The Journal of China Universities of Posts and Telecommunications ›› 2021, Vol. 28 ›› Issue (5): 18-26.doi: 10.19682/j.cnki.1005-8885.2021.0028

Special Issue: Special issue on Blockchain Technology and Applications

• Signal Processing • Previous Articles     Next Articles

Trusted data access and authorization protocol


  • Received:2021-06-21 Revised:2021-09-16 Online:2021-10-31 Published:2021-10-29
  • Contact: Ming Li


Threshold proxy re-encryption( PRE) authorizes the data access right of data subject to multiple proxies, who authorize the right again to delegatee to accomplish the end-to-end data encryption process from storage to authorization. Based on threshold PRE algorithm, in order to build a complete trusted data storage and authorization system, the four protocols, which are data access protocol, authorization proxy protocol, authorization proxy cancellation protocol and data reading authorization protocol, are defined completely. On that basis, an efficient data searching method is constructed by specifying the data delegatee. At last, to ensure the right to know of data, the audit log is processed with trusted data right confirmation based on distributed ledger technology. Meanwhile, a parallel data right confirmation processing method is defined based on hierarchical derivation algorithm of public and private key. In the end, the performance evaluation analysis of the protocol are given. Trusted data access and authorization protocol is convenient to build a complete data processing system on the premise of protecting data privacy based on public cloud storage system or distributed storage system.

Key words:

proxy re-encryption ( PRE), data privacy, distributed ledger technology, blockchain