Proceedings of the 16th ACM symposium on Access control models and technologies, pp. 31–40, June 2011.
Maesa, D.D.F., Mori, P. and Ricci, L., “Blockchain based access control”, In IFIP international conference on distributed applications and interoperable systems, pp. 206–220, Springer, Cham. June 2017.
N. T. Hung, “Deciphering the increased popularity of Vietnamese students’ choice of Asian countries for overseas studies: The influence of motivation for studying abroad on career planning and decision-making process of Vietnamese students in Taiwan”, The International Conference on Higher Education in Vietnam and Asia: Similarities and Possibilities of Cooperation, 2020.
Nguyen Tan Hung, “A Model of International Students’ Choice: A Mixed-Methods Study”, International Virtual Conference on Public Administration, Social Science & Humanities, 2020.
Nguyen Tan Hung, and Jen-Chia Chang, “Preliminary Investigation of the Current Situation and Influencing Factors of International Students in Taiwan under the Background of New Southbound Policy”, Taiwan Educational Review, vol. 8, no. 2, 2019.