Visible to the public Towards Blockchain-Based Scalable and Trustworthy File Sharing

TitleTowards Blockchain-Based Scalable and Trustworthy File Sharing
Publication TypeConference Paper
Year of Publication2018
AuthorsCui, S., Asghar, M. R., Russello, G.
Conference Name2018 27th International Conference on Computer Communication and Networks (ICCCN)
PublisherIEEE
ISBN Number978-1-5386-5156-8
KeywordsAccess Control, auditable information, authorisation, Bandwidth, blockchain technology, blockchain- based file storage systems, composability, cryptocurrency, cryptography, cyber physical systems, data management, distributed access control, distributed ledgers, distributed proxies, encrypted file sharing, Encryption, ensures confidentiality, file encryption keys, file organisation, files integrity, malicious behaviour, Peer-to-peer computing, proxy re-encryption based design, pubcrawl, resilience, Resiliency, revoked users, scalable key management mechanism, Trusted Computing, trustworthy file sharing, Trustworthy Systems, Writing
Abstract

In blockchain-based systems, malicious behaviour can be detected using auditable information in transactions managed by distributed ledgers. Besides cryptocurrency, blockchain technology has recently been used for other applications, such as file storage. However, most of existing blockchain- based file storage systems can not revoke a user efficiently when multiple users have access to the same file that is encrypted. Actually, they need to update file encryption keys and distribute new keys to remaining users, which significantly increases computation and bandwidth overheads. In this work, we propose a blockchain and proxy re-encryption based design for encrypted file sharing that brings a distributed access control and data management. By combining blockchain with proxy re-encryption, our approach not only ensures confidentiality and integrity of files, but also provides a scalable key management mechanism for file sharing among multiple users. Moreover, by storing encrypted files and related keys in a distributed way, our method can resist collusion attacks between revoked users and distributed proxies.

URLhttps://ieeexplore.ieee.org/document/8487379
DOI10.1109/ICCCN.2018.8487379
Citation Keycui_towards_2018