A Personal Privacy Data Protection Scheme For Encryption and Revocation of High-Dimensional Attri-1
A Personal Privacy Data Protection Scheme For Encryption and Revocation of High-Dimensional Attri-1
Abstract
With the frequent occurrence of private data breaches, it is now more necessary than
ever to address how to protect private data. The combination of Ciphertext-Policy Attribute-
Based Encryption (CP-ABE) and blockchain typically enables secure storage and sharing of
data. However, in highdimensional attribute domains, that is, the number of attributes is
large, these schemes have issues such as low security of data protection, high computational
overhead, and high cost of attribute revocation. This paper proposes a personal privacy data
protection scheme for encryption and revocation of high-dimensional attribute domains to
address these issues. The proposed scheme is made up of three components. Firstly, Fast
High-dimensional Attribute Domain-based Message Encryption (HAD-FME) is proposed to
improve data security and reduce computational cost. Secondly, an Attribute Revocation
Mechanism Based on Sentry Mode (SM-ARM) is designed in combination with smart
contracts. Lastly, a Blockchain-based Model for Personal Privacy Data Protection (BC-
PPDP) is proposed by integrating HAD-FME with SM-ARM. The security analysis results
show that HAD-FME proposed in this paper is secure under the DLIN assumption, and the
attribute revocation satisfies both forward and backward security. Experiments show that
HADFME has higher computational efficiency than existing schemes in the high-dimensional
attribute domains, SM-ARM has lower revocation cost than existing attribute revocation
mechanisms, and smart contracts and blockchain work well.
Existing System
The rapid development of technologies such as cloud computing and the Internet of
Things (IoT) has led to the generation of a large amount of personal data worldwide.
Enterprises continuously collect and analyze these personal data, providing them with
professional services and generating significant economic benefits, enabling users and
enterprises to gain huge profits from the information society. Unfortunately, in recent years,
enterprises’ lack of data protection measures, such as storing data in plaintext on their
centralized servers, has led to an increasing number of personal dataleakage incidents.
Therefore, sharing and storing private data in a secure manner is critical. Blockchain, as a
decentralised ledger database, due to its characteristics of decentralization and difficulty in
tampering with data, can provide a trustworthy data storage and sharing environment.
Currently, many researchers have used blockchain in various fields, including data storage,
the Internet of Things, healthcare, transactions, and payments. At the same time, many
scholars have done a lot of research on tamper-resistance ledger databases. However, if the
data owner explicitly stores information related to private data on the blockchain, any user
can access the data information. This may result in the data owner losing control over
personal data. Ciphertext-PolicyAttribute-Based Encryption (CP-ABE) was proposed as a
solution by Bethencourt. In CP-ABE, the data owner can choose the ciphertext access
method, in which the access policy is included in the ciphertext and the user attribute set is
embedded in the key. The decryption process can only be completed when the user attribute
set meets the access policy. In this paper, the set of attributes and the number of attributes is
referred to as the attribute domain and attribute domain dimension, respectively.
Proposed System
Attribute-Based Encryption (ABE): Utilize attribute-based encryption to encrypt
data based on the attributes associated with it. This allows fine-grained access control,
ensuring that only users with specific attributes can decrypt and access the data.
Key Management System: Implement a robust key management system capable of
handling the complexities of high-dimensional attribute domains. This includes secure
key generation, distribution, storage, and revocation mechanisms.
High-Dimensional Attribute Handling: Develop efficient algorithms for handling
high-dimensional attribute domains. This includes methods for indexing, searching,
and retrieving encrypted data based on specific attributes while maintaining
computational efficiency.
Storage Optimization: Implement techniques to optimize the storage of encrypted
data in high-dimensional attribute domains. This may involve data compression,
efficient indexing, or storage partitioning strategies.
Algorithm
Data Decryption: Decrypt the data using the user's private key.
Dynamic Access Control: If any attribute is revoked, deny access even if the access
policy is satisfied.
Secure Communication: Use a secure communication protocol to transmit encrypted
data, preventing eavesdropping and ensuring data integrity.
Storage Optimization: Implement storage optimization techniques, such as
compression or partitioning, to manage encrypted data efficiently.
Advantages
Software Specification
Software Specification