Skip to main content
Log in

Auditable attribute-based data access control using blockchain in cloud storage

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

Data security in cloud data sharing system is effectively ensured by data access control mechanism. Data access control becomes more challenging because of intruders and malicious cloud servers. Most of the traditional approaches do not consider the issues in controlling user accessing cloud data storage and sharing. Ciphertext policy attribute-based encryption is one of the most effective techniques that provide secure data access control for sensitive data outsourced in cloud storage. However, in traditional cloud data sharing system, there are several issues regarding transaction traceability, user authorization, data ownership management and access control preservation. Also, traditional access control schemes do not have an effective method to compensate cloud users whose data integrity is lost. To handle these issues, we propose a new data sharing system auditable attribute-based encryption scheme that integrates the advantages of blockchain technology with attribute-based access control. We designed a trustworthy scheme which uses blockchain to provide attribute-based secure data sharing with integrity auditing. It also provides compensation to data owners, if their data integrity is lost. The security analysis demonstrates the improvement in performance of the proposed access control scheme over existing data sharing schemes. It provides efficient and secure data sharing, reliable traceability and equitable mediation. Thus, the proposed approach preserves the integrity, privacy, security and consistency of the stored data, thereby guaranteeing authorized data access control to cloud users.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: 2007 IEEE symposium on security and privacy (SP'07). IEEE, pp 321–334

  2. Hur J (2011) Improving security and efficiency in attribute-based data sharing. IEEE Trans Knowl Data Eng 25(10):2271–2282

    Article  Google Scholar 

  3. Wei J, Liu W, Xuexian Hu (2016) Secure and efficient attribute-based access control for multiauthority cloud storage. IEEE Syst J 12(2):1731–1742

    Article  Google Scholar 

  4. Fan K, Tian Q, Wang J, Li H, Yang Y (2017) Privacy protection based access control scheme in cloud-based services. China Commun 14(1):61–71

    Article  Google Scholar 

  5. Pawar P, Sheikh R (2016) Implementation of secure authentication scheme and access control in cloud computing. Proc Int Conf ICT Bus Ind Gov 55:43–45

    Google Scholar 

  6. Ruj S, Nayak A, Stojmenovic I (2011) DACC: distributed access control in clouds. In: Proceedings of the 10th IEEE International Conference, pp 91–98

  7. Wan Z, Deng RH (2011) HASBE: a hierarchical attribute-based solution for flexible and scalable access control in cloud computing. IEEE Trans Inf Forensics Secur 7(2):743–754

    Article  Google Scholar 

  8. Wu X, Jiang R, Bhargava B (2015) On the security of data access control for multiauthority cloud storage systems. IEEE Trans Serv Comput 10(2):258–272

    Article  Google Scholar 

  9. Yang K, Jia X (2013) Expressive, efficient, and revocable data access control for multi-authority cloud storage. IEEE Trans Parallel Distrib Syst 25(7):1735–1744

    Article  Google Scholar 

  10. Yang C, Chen X, Xiang Y (2018) Blockchain-based publicly verifiable data deletion scheme for cloud storage. J Netw Comput Appl 103:185–193

    Article  Google Scholar 

  11. Huang H, Chen X, Qianhong Wu, Huang X, Shen J (2018) Bitcoin-based fair payments for outsourcing computations of fog devices. Futur Gener Comput Syst 78:850–858

    Article  Google Scholar 

  12. Küpçü A (2015) Official arbitration with secure cloud storage application. Comput J 58(4):831–852

    Article  Google Scholar 

  13. Buterin V (2014) Ethereum white paper. https://www.mendeley.com/. Accessed 27, Sep 2019

  14. Zhang, Y, Lin X, Xu C (2018) Blockchain-based secure data provenance for cloud storage. In: International Conference on Information and Communications Security. Springer, Cham, pp 3–19

  15. Yuan H, Chen X, Wang J, Yuan J, Yan H, Susilo W (2020) Blockchain-based public auditing and secure deduplication with fair arbitration. Inf Sci 541:409–425

    Article  MathSciNet  Google Scholar 

  16. Nguyen DC, Pathirana PN, Ding M, Seneviratne A (2019) Blockchain for secure ehrs sharing of mobile cloud based e-health systems. IEEE Access 7:66792–66806

    Article  Google Scholar 

  17. Kuo T-T, Kim H-E, Ohno-Machado L (2017) Blockchain distributed ledger technologies for biomedical and health care applications. J Am Med Inform Assoc 24(6):1211–1220

    Article  Google Scholar 

  18. Mettler M (2016) Blockchain technology in healthcare: the revolution starts here. In: 2016 IEEE 18th International Conference on E-Health Networking, Applications and Services (Healthcom). IEEE, pp 1–3

  19. Hardjono T, Pentland A (2019) Verifiable anonymous identities and access control in permissioned blockchains.

  20. Hu S, Hou L, Chen G, Weng J, Li J (2018) Reputation-based distributed knowledge sharing system in blockchain. In: Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, pp 476–481

  21. Rouhani S, Belchior R, Cruz RS, Deters R (2020) Distributed attribute-based access control system using a permissioned blockchain.

  22. Hur J, Kun Noh D (2010) Attribute-based access control with efficient revocation in data outsourcing systems. IEEE Trans Parallel Distrib Syst 22(7):1214–1221

    Article  Google Scholar 

  23. Korpela K, Hallikas J, Dahlberg T (2017) Digital supply chain transformation toward blockchain integration. In: Proceedings of the 50th Hawaii International Conference on System Sciences

  24. Le T, Mutka MW (2018) CapChain: a privacy preserving access control framework based on blockchain for pervasive environments. In: 2018 IEEE International Conference on Smart Computing (SMARTCOMP). IEEE, pp 57–64

  25. Dukkipati C, Zhang Y, Cheng LC (2018) Decentralized, blockchain based access control framework for the heterogeneous internet of things. In: Proceedings of the third ACM workshop on attribute-based access control, pp. 61–69

  26. Luu L, Chu D-H, Olickel H, Saxena P, Hobor A (2016) Making smart contracts smarter. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp 254–269

  27. Li J, Wu J, Jiang G, Srikanthan T (2020) Blockchain-based public auditing for big data in cloud storage. Inf Process Manag 57(6):102382

    Article  Google Scholar 

  28. Maesa DD, Francesco PM, Ricci L (2019) A blockchain based approach for the definition of auditable access control systems. Comput Secur 84:93–119

    Article  Google Scholar 

  29. Li H, Guo F, Wang L, Wang J, Wang B, Wu C (2021) A Blockchain-based public auditing protocol with self-certified public keys for cloud data. Secur Commun Netw 2021:1–10

    Google Scholar 

  30. Shu J, Zou X, Jia X, Zhang W, Xie R (2021) Blockchain-Based Decentralized Public Auditing for Cloud Storage. IEEE Trans Cloud Comput. https://doi.org/10.1109/TCC.2021.3051622

    Article  Google Scholar 

  31. Lekshmi MM, Subramanian N (2020) Data auditing in cloud storage using smart contract. In: 2020 Third International Conference on Smart Systems and Inventive Technology (ICSSIT). IEEE, pp 999–1002

  32. Wang C, Chen S, Feng Z, Jiang Y, Xue X (2019) Block chain-based data audit and access control mechanism in service collaboration. In: 2019 IEEE International Conference on Web Services (ICWS). IEEE, pp 214–218

  33. Li J, Li J, Xie D, Cai Z (2015) Secure auditing and deduplicating data in cloud. IEEE Trans Comput 65(8):2386–2396

    Article  MathSciNet  Google Scholar 

  34. Jemel M, Serhrouchni A (2017) Decentralized access control mechanism with temporal dimension based on blockchain. In: 2017 IEEE 14th International Conference on e-Business Engineering (ICEBE). IEEE, pp 177–182

  35. Ali M, Dhamotharan R, Khan E, Khan SU, Vasilakos AV, Li K, Zomaya AY (2015) SeDaSC: secure data sharing in clouds. IEEE Syst J 11(2):395–404

    Article  Google Scholar 

  36. Zuo Y, Kang Z, Jian Xu, Chen Z (2021) BCAS: a blockchain-based ciphertext-policy attribute-based encryption scheme for cloud data security sharing. Int J Distrib Sens Netw 17(3):1550147721999616

    Article  Google Scholar 

  37. Yu G, Wang Y, Cao Z, Lin J, Wang X (2019) Traceable and undeniable ciphertext-policy attribute-based encryption for cloud storage service. Int J Distrib Sens Netw 15(4):1550147719841276

    Google Scholar 

  38. Ma W, Ma J, Zhang Q, Xue H, Li Y, Dang X, Zhao M, Zhang J, Han C, Wu J (2020) Attribute revocable data sharing scheme based on blockchain and CP-ABE. In: Proceedings of the 4th International Conference on Computer Science and Application Engineering, pp 1–7

  39. Wang C, Chow SSM, Wang Q, Ren K, Lou W (2011) Privacy-preserving public auditing for secure cloud storage. IEEE Trans Comput 62(2):362–375

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to V. Ezhil Arasi.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ezhil Arasi, V., Indra Gandhi, K. & Kulothungan, K. Auditable attribute-based data access control using blockchain in cloud storage. J Supercomput 78, 10772–10798 (2022). https://doi.org/10.1007/s11227-021-04293-3

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-021-04293-3

Keywords

Navigation