A Challenge-Response Assisted Authorisation Scheme for Data Access in Permissioned Blockchains

Permissioned blockchains can be applied for sharing data among permitted users to authorise the data access requests in a permissioned blockchain. A consensus network constructed using pre-selected nodes should verify a data requester’s credentials to determine if he or she have the correct permissions to access the queried data. However, current studies do not consider how to protect users’ privacy for data authorisation if the pre-selected nodes become untrusted, e.g., the pre-selected nodes are manipulated by attackers. When a user’s credentials are exposed to pre-selected nodes in the consensus network during authorisation, the untrusted (or even malicious) pre-selected nodes may collect a user’s credentials and other private information without the user’s right to know. Therefore, the private data exposed to the consensus network should be tightly restricted. In this paper, we propose a challenge-response based authorisation scheme for permissioned blockchain networks named Challenge-Response Assisted Access Authorisation (CRA3) to protect users’ credentials during authorisation. In CRA3, the pre-selected nodes in the consensus network do not require users’ credentials to authorise data access requests to prevent privacy leakage when these nodes are compromised or manipulated by attackers. Furthermore, the computational burden on the consensus network for authorisation is reduced because the major computing work of the authorisation is executed by the data requester and provider in CRA3.

[1]  Kankar Bhattacharya,et al.  Queuing Analysis Based PEV Load Modeling Considering Battery Charging Behavior and Their Impact on Distribution System Operation , 2017, IEEE Transactions on Smart Grid.

[2]  Vincent Gramoli,et al.  The Attack of the Clones against Proof-of-Authority , 2019, NDSS.

[3]  Hovav Shacham,et al.  Group signatures with verifier-local revocation , 2004, CCS '04.

[4]  Bitcoin Proof of Stake: A Peer-to-Peer Electronic Cash System , 2020 .

[5]  Stefan Poslad,et al.  Blockchain Support for Flexible Queries with Granular Access Control to Electronic Medical Records (EMR) , 2018, 2018 IEEE International Conference on Communications (ICC).

[6]  Daniel Davis Wood,et al.  ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER , 2014 .

[7]  Wei Jiang,et al.  Healthcare Data Gateways: Found Healthcare Intelligence on Blockchain with Novel Privacy Risk Control , 2016, Journal of Medical Systems.

[8]  Marko Vukolic,et al.  Hyperledger fabric: a distributed operating system for permissioned blockchains , 2018, EuroSys.

[9]  Alex Pentland,et al.  Decentralizing Privacy: Using Blockchain to Protect Personal Data , 2015, 2015 IEEE Security and Privacy Workshops.

[10]  Ed Dawson,et al.  The breadth of Shamir's secret-sharing scheme , 1994, Comput. Secur..

[11]  Aleksandr Ometov,et al.  Blockchain Evaluation Approaches: State-of-the-Art and Future Perspective , 2020, Sensors.

[12]  Franz J. Hauck,et al.  Design of a Privacy-Preserving Decentralized File Storage with Financial Incentives , 2017, 2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).

[13]  Masayuki Hashimoto,et al.  Traceable and Fully Anonymous Attribute Based Group Signature Scheme with Verifier Local Revocation from Lattices , 2019, NSS.

[14]  Luis F. Ochoa,et al.  A statistical analysis of EV charging behavior in the UK , 2015, 2015 IEEE PES Innovative Smart Grid Technologies Latin America (ISGT LATAM).

[15]  Marc Joye,et al.  A Practical and Provably Secure Coalition-Resistant Group Signature Scheme , 2000, CRYPTO.

[16]  Yu Zhang,et al.  An IoT electric business model based on the protocol of bitcoin , 2015, 2015 18th International Conference on Intelligence in Next Generation Networks.

[17]  Huaxiong Wang,et al.  Lattice-based Group Signature Scheme with Verifier-local Revocation , 2014, IACR Cryptol. ePrint Arch..

[18]  Qingzhong Li,et al.  A Permissioned Blockchain Framework for Supporting Instant Transaction and Dynamic Block Size , 2016, 2016 IEEE Trustcom/BigDataSE/ISPA.

[19]  Keke Gai,et al.  Permissioned Blockchain and Edge Computing Empowered Privacy-Preserving Smart Grid Networks , 2019, IEEE Internet of Things Journal.

[20]  John Domingue,et al.  The Blockchain and Kudos: A Distributed System for Educational Record, Reputation and Reward , 2016, EC-TEL.

[21]  Marcel Antal,et al.  Blockchain Based Decentralized Management of Demand Response Programs in Smart Energy Grids , 2018, Sensors.

[22]  Chao Liu,et al.  Peer-to-peer electricity trading system: smart contracts based proof-of-benefit consensus protocol , 2019, Wirel. Networks.

[23]  Salil S. Kanhere,et al.  BlockChain: A Distributed Solution to Automotive Security and Privacy , 2017, IEEE Communications Magazine.

[24]  Kishor S. Trivedi,et al.  Performance Modeling of PBFT Consensus Process for Permissioned Blockchain Network (Hyperledger Fabric) , 2017, 2017 IEEE 36th Symposium on Reliable Distributed Systems (SRDS).

[25]  William E. Burr,et al.  Recommendation for Key Management, Part 1: General (Revision 3) , 2006 .

[26]  Simon Monk Programming the Raspberry Pi: Getting Started with Python , 2012 .

[27]  Satoshi Nakamoto Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .

[28]  Wenbo Mao,et al.  Modern Cryptography: Theory and Practice , 2003 .

[29]  Charles Noyes BitAV: Fast Anti-Malware by Distributed Blockchain Consensus and Feedforward Scanning , 2016, ArXiv.