Font Size: a A A

Research On Data Security Storage Access Control Scheme Based On Hyperledger Fabric

Posted on:2024-09-19Degree:MasterType:Thesis
Country:ChinaCandidate:Y WangFull Text:PDF
GTID:2568307097462954Subject:Electronic information
Abstract/Summary:PDF Full Text Request
The development of modern information technology has promoted the collection,transmission and storage of data.With the explosive growth and large-scale data applications of social media data,surveillance video data,and traffic data,data security and privacy protection have also attracted much attention.Traditional centralized data platforms are vulnerable to single point of failure,data leakage and other threats.Blockchain technology provides a solution to data management problems by virtue of its decentralized and distributed characteristics.However,there are many problems in the traditional blockchain-based data storage and access scheme.First,the existing schemes still use centralized access authorization in the selection of data access authorization and control methods,which is vulnerable to illegal attackers and hackers,causing serious security and privacy problems.Secondly,in the existing iot data storage and sharing schemes,the key used to encrypt data information is usually managed by the data owner or a third party central authority,and the key is easy to be leaked in the process of sharing.To solve the above problems,based on Hyperledger Fabric,this paper studies the security storage and sharing of data,as well as privacy protection issues in data sharing in IoT,based on Hyperledger Fabric,and presents the following research findings:1)Propose a decentralized data security storage and sharing scheme based on Hyperledger Fabric.Firstly,encryption algorithms are used to encrypt data plaintext,using the interstellar file system as the storage platform for data ciphertext.On the Fabric blockchain,only the hash value of the data address returned by the interstellar file system is stored,reducing the storage pressure on the chain and improving transaction efficiency;Secondly,in order to solve the problem of secure storage and distribution of data ciphertext,this scheme combines identity based conditional proxy re-encryption algorithm with chaincode technology to achieve fine-grained decryption permission assignment;Adopting attribute based access control to authorize access for data visitors and achieve access control for data information by data owners.The analysis results show that,compared with existing data storage and sharing schemes,the scheme not only ensures the security of data storage,but also achieves data sharing without leaking the data owner’s personal privacy,which improves the efficiency of on-chain transactions.2)Propose a Hyperledger Fabric based IoT data sharing and privacy protection scheme.Based on the practical application of the Internet of Things,an access control strategy management module for accessing IoT device information was designed.This module is improved in the attribute based access control architecture,combined with smart contracts,to provide distributed and fine-grained access control for accessing IoT data information.Participants manage corresponding IoT devices,collect information on managed IoT devices,encrypt device information,and upload it to the interstellar file system;Secondly,in order to address the issue of key loss and leakage during transmission,this scheme uses the key segmentation step in the Shamir secret sharing algorithm to divide the key into key shares and publish them on the Hyperledger Fabric blockchain platform,ensuring the secure storage of the key.The experimental results show that the proposed scheme achieves distributed access management without the involvement of other institutions,ensuring the security of the key,and has higher security and efficiency compared to other existing schemes.
Keywords/Search Tags:Hyperledger Fabric, data sharing, conditional proxy re-encryption, access control, Internet of Things, secret sharing
PDF Full Text Request
Related items