Access control based on entity matching for secure data sharing

Author(s):  
Juba Agoun ◽  
Mohand-Saïd Hacid
Author(s):  
Xin Wei ◽  
Yong Yan ◽  
Shaoyong Guo ◽  
Xuesong Qiu ◽  
Feng Qi

Author(s):  
Chunhua Li ◽  
Ronglei Wei ◽  
Zebang Wu ◽  
Ke Zhou ◽  
Cheng Lei ◽  
...  

2019 ◽  
Vol 11 (24) ◽  
pp. 7054 ◽  
Author(s):  
Muqaddas Naz ◽  
Fahad A. Al-zahrani ◽  
Rabiya Khalid ◽  
Nadeem Javaid ◽  
Ali Mustafa Qamar ◽  
...  

In a research community, data sharing is an essential step to gain maximum knowledge from the prior work. Existing data sharing platforms depend on trusted third party (TTP). Due to the involvement of TTP, such systems lack trust, transparency, security, and immutability. To overcome these issues, this paper proposed a blockchain-based secure data sharing platform by leveraging the benefits of interplanetary file system (IPFS). A meta data is uploaded to IPFS server by owner and then divided into n secret shares. The proposed scheme achieves security and access control by executing the access roles written in smart contract by owner. Users are first authenticated through RSA signatures and then submit the requested amount as a price of digital content. After the successful delivery of data, the user is encouraged to register the reviews about data. These reviews are validated through Watson analyzer to filter out the fake reviews. The customers registering valid reviews are given incentives. In this way, maximum reviews are submitted against every file. In this scenario, decentralized storage, Ethereum blockchain, encryption, and incentive mechanism are combined. To implement the proposed scenario, smart contracts are written in solidity and deployed on local Ethereum test network. The proposed scheme achieves transparency, security, access control, authenticity of owner, and quality of data. In simulation results, an analysis is performed on gas consumption and actual cost required in terms of USD, so that a good price estimate can be done while deploying the implemented scenario in real set-up. Moreover, computational time for different encryption schemes are plotted to represent the performance of implemented scheme, which is shamir secret sharing (SSS). Results show that SSS shows the least computational time as compared to advanced encryption standard (AES) 128 and 256.


Author(s):  
Shengmin Xu ◽  
Jianting Ning ◽  
Xinyi Huang ◽  
Jianying Zhou ◽  
Robert H. Deng

Sign in / Sign up

Export Citation Format

Share Document