Blockchain-Based Traceable Multi-Level Revocation Attribute-Based Encryption

With the development of cloud computing and big data, data security and privacy protection in multi-user environments have become particularly important. Existing encryption schemes exhibit significant deficiencies in addressing the flexible revocation of user attributes and dynamic changes in acces...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE access 2024, Vol.12, p.173758-173774
Hauptverfasser: Xu, Zhigang, Pan, Tiantian, Han, Hongmu, Dong, Xinhua, Wang, Zhongpeng, He, Miaomiao
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:With the development of cloud computing and big data, data security and privacy protection in multi-user environments have become particularly important. Existing encryption schemes exhibit significant deficiencies in addressing the flexible revocation of user attributes and dynamic changes in access permissions, leading to unauthorized users illicitly accessing and tampering with data. Therefore, we propose a Blockchain-based Traceable Multi-Level Revocable Attribute-Based Encryption Scheme (BTMAR-ABE). This scheme combines the advantages of Attribute-Based Encryption (ABE) technology and blockchain, achieving real-time attribute updates and verification through smart contracts, thereby avoiding reliance on a single centralized management server and introducing uniquely associated random numbers to prevent collusion attacks. To achieve flexible and secure data access control, we designed a multi-level revocation mechanism for both temporary and permanent revocation to address short-term and long-term permission change requirements. Performance evaluation and security analysis indicate that the BTMAR-ABE scheme can effectively resist chosen plaintext attacks, attribute revocation attacks, and collusion attacks, while demonstrating significant efficiency advantages in computational cost. Simulation results further demonstrate that this scheme has high practical value in data security and access control.
ISSN:2169-3536
2169-3536
DOI:10.1109/ACCESS.2024.3493464