Abstract
Data security in cloud data sharing system is effectively ensured by data access control mechanism. Data access control becomes more challenging because of intruders and malicious cloud servers. Most of the traditional approaches do not consider the issues in controlling user accessing cloud data storage and sharing. Ciphertext policy attribute-based encryption is one of the most effective techniques that provide secure data access control for sensitive data outsourced in cloud storage. However, in traditional cloud data sharing system, there are several issues regarding transaction traceability, user authorization, data ownership management and access control preservation. Also, traditional access control schemes do not have an effective method to compensate cloud users whose data integrity is lost. To handle these issues, we propose a new data sharing system auditable attribute-based encryption scheme that integrates the advantages of blockchain technology with attribute-based access control. We designed a trustworthy scheme which uses blockchain to provide attribute-based secure data sharing with integrity auditing. It also provides compensation to data owners, if their data integrity is lost. The security analysis demonstrates the improvement in performance of the proposed access control scheme over existing data sharing schemes. It provides efficient and secure data sharing, reliable traceability and equitable mediation. Thus, the proposed approach preserves the integrity, privacy, security and consistency of the stored data, thereby guaranteeing authorized data access control to cloud users.
Similar content being viewed by others
References
Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: 2007 IEEE symposium on security and privacy (SP'07). IEEE, pp 321–334
Hur J (2011) Improving security and efficiency in attribute-based data sharing. IEEE Trans Knowl Data Eng 25(10):2271–2282
Wei J, Liu W, Xuexian Hu (2016) Secure and efficient attribute-based access control for multiauthority cloud storage. IEEE Syst J 12(2):1731–1742
Fan K, Tian Q, Wang J, Li H, Yang Y (2017) Privacy protection based access control scheme in cloud-based services. China Commun 14(1):61–71
Pawar P, Sheikh R (2016) Implementation of secure authentication scheme and access control in cloud computing. Proc Int Conf ICT Bus Ind Gov 55:43–45
Ruj S, Nayak A, Stojmenovic I (2011) DACC: distributed access control in clouds. In: Proceedings of the 10th IEEE International Conference, pp 91–98
Wan Z, Deng RH (2011) HASBE: a hierarchical attribute-based solution for flexible and scalable access control in cloud computing. IEEE Trans Inf Forensics Secur 7(2):743–754
Wu X, Jiang R, Bhargava B (2015) On the security of data access control for multiauthority cloud storage systems. IEEE Trans Serv Comput 10(2):258–272
Yang K, Jia X (2013) Expressive, efficient, and revocable data access control for multi-authority cloud storage. IEEE Trans Parallel Distrib Syst 25(7):1735–1744
Yang C, Chen X, Xiang Y (2018) Blockchain-based publicly verifiable data deletion scheme for cloud storage. J Netw Comput Appl 103:185–193
Huang H, Chen X, Qianhong Wu, Huang X, Shen J (2018) Bitcoin-based fair payments for outsourcing computations of fog devices. Futur Gener Comput Syst 78:850–858
Küpçü A (2015) Official arbitration with secure cloud storage application. Comput J 58(4):831–852
Buterin V (2014) Ethereum white paper. https://www.mendeley.com/. Accessed 27, Sep 2019
Zhang, Y, Lin X, Xu C (2018) Blockchain-based secure data provenance for cloud storage. In: International Conference on Information and Communications Security. Springer, Cham, pp 3–19
Yuan H, Chen X, Wang J, Yuan J, Yan H, Susilo W (2020) Blockchain-based public auditing and secure deduplication with fair arbitration. Inf Sci 541:409–425
Nguyen DC, Pathirana PN, Ding M, Seneviratne A (2019) Blockchain for secure ehrs sharing of mobile cloud based e-health systems. IEEE Access 7:66792–66806
Kuo T-T, Kim H-E, Ohno-Machado L (2017) Blockchain distributed ledger technologies for biomedical and health care applications. J Am Med Inform Assoc 24(6):1211–1220
Mettler M (2016) Blockchain technology in healthcare: the revolution starts here. In: 2016 IEEE 18th International Conference on E-Health Networking, Applications and Services (Healthcom). IEEE, pp 1–3
Hardjono T, Pentland A (2019) Verifiable anonymous identities and access control in permissioned blockchains.
Hu S, Hou L, Chen G, Weng J, Li J (2018) Reputation-based distributed knowledge sharing system in blockchain. In: Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, pp 476–481
Rouhani S, Belchior R, Cruz RS, Deters R (2020) Distributed attribute-based access control system using a permissioned blockchain.
Hur J, Kun Noh D (2010) Attribute-based access control with efficient revocation in data outsourcing systems. IEEE Trans Parallel Distrib Syst 22(7):1214–1221
Korpela K, Hallikas J, Dahlberg T (2017) Digital supply chain transformation toward blockchain integration. In: Proceedings of the 50th Hawaii International Conference on System Sciences
Le T, Mutka MW (2018) CapChain: a privacy preserving access control framework based on blockchain for pervasive environments. In: 2018 IEEE International Conference on Smart Computing (SMARTCOMP). IEEE, pp 57–64
Dukkipati C, Zhang Y, Cheng LC (2018) Decentralized, blockchain based access control framework for the heterogeneous internet of things. In: Proceedings of the third ACM workshop on attribute-based access control, pp. 61–69
Luu L, Chu D-H, Olickel H, Saxena P, Hobor A (2016) Making smart contracts smarter. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp 254–269
Li J, Wu J, Jiang G, Srikanthan T (2020) Blockchain-based public auditing for big data in cloud storage. Inf Process Manag 57(6):102382
Maesa DD, Francesco PM, Ricci L (2019) A blockchain based approach for the definition of auditable access control systems. Comput Secur 84:93–119
Li H, Guo F, Wang L, Wang J, Wang B, Wu C (2021) A Blockchain-based public auditing protocol with self-certified public keys for cloud data. Secur Commun Netw 2021:1–10
Shu J, Zou X, Jia X, Zhang W, Xie R (2021) Blockchain-Based Decentralized Public Auditing for Cloud Storage. IEEE Trans Cloud Comput. https://doi.org/10.1109/TCC.2021.3051622
Lekshmi MM, Subramanian N (2020) Data auditing in cloud storage using smart contract. In: 2020 Third International Conference on Smart Systems and Inventive Technology (ICSSIT). IEEE, pp 999–1002
Wang C, Chen S, Feng Z, Jiang Y, Xue X (2019) Block chain-based data audit and access control mechanism in service collaboration. In: 2019 IEEE International Conference on Web Services (ICWS). IEEE, pp 214–218
Li J, Li J, Xie D, Cai Z (2015) Secure auditing and deduplicating data in cloud. IEEE Trans Comput 65(8):2386–2396
Jemel M, Serhrouchni A (2017) Decentralized access control mechanism with temporal dimension based on blockchain. In: 2017 IEEE 14th International Conference on e-Business Engineering (ICEBE). IEEE, pp 177–182
Ali M, Dhamotharan R, Khan E, Khan SU, Vasilakos AV, Li K, Zomaya AY (2015) SeDaSC: secure data sharing in clouds. IEEE Syst J 11(2):395–404
Zuo Y, Kang Z, Jian Xu, Chen Z (2021) BCAS: a blockchain-based ciphertext-policy attribute-based encryption scheme for cloud data security sharing. Int J Distrib Sens Netw 17(3):1550147721999616
Yu G, Wang Y, Cao Z, Lin J, Wang X (2019) Traceable and undeniable ciphertext-policy attribute-based encryption for cloud storage service. Int J Distrib Sens Netw 15(4):1550147719841276
Ma W, Ma J, Zhang Q, Xue H, Li Y, Dang X, Zhao M, Zhang J, Han C, Wu J (2020) Attribute revocable data sharing scheme based on blockchain and CP-ABE. In: Proceedings of the 4th International Conference on Computer Science and Application Engineering, pp 1–7
Wang C, Chow SSM, Wang Q, Ren K, Lou W (2011) Privacy-preserving public auditing for secure cloud storage. IEEE Trans Comput 62(2):362–375
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Ezhil Arasi, V., Indra Gandhi, K. & Kulothungan, K. Auditable attribute-based data access control using blockchain in cloud storage. J Supercomput 78, 10772–10798 (2022). https://doi.org/10.1007/s11227-021-04293-3
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-021-04293-3