Skip to main content
Erschienen in: Telecommunication Systems 2/2022

03.08.2022

Dynamic permission access control model based on privacy protection

verfasst von: Qikun Zhang, Liang Zhu, Kunyuan Zhao, Yimeng Wu, Baohua Jin, Jianyong Li, Yinghui Meng, Sikang Hu

Erschienen in: Telecommunication Systems | Ausgabe 2/2022

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Access control technology is one of the key technologies to ensure safe resource sharing. Identity authentication and authority distribution are two key technologies for access control technology to restrict unauthorized users from accessing resources, and only authorised legal users can access resources. However, user privacy protection and frequent permission changes are two thorny issues that need to be solved urgently by access control technology. In this paper, a dynamic access control model based on privacy protection is proposed to deal with these problems. Compared with existing access control technologies, the main advantages of this paper are as follows: (1) Encrypt and hide the attributes of entities, and use attribute-based identity authentication technology for identity authentication, which not only achieves the purpose of traditional identity authentication, but also ensures the attributes and privacy of entities are not leaked; (2) Binding resource access permissions with entity attributes, dynamically assigning and adjusting resource access control permissions through changes in entity attributes, making resource access control more fine-grained and more flexible. Security proof and performance analysis show that the proposed protocol is secure under the hardness assumption of the discrete logarithm problem and the decision bilinear Diffie–Hellman problem. Compared with the cited references, this model has the advantages of low computational complexity, short computational time, and low communication overhead.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Ding, S., Cao, J., Li, C., Fan, K., & Li, H. (2019). A novel attribute-based access control scheme using blockchain for IoT. IEEE Access, 7, 38431–38441.CrossRef Ding, S., Cao, J., Li, C., Fan, K., & Li, H. (2019). A novel attribute-based access control scheme using blockchain for IoT. IEEE Access, 7, 38431–38441.CrossRef
3.
Zurück zum Zitat Zhong, H., Zhu, W., Xu, Y., & Cui, J. (2018). Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage. Soft Computing, 22(1), 243–251.CrossRef Zhong, H., Zhu, W., Xu, Y., & Cui, J. (2018). Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage. Soft Computing, 22(1), 243–251.CrossRef
4.
Zurück zum Zitat Xu, Y., Zeng, Q., Wang, G., Zhang, C., Ren, J., & Zhang, Y. (2020). An efficient privacy-enhanced attribute-based access control mechanism. Concurrency and Computation: Practice and Experience, 32(5), e5556. Xu, Y., Zeng, Q., Wang, G., Zhang, C., Ren, J., & Zhang, Y. (2020). An efficient privacy-enhanced attribute-based access control mechanism. Concurrency and Computation: Practice and Experience, 32(5), e5556.
6.
Zurück zum Zitat Xu, Q., Tan, C., Fan, Z., Zhu, W., Xiao, Y., & Cheng, F. (2018). Secure multi-authority data access control scheme in cloud storage system based on attribute-based signcryption. IEEE Access, 6, 34051–34074.CrossRef Xu, Q., Tan, C., Fan, Z., Zhu, W., Xiao, Y., & Cheng, F. (2018). Secure multi-authority data access control scheme in cloud storage system based on attribute-based signcryption. IEEE Access, 6, 34051–34074.CrossRef
7.
Zurück zum Zitat Zhang, Q., Zhu, L., Wang, R., Li, J., Yuan, J., Liang, T., & Zheng, J. (2021). Group key agreement protocol among terminals of the intelligent information system for mobile edge computing. International Journal of Intelligent Systems, 2021, 1–20. https://doi.org/10.1002/int.22544.CrossRef Zhang, Q., Zhu, L., Wang, R., Li, J., Yuan, J., Liang, T., & Zheng, J. (2021). Group key agreement protocol among terminals of the intelligent information system for mobile edge computing. International Journal of Intelligent Systems, 2021, 1–20. https://​doi.​org/​10.​1002/​int.​22544.CrossRef
8.
Zurück zum Zitat Nasiraee, H., & Ashouri-Talouki, M. (2020). Anonymous decentralized attribute-based access control for cloud-assisted IoT. Future Generation Computer Systems, 110, 45–56.CrossRef Nasiraee, H., & Ashouri-Talouki, M. (2020). Anonymous decentralized attribute-based access control for cloud-assisted IoT. Future Generation Computer Systems, 110, 45–56.CrossRef
9.
Zurück zum Zitat Zhu, Y., Yu, R., Ma, D., & Chu, W. C. (2019). Cryptographic attribute-based access control (ABAC) for secure decision making of dynamic policy with multiauthority attribute tokens. IEEE Transactions on Reliability, 68(4), 1330–1346.CrossRef Zhu, Y., Yu, R., Ma, D., & Chu, W. C. (2019). Cryptographic attribute-based access control (ABAC) for secure decision making of dynamic policy with multiauthority attribute tokens. IEEE Transactions on Reliability, 68(4), 1330–1346.CrossRef
10.
Zurück zum Zitat Sandor, V. K., Lin, Y., Li, X., Lin, F., & Zhang, S. (2019). Efficient decentralized multi-authority attribute based encryption for mobile cloud data storage. Journal of Network and Computer Applications, 129, 25–36.CrossRef Sandor, V. K., Lin, Y., Li, X., Lin, F., & Zhang, S. (2019). Efficient decentralized multi-authority attribute based encryption for mobile cloud data storage. Journal of Network and Computer Applications, 129, 25–36.CrossRef
12.
Zurück zum Zitat Li, H., Deng, L., Yang, C., & Liu, J. (2020). An enhanced media ciphertext-policy attribute-based encryption algorithm on media cloud. International Journal of Distributed Sensor Networks, 16(2), 1550147720908196. Li, H., Deng, L., Yang, C., & Liu, J. (2020). An enhanced media ciphertext-policy attribute-based encryption algorithm on media cloud. International Journal of Distributed Sensor Networks, 16(2), 1550147720908196.
13.
Zurück zum Zitat Zhang, Q., Li, Y., Wang, R., Liu, L., Tan, Y.-a, & Hu, J. (2021). Data security sharing model based on privacy protection for blockchain-enabled industrial Internet of Things. International Journal of Intelligent Systems, 36, 94–111. https://doi.org/10.1002/int.22293.CrossRef Zhang, Q., Li, Y., Wang, R., Liu, L., Tan, Y.-a, & Hu, J. (2021). Data security sharing model based on privacy protection for blockchain-enabled industrial Internet of Things. International Journal of Intelligent Systems, 36, 94–111. https://​doi.​org/​10.​1002/​int.​22293.CrossRef
14.
Zurück zum Zitat Hao, J., Huang, C., Ni, J., Rong, H., Xian, M., & Shen, X. S. (2019). Fine-grained data access control with attribute-hiding policy for cloud-based IoT. Computer Networks, 153, 1–10.CrossRef Hao, J., Huang, C., Ni, J., Rong, H., Xian, M., & Shen, X. S. (2019). Fine-grained data access control with attribute-hiding policy for cloud-based IoT. Computer Networks, 153, 1–10.CrossRef
15.
Zurück zum Zitat Imine, Y., Lounis, A., & Bouabdallah, A. (2018). Revocable attribute-based access control in mutli-autority systems. Journal of Network and Computer Applications, 122, 61–76.CrossRef Imine, Y., Lounis, A., & Bouabdallah, A. (2018). Revocable attribute-based access control in mutli-autority systems. Journal of Network and Computer Applications, 122, 61–76.CrossRef
17.
Zurück zum Zitat Zhang, Y., Li, B., Liu, B., Wu, J., Wang, Y., & Yang, X. (2020). An attribute-based collaborative access control scheme using blockchain for IoT devices. Electronics, 9(2), 285.CrossRef Zhang, Y., Li, B., Liu, B., Wu, J., Wang, Y., & Yang, X. (2020). An attribute-based collaborative access control scheme using blockchain for IoT devices. Electronics, 9(2), 285.CrossRef
18.
Zurück zum Zitat Wang, S., Zhang, Y., & Zhang, Y. (2018). A blockchain-based framework for data sharing with fine-grained access control in decentralized storage systems. IEEE Access, 6, 38437–38450.CrossRef Wang, S., Zhang, Y., & Zhang, Y. (2018). A blockchain-based framework for data sharing with fine-grained access control in decentralized storage systems. IEEE Access, 6, 38437–38450.CrossRef
19.
Zurück zum Zitat De, S. J., & Ruj, S. (2020). Efficient decentralized attribute based access control for mobile clouds. IEEE Transactions on Cloud Computing, 8(1), 124–137.CrossRef De, S. J., & Ruj, S. (2020). Efficient decentralized attribute based access control for mobile clouds. IEEE Transactions on Cloud Computing, 8(1), 124–137.CrossRef
20.
Zurück zum Zitat Rana, S., & Mishra, D. (2020). Efficient and secure attribute based access control architecture for smart healthcare. Journal of Medical Systems, 44(5), 1–11.CrossRef Rana, S., & Mishra, D. (2020). Efficient and secure attribute based access control architecture for smart healthcare. Journal of Medical Systems, 44(5), 1–11.CrossRef
22.
Zurück zum Zitat Yan, H., Wang, Y., Jia, C., Li, J., Xiang, Y., & Pedrycz, W. (2019). IoT-FBAC: Function-based access control scheme using identity-based encryption in IoT. Future Generation Computer Systems, 95, 344–353.CrossRef Yan, H., Wang, Y., Jia, C., Li, J., Xiang, Y., & Pedrycz, W. (2019). IoT-FBAC: Function-based access control scheme using identity-based encryption in IoT. Future Generation Computer Systems, 95, 344–353.CrossRef
23.
Zurück zum Zitat Zhang, Y., Zheng, D., & Deng, R. H. (2018). Security and privacy in smart health: Efficient policy-hiding attribute-based access control. IEEE Internet of Things Journal, 5(3), 2130–2145.CrossRef Zhang, Y., Zheng, D., & Deng, R. H. (2018). Security and privacy in smart health: Efficient policy-hiding attribute-based access control. IEEE Internet of Things Journal, 5(3), 2130–2145.CrossRef
24.
Zurück zum Zitat Qin, X., Huang, Y., Yang, Z., & Li, X. (2021). A Blockchain-based access control scheme with multiple attribute authorities for secure cloud data sharing. Journal of Systems Architecture, 112, 101854.CrossRef Qin, X., Huang, Y., Yang, Z., & Li, X. (2021). A Blockchain-based access control scheme with multiple attribute authorities for secure cloud data sharing. Journal of Systems Architecture, 112, 101854.CrossRef
25.
Zurück zum Zitat Qiu, M., Gai, K., Thuraisingham, B., Tao, L., & Zhao, H. (2018). Proactive user-centric secure data scheme using attribute-based semantic access controls for mobile clouds in financial industry. Future Generation Computer Systems, 80, 421–429.CrossRef Qiu, M., Gai, K., Thuraisingham, B., Tao, L., & Zhao, H. (2018). Proactive user-centric secure data scheme using attribute-based semantic access controls for mobile clouds in financial industry. Future Generation Computer Systems, 80, 421–429.CrossRef
26.
Zurück zum Zitat Sultana, T., Almogren, A., Akbar, M., Zuair, M., Ullah, I., & Javaid, N. (2020). Data sharing system integrating access control mechanism using blockchain-based smart contracts for IoT devices. Applied Sciences, 10(2), 488.CrossRef Sultana, T., Almogren, A., Akbar, M., Zuair, M., Ullah, I., & Javaid, N. (2020). Data sharing system integrating access control mechanism using blockchain-based smart contracts for IoT devices. Applied Sciences, 10(2), 488.CrossRef
27.
Zurück zum Zitat Wang, Q., Lv, G., & Sun, X. (2019). Distributed access control with outsourced computation in fog computing. In 2019 Chinese control and decision conference (CCDC) (pp. 2446–2450). IEEE. Wang, Q., Lv, G., & Sun, X. (2019). Distributed access control with outsourced computation in fog computing. In 2019 Chinese control and decision conference (CCDC) (pp. 2446–2450). IEEE.
28.
Zurück zum Zitat Zhang, Y., Kasahara, S., Shen, Y., Jiang, X., & Wan, J. (2018). Smart contract-based access control for the internet of things. IEEE Internet of Things Journal, 6(2), 1594–1605.CrossRef Zhang, Y., Kasahara, S., Shen, Y., Jiang, X., & Wan, J. (2018). Smart contract-based access control for the internet of things. IEEE Internet of Things Journal, 6(2), 1594–1605.CrossRef
29.
Zurück zum Zitat Xu, R., Chen, Y., Blasch, E., & Chen, G. (2018). Blendcac: A blockchain-enabled decentralized capability-based access control for iots. In 2018 IEEE international conference on internet of things (iThings) and IEEE green computing and communications (GreenCom) and IEEE cyber, physical and social computing (CPSCom) and IEEE smart data (SmartData) (pp. 1027–1034). IEEE. Xu, R., Chen, Y., Blasch, E., & Chen, G. (2018). Blendcac: A blockchain-enabled decentralized capability-based access control for iots. In 2018 IEEE international conference on internet of things (iThings) and IEEE green computing and communications (GreenCom) and IEEE cyber, physical and social computing (CPSCom) and IEEE smart data (SmartData) (pp. 1027–1034). IEEE.
30.
Zurück zum Zitat Rajput, A. R., Li, Q., Ahvanooey, M. T., & Masood, I. (2019). EACMS: Emergency access control management system for personal health record based on blockchain. IEEE Access, 7, 84304–84317.CrossRef Rajput, A. R., Li, Q., Ahvanooey, M. T., & Masood, I. (2019). EACMS: Emergency access control management system for personal health record based on blockchain. IEEE Access, 7, 84304–84317.CrossRef
31.
Zurück zum Zitat Guo, L., Yang, X., & Yau, W. C. (2021). TABE-DAC: Efficient traceable attribute-based encryption scheme with dynamic access control based on blockchain. IEEE Access, 9, 8479–8490.CrossRef Guo, L., Yang, X., & Yau, W. C. (2021). TABE-DAC: Efficient traceable attribute-based encryption scheme with dynamic access control based on blockchain. IEEE Access, 9, 8479–8490.CrossRef
32.
Zurück zum Zitat Liu, Z., Xu, J., Liu, Y., & Wang, B. (2019). Updatable ciphertext-policy attribute-based encryption scheme with traceability and revocability. IEEE Access, 7, 66832–66844. Liu, Z., Xu, J., Liu, Y., & Wang, B. (2019). Updatable ciphertext-policy attribute-based encryption scheme with traceability and revocability. IEEE Access, 7, 66832–66844.
33.
Zurück zum Zitat Gao, S., Piao, G., Zhu, J., Ma, X., & Ma, J. (2020). TrustAccess: A trustworthy secure ciphertext-policy and attribute hiding access control scheme based on blockchain. IEEE Transactions on Vehicular Technology, 69(6), 5784–5798.CrossRef Gao, S., Piao, G., Zhu, J., Ma, X., & Ma, J. (2020). TrustAccess: A trustworthy secure ciphertext-policy and attribute hiding access control scheme based on blockchain. IEEE Transactions on Vehicular Technology, 69(6), 5784–5798.CrossRef
34.
Zurück zum Zitat Zhang, Y., He, D., & Choo, K. K. R. (2018). BaDS: Blockchain-based architecture for data sharing with ABS and CP-ABE in IoT. Wireless Communications and Mobile Computing. 2018, 2783658. https://doi.org/10.1155/2018/2783658. Zhang, Y., He, D., & Choo, K. K. R. (2018). BaDS: Blockchain-based architecture for data sharing with ABS and CP-ABE in IoT. Wireless Communications and Mobile Computing. 2018, 2783658. https://​doi.​org/​10.​1155/​2018/​2783658.​
Metadaten
Titel
Dynamic permission access control model based on privacy protection
verfasst von
Qikun Zhang
Liang Zhu
Kunyuan Zhao
Yimeng Wu
Baohua Jin
Jianyong Li
Yinghui Meng
Sikang Hu
Publikationsdatum
03.08.2022
Verlag
Springer US
Erschienen in
Telecommunication Systems / Ausgabe 2/2022
Print ISSN: 1018-4864
Elektronische ISSN: 1572-9451
DOI
https://doi.org/10.1007/s11235-022-00937-8

Weitere Artikel der Ausgabe 2/2022

Telecommunication Systems 2/2022 Zur Ausgabe

Neuer Inhalt