Towards Blockchain-Based Scalable and Trustworthy File Sharing
Title | Towards Blockchain-Based Scalable and Trustworthy File Sharing |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Cui, S., Asghar, M. R., Russello, G. |
Conference Name | 2018 27th International Conference on Computer Communication and Networks (ICCCN) |
Publisher | IEEE |
ISBN Number | 978-1-5386-5156-8 |
Keywords | Access Control, auditable information, authorisation, Bandwidth, blockchain technology, blockchain- based file storage systems, composability, cryptocurrency, cryptography, cyber physical systems, data management, distributed access control, distributed ledgers, distributed proxies, encrypted file sharing, Encryption, ensures confidentiality, file encryption keys, file organisation, files integrity, malicious behaviour, Peer-to-peer computing, proxy re-encryption based design, pubcrawl, resilience, Resiliency, revoked users, scalable key management mechanism, Trusted Computing, trustworthy file sharing, Trustworthy Systems, Writing |
Abstract | In blockchain-based systems, malicious behaviour can be detected using auditable information in transactions managed by distributed ledgers. Besides cryptocurrency, blockchain technology has recently been used for other applications, such as file storage. However, most of existing blockchain- based file storage systems can not revoke a user efficiently when multiple users have access to the same file that is encrypted. Actually, they need to update file encryption keys and distribute new keys to remaining users, which significantly increases computation and bandwidth overheads. In this work, we propose a blockchain and proxy re-encryption based design for encrypted file sharing that brings a distributed access control and data management. By combining blockchain with proxy re-encryption, our approach not only ensures confidentiality and integrity of files, but also provides a scalable key management mechanism for file sharing among multiple users. Moreover, by storing encrypted files and related keys in a distributed way, our method can resist collusion attacks between revoked users and distributed proxies. |
URL | https://ieeexplore.ieee.org/document/8487379 |
DOI | 10.1109/ICCCN.2018.8487379 |
Citation Key | cui_towards_2018 |
- ensures confidentiality
- Writing
- Trustworthy Systems
- trustworthy file sharing
- Trusted Computing
- scalable key management mechanism
- revoked users
- Resiliency
- resilience
- pubcrawl
- proxy re-encryption based design
- Peer-to-peer computing
- malicious behaviour
- files integrity
- file organisation
- file encryption keys
- Access Control
- encryption
- encrypted file sharing
- distributed proxies
- distributed ledgers
- distributed access control
- data management
- cyber physical systems
- Cryptography
- cryptocurrency
- composability
- blockchain- based file storage systems
- blockchain technology
- Bandwidth
- authorisation
- auditable information