Next Article in Journal
A Monitoring System for Online Fault Detection and Classification in Photovoltaic Plants
Next Article in Special Issue
Hyperledger Fabric Blockchain for Securing the Edge Internet of Things
Previous Article in Journal
Permittivity Measurements for Cypress and Rockrose Biomass Versus Temperature, Density, and Moisture Content
Previous Article in Special Issue
Towards a Secure Thermal-Energy Aware Routing Protocol in Wireless Body Area Network Based on Blockchain Technology
Article

A Challenge-Response Assisted Authorisation Scheme for Data Access in Permissioned Blockchains

School of Electronic Engineering and Computer Science, Queen Mary University of London, London E1 4NS, UK
*
Author to whom correspondence should be addressed.
Sensors 2020, 20(17), 4681; https://doi.org/10.3390/s20174681
Received: 15 June 2020 / Revised: 5 August 2020 / Accepted: 12 August 2020 / Published: 19 August 2020
(This article belongs to the Special Issue Recent Advances of Blockchain Technologies in Sensor Networks)
Permissioned blockchains can be applied for sharing data among permitted users to authorise the data access requests in a permissioned blockchain. A consensus network constructed using pre-selected nodes should verify a data requester’s credentials to determine if he or she have the correct permissions to access the queried data. However, current studies do not consider how to protect users’ privacy for data authorisation if the pre-selected nodes become untrusted, e.g., the pre-selected nodes are manipulated by attackers. When a user’s credentials are exposed to pre-selected nodes in the consensus network during authorisation, the untrusted (or even malicious) pre-selected nodes may collect a user’s credentials and other private information without the user’s right to know. Therefore, the private data exposed to the consensus network should be tightly restricted. In this paper, we propose a challenge-response based authorisation scheme for permissioned blockchain networks named Challenge-Response Assisted Access Authorisation (CRA3) to protect users’ credentials during authorisation. In CRA3, the pre-selected nodes in the consensus network do not require users’ credentials to authorise data access requests to prevent privacy leakage when these nodes are compromised or manipulated by attackers. Furthermore, the computational burden on the consensus network for authorisation is reduced because the major computing work of the authorisation is executed by the data requester and provider in CRA3. View Full-Text
Keywords: privacy enhancement; permissioned blockchain; access control; decentralised network privacy enhancement; permissioned blockchain; access control; decentralised network
Show Figures

Figure 1

MDPI and ACS Style

Zhang, X.; Liu, C.; Chai, K.K.; Poslad, S. A Challenge-Response Assisted Authorisation Scheme for Data Access in Permissioned Blockchains. Sensors 2020, 20, 4681. https://doi.org/10.3390/s20174681

AMA Style

Zhang X, Liu C, Chai KK, Poslad S. A Challenge-Response Assisted Authorisation Scheme for Data Access in Permissioned Blockchains. Sensors. 2020; 20(17):4681. https://doi.org/10.3390/s20174681

Chicago/Turabian Style

Zhang, Xiaoshuai, Chao Liu, Kok K. Chai, and Stefan Poslad. 2020. "A Challenge-Response Assisted Authorisation Scheme for Data Access in Permissioned Blockchains" Sensors 20, no. 17: 4681. https://doi.org/10.3390/s20174681

Find Other Styles
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Back to TopTop