A Metaheuristic Approach for Encrypting Blockchain Data Attributes Using Ciphertext Policy Technique

Unlike public chains, the Alliance Blockchain Hyperledger Fabric has a member management service mechanism that may provide data isolation security at the channel level. However, because this data isolation security technique synchronizes plaintext data inside the channel, data leakage is still a po...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Mathematical problems in engineering 2022-02, Vol.2022, p.1-10
Hauptverfasser: Deb, Nabamita, Elashiri, Mohamed A., Veeramakali, T., Rahmani, Abdul Wahab, Degadwala, Sheshang
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 10
container_issue
container_start_page 1
container_title Mathematical problems in engineering
container_volume 2022
creator Deb, Nabamita
Elashiri, Mohamed A.
Veeramakali, T.
Rahmani, Abdul Wahab
Degadwala, Sheshang
description Unlike public chains, the Alliance Blockchain Hyperledger Fabric has a member management service mechanism that may provide data isolation security at the channel level. However, because this data isolation security technique synchronizes plaintext data inside the channel, data leakage is still a possibility. Furthermore, in some fine-grained privacy protection circumstances, channel-based data access restriction is ineffective. In order to solve the data privacy security problems in the above-mentioned consortium chain superledger, a blockchain data attribute encryption scheme based on ciphertext policy is proposed. Combining the original Fabric Certificate Authority module in the Hyperledger, the proposed scheme can realize the user-level fine-grained security access to control blockchain data while also realizing the secure distribution of user attribute keys in the blockchain data attribute encryption scheme based on the ciphertext policy scheme. The security analysis of the scheme shows that the scheme achieves the security goals of attribute-based encryption user attribute private key secure distribution and data privacy protection. The scope of this research is that this study confirms that the solution’s architecture achieves fine-grained access control of private data on the Hyperledger Blockchain network and also the security objectives of secure transmission of user characteristic secret keys and data privacy protection. The performance analysis part also shows that the proposed scheme has good usability.
doi_str_mv 10.1155/2022/7579961
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2630681660</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2630681660</sourcerecordid><originalsourceid>FETCH-LOGICAL-c337t-d53375d84a4f31e6f9f2df91188daf71948b0944516c32e84e59f8e8f5f9ddd63</originalsourceid><addsrcrecordid>eNp9kL1OwzAYRS0EEqWw8QCWGCHUdmzHHkMpP1IRDK3EFrn-IS4lCbYj6NuTqp2Z7jcc3avvAHCJ0S3GjE0IImRSsEJKjo_ACDOeZwzT4ni4EaEZJvn7KTiLcY0QwQyLETAlfLFJ1bYPPiavYdl1oVW6hq4NcNbosO2Sbz7g3abVn7pWvoH3KilYphT8qk82wmXcAVPf1TYk-5vgW7vxegsXVteN_-7tOThxahPtxSHHYPkwW0yfsvnr4_O0nGc6z4uUGTYEM4Iq6nJsuZOOGCcxFsIoV2BJxQpJShnmOidWUMukE1Y45qQxhudjcLXvHV4YZmOq1m0fmmGyIjxHXGDO0UDd7Ckd2hiDdVUX_JcK2wqjauex2nmsDh4H_HqP174x6sf_T_8BRHNyrg</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2630681660</pqid></control><display><type>article</type><title>A Metaheuristic Approach for Encrypting Blockchain Data Attributes Using Ciphertext Policy Technique</title><source>Wiley-Blackwell Open Access Titles</source><source>EZB-FREE-00999 freely available EZB journals</source><source>Alma/SFX Local Collection</source><creator>Deb, Nabamita ; Elashiri, Mohamed A. ; Veeramakali, T. ; Rahmani, Abdul Wahab ; Degadwala, Sheshang</creator><contributor>Kumar, Vijay ; Vijay Kumar</contributor><creatorcontrib>Deb, Nabamita ; Elashiri, Mohamed A. ; Veeramakali, T. ; Rahmani, Abdul Wahab ; Degadwala, Sheshang ; Kumar, Vijay ; Vijay Kumar</creatorcontrib><description>Unlike public chains, the Alliance Blockchain Hyperledger Fabric has a member management service mechanism that may provide data isolation security at the channel level. However, because this data isolation security technique synchronizes plaintext data inside the channel, data leakage is still a possibility. Furthermore, in some fine-grained privacy protection circumstances, channel-based data access restriction is ineffective. In order to solve the data privacy security problems in the above-mentioned consortium chain superledger, a blockchain data attribute encryption scheme based on ciphertext policy is proposed. Combining the original Fabric Certificate Authority module in the Hyperledger, the proposed scheme can realize the user-level fine-grained security access to control blockchain data while also realizing the secure distribution of user attribute keys in the blockchain data attribute encryption scheme based on the ciphertext policy scheme. The security analysis of the scheme shows that the scheme achieves the security goals of attribute-based encryption user attribute private key secure distribution and data privacy protection. The scope of this research is that this study confirms that the solution’s architecture achieves fine-grained access control of private data on the Hyperledger Blockchain network and also the security objectives of secure transmission of user characteristic secret keys and data privacy protection. The performance analysis part also shows that the proposed scheme has good usability.</description><identifier>ISSN: 1024-123X</identifier><identifier>EISSN: 1563-5147</identifier><identifier>DOI: 10.1155/2022/7579961</identifier><language>eng</language><publisher>New York: Hindawi</publisher><subject>Access control ; Algorithms ; Blockchain ; Consortia ; Cryptography ; Data encryption ; Design ; Digital currencies ; Encryption ; Heuristic methods ; Mathematical problems ; Privacy ; Security</subject><ispartof>Mathematical problems in engineering, 2022-02, Vol.2022, p.1-10</ispartof><rights>Copyright © 2022 Nabamita Deb et al.</rights><rights>Copyright © 2022 Nabamita Deb et al. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c337t-d53375d84a4f31e6f9f2df91188daf71948b0944516c32e84e59f8e8f5f9ddd63</citedby><cites>FETCH-LOGICAL-c337t-d53375d84a4f31e6f9f2df91188daf71948b0944516c32e84e59f8e8f5f9ddd63</cites><orcidid>0000-0001-7839-7675 ; 0000-0001-8919-1453 ; 0000-0002-2385-7790 ; 0000-0003-4216-1294 ; 0000-0002-1860-5548</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27923,27924</link.rule.ids></links><search><contributor>Kumar, Vijay</contributor><contributor>Vijay Kumar</contributor><creatorcontrib>Deb, Nabamita</creatorcontrib><creatorcontrib>Elashiri, Mohamed A.</creatorcontrib><creatorcontrib>Veeramakali, T.</creatorcontrib><creatorcontrib>Rahmani, Abdul Wahab</creatorcontrib><creatorcontrib>Degadwala, Sheshang</creatorcontrib><title>A Metaheuristic Approach for Encrypting Blockchain Data Attributes Using Ciphertext Policy Technique</title><title>Mathematical problems in engineering</title><description>Unlike public chains, the Alliance Blockchain Hyperledger Fabric has a member management service mechanism that may provide data isolation security at the channel level. However, because this data isolation security technique synchronizes plaintext data inside the channel, data leakage is still a possibility. Furthermore, in some fine-grained privacy protection circumstances, channel-based data access restriction is ineffective. In order to solve the data privacy security problems in the above-mentioned consortium chain superledger, a blockchain data attribute encryption scheme based on ciphertext policy is proposed. Combining the original Fabric Certificate Authority module in the Hyperledger, the proposed scheme can realize the user-level fine-grained security access to control blockchain data while also realizing the secure distribution of user attribute keys in the blockchain data attribute encryption scheme based on the ciphertext policy scheme. The security analysis of the scheme shows that the scheme achieves the security goals of attribute-based encryption user attribute private key secure distribution and data privacy protection. The scope of this research is that this study confirms that the solution’s architecture achieves fine-grained access control of private data on the Hyperledger Blockchain network and also the security objectives of secure transmission of user characteristic secret keys and data privacy protection. The performance analysis part also shows that the proposed scheme has good usability.</description><subject>Access control</subject><subject>Algorithms</subject><subject>Blockchain</subject><subject>Consortia</subject><subject>Cryptography</subject><subject>Data encryption</subject><subject>Design</subject><subject>Digital currencies</subject><subject>Encryption</subject><subject>Heuristic methods</subject><subject>Mathematical problems</subject><subject>Privacy</subject><subject>Security</subject><issn>1024-123X</issn><issn>1563-5147</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><sourceid>RHX</sourceid><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNp9kL1OwzAYRS0EEqWw8QCWGCHUdmzHHkMpP1IRDK3EFrn-IS4lCbYj6NuTqp2Z7jcc3avvAHCJ0S3GjE0IImRSsEJKjo_ACDOeZwzT4ni4EaEZJvn7KTiLcY0QwQyLETAlfLFJ1bYPPiavYdl1oVW6hq4NcNbosO2Sbz7g3abVn7pWvoH3KilYphT8qk82wmXcAVPf1TYk-5vgW7vxegsXVteN_-7tOThxahPtxSHHYPkwW0yfsvnr4_O0nGc6z4uUGTYEM4Iq6nJsuZOOGCcxFsIoV2BJxQpJShnmOidWUMukE1Y45qQxhudjcLXvHV4YZmOq1m0fmmGyIjxHXGDO0UDd7Ckd2hiDdVUX_JcK2wqjauex2nmsDh4H_HqP174x6sf_T_8BRHNyrg</recordid><startdate>20220210</startdate><enddate>20220210</enddate><creator>Deb, Nabamita</creator><creator>Elashiri, Mohamed A.</creator><creator>Veeramakali, T.</creator><creator>Rahmani, Abdul Wahab</creator><creator>Degadwala, Sheshang</creator><general>Hindawi</general><general>Hindawi Limited</general><scope>RHU</scope><scope>RHW</scope><scope>RHX</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7TB</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>CWDGH</scope><scope>DWQXO</scope><scope>FR3</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>KR7</scope><scope>L6V</scope><scope>M7S</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PTHSS</scope><orcidid>https://orcid.org/0000-0001-7839-7675</orcidid><orcidid>https://orcid.org/0000-0001-8919-1453</orcidid><orcidid>https://orcid.org/0000-0002-2385-7790</orcidid><orcidid>https://orcid.org/0000-0003-4216-1294</orcidid><orcidid>https://orcid.org/0000-0002-1860-5548</orcidid></search><sort><creationdate>20220210</creationdate><title>A Metaheuristic Approach for Encrypting Blockchain Data Attributes Using Ciphertext Policy Technique</title><author>Deb, Nabamita ; Elashiri, Mohamed A. ; Veeramakali, T. ; Rahmani, Abdul Wahab ; Degadwala, Sheshang</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c337t-d53375d84a4f31e6f9f2df91188daf71948b0944516c32e84e59f8e8f5f9ddd63</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Access control</topic><topic>Algorithms</topic><topic>Blockchain</topic><topic>Consortia</topic><topic>Cryptography</topic><topic>Data encryption</topic><topic>Design</topic><topic>Digital currencies</topic><topic>Encryption</topic><topic>Heuristic methods</topic><topic>Mathematical problems</topic><topic>Privacy</topic><topic>Security</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Deb, Nabamita</creatorcontrib><creatorcontrib>Elashiri, Mohamed A.</creatorcontrib><creatorcontrib>Veeramakali, T.</creatorcontrib><creatorcontrib>Rahmani, Abdul Wahab</creatorcontrib><creatorcontrib>Degadwala, Sheshang</creatorcontrib><collection>Hindawi Publishing Complete</collection><collection>Hindawi Publishing Subscription Journals</collection><collection>Hindawi Publishing Open Access Journals</collection><collection>CrossRef</collection><collection>Mechanical &amp; Transportation Engineering Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>Materials Science &amp; Engineering Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>Middle East &amp; Africa Database</collection><collection>ProQuest Central Korea</collection><collection>Engineering Research Database</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Civil Engineering Abstracts</collection><collection>ProQuest Engineering Collection</collection><collection>Engineering Database</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Engineering Collection</collection><jtitle>Mathematical problems in engineering</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Deb, Nabamita</au><au>Elashiri, Mohamed A.</au><au>Veeramakali, T.</au><au>Rahmani, Abdul Wahab</au><au>Degadwala, Sheshang</au><au>Kumar, Vijay</au><au>Vijay Kumar</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Metaheuristic Approach for Encrypting Blockchain Data Attributes Using Ciphertext Policy Technique</atitle><jtitle>Mathematical problems in engineering</jtitle><date>2022-02-10</date><risdate>2022</risdate><volume>2022</volume><spage>1</spage><epage>10</epage><pages>1-10</pages><issn>1024-123X</issn><eissn>1563-5147</eissn><abstract>Unlike public chains, the Alliance Blockchain Hyperledger Fabric has a member management service mechanism that may provide data isolation security at the channel level. However, because this data isolation security technique synchronizes plaintext data inside the channel, data leakage is still a possibility. Furthermore, in some fine-grained privacy protection circumstances, channel-based data access restriction is ineffective. In order to solve the data privacy security problems in the above-mentioned consortium chain superledger, a blockchain data attribute encryption scheme based on ciphertext policy is proposed. Combining the original Fabric Certificate Authority module in the Hyperledger, the proposed scheme can realize the user-level fine-grained security access to control blockchain data while also realizing the secure distribution of user attribute keys in the blockchain data attribute encryption scheme based on the ciphertext policy scheme. The security analysis of the scheme shows that the scheme achieves the security goals of attribute-based encryption user attribute private key secure distribution and data privacy protection. The scope of this research is that this study confirms that the solution’s architecture achieves fine-grained access control of private data on the Hyperledger Blockchain network and also the security objectives of secure transmission of user characteristic secret keys and data privacy protection. The performance analysis part also shows that the proposed scheme has good usability.</abstract><cop>New York</cop><pub>Hindawi</pub><doi>10.1155/2022/7579961</doi><tpages>10</tpages><orcidid>https://orcid.org/0000-0001-7839-7675</orcidid><orcidid>https://orcid.org/0000-0001-8919-1453</orcidid><orcidid>https://orcid.org/0000-0002-2385-7790</orcidid><orcidid>https://orcid.org/0000-0003-4216-1294</orcidid><orcidid>https://orcid.org/0000-0002-1860-5548</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1024-123X
ispartof Mathematical problems in engineering, 2022-02, Vol.2022, p.1-10
issn 1024-123X
1563-5147
language eng
recordid cdi_proquest_journals_2630681660
source Wiley-Blackwell Open Access Titles; EZB-FREE-00999 freely available EZB journals; Alma/SFX Local Collection
subjects Access control
Algorithms
Blockchain
Consortia
Cryptography
Data encryption
Design
Digital currencies
Encryption
Heuristic methods
Mathematical problems
Privacy
Security
title A Metaheuristic Approach for Encrypting Blockchain Data Attributes Using Ciphertext Policy Technique
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-08T21%3A36%3A40IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Metaheuristic%20Approach%20for%20Encrypting%20Blockchain%20Data%20Attributes%20Using%20Ciphertext%20Policy%20Technique&rft.jtitle=Mathematical%20problems%20in%20engineering&rft.au=Deb,%20Nabamita&rft.date=2022-02-10&rft.volume=2022&rft.spage=1&rft.epage=10&rft.pages=1-10&rft.issn=1024-123X&rft.eissn=1563-5147&rft_id=info:doi/10.1155/2022/7579961&rft_dat=%3Cproquest_cross%3E2630681660%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2630681660&rft_id=info:pmid/&rfr_iscdi=true