{"title":"Research on Data Sharing Access Control Based on Blockchain Technology","authors":"Zhang Zichen, Yan Changshun","doi":"10.11648/j.acis.20221001.12","DOIUrl":null,"url":null,"abstract":": Blockchain is now widely used in various industries due to its openness, transparency, autonomy, imtamability, decentralization, and traceability. With the wide application of blockchain technology, its security problems have also brought significant challenges, seriously affecting the implementation of blockchain applications. Data on the traditional blockchain is open to the entire network node. The update operation of data records is also transparent, accompanied by the leakage of user information. Although blockchain has the characteristics of anonymity and privacy, with its development, it has not been easy to meet users' needs. How to effectively protect user data privacy, realize data sharing on the blockchain, and ensure the security of data integrity, transmission efficiency, storage efficiency, and application is very important to break through the bottleneck of the development of blockchain technology and promote its application. This paper proposes a traffic data resource access control scheme based on blockchain technology by combining the attribute encryption access control system based on ciphertext strategy based on blockchain's distributed ledger technology and the openness and imtamability it brings. In this scheme, the task of attribute encryption is to ensure the security involved in the process of plaintext and ciphertext conversion and the efficiency of data sharing, and to implement a one-to-many access sharing policy, to enhance the safety of the access sharing system and improve the efficiency of the access control module. This paper introduces the access control mechanism from two aspects of system architecture and the access sharing process. Then the attribute encryption mechanism is designed. The design process includes symbol description, primary structure, algorithm design idea and algorithm construction. Finally, the functionality and security of the access control mechanism are analysed.","PeriodicalId":205084,"journal":{"name":"Automation, Control and Intelligent Systems","volume":"9 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Automation, Control and Intelligent Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.11648/j.acis.20221001.12","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
: Blockchain is now widely used in various industries due to its openness, transparency, autonomy, imtamability, decentralization, and traceability. With the wide application of blockchain technology, its security problems have also brought significant challenges, seriously affecting the implementation of blockchain applications. Data on the traditional blockchain is open to the entire network node. The update operation of data records is also transparent, accompanied by the leakage of user information. Although blockchain has the characteristics of anonymity and privacy, with its development, it has not been easy to meet users' needs. How to effectively protect user data privacy, realize data sharing on the blockchain, and ensure the security of data integrity, transmission efficiency, storage efficiency, and application is very important to break through the bottleneck of the development of blockchain technology and promote its application. This paper proposes a traffic data resource access control scheme based on blockchain technology by combining the attribute encryption access control system based on ciphertext strategy based on blockchain's distributed ledger technology and the openness and imtamability it brings. In this scheme, the task of attribute encryption is to ensure the security involved in the process of plaintext and ciphertext conversion and the efficiency of data sharing, and to implement a one-to-many access sharing policy, to enhance the safety of the access sharing system and improve the efficiency of the access control module. This paper introduces the access control mechanism from two aspects of system architecture and the access sharing process. Then the attribute encryption mechanism is designed. The design process includes symbol description, primary structure, algorithm design idea and algorithm construction. Finally, the functionality and security of the access control mechanism are analysed.