logo

SCIENCE CHINA Information Sciences, Volume 61, Issue 4: 049102(2018) https://doi.org/10.1007/s11432-017-9245-1

DESC: enabling secure data exchange based on smart contracts

More info
  • ReceivedAug 6, 2017
  • AcceptedSep 20, 2017
  • PublishedFeb 8, 2018

Abstract

There is no abstract available for this article.


Acknowledgment

This work was supported by National Natural Science Foundation of China (NSFC) (Grant No. 61572136), and Shanghai Innovation Action Project (Grant No. 16DZ1100200).


References

[1] Ma Z F. Digital rights management: model, technology and application. China Commun, 2017, 14:łinebreak 156--167. Google Scholar

[2] Zhu L, Chen M, Zhang Z. A privacy-preserving video subscription scheme with the limitation of expire date. Sci China Inf Sci, 2017, 60: 098101 CrossRef Google Scholar

[3] Han W, Xu M, Zhao W. A trusted decentralized access control framework for the client/server architecture. J Network Comput Appl, 2010, 33: 76-83 CrossRef Google Scholar

[4] Hu V C, Kuhn D R, Ferraiolo D F. Attribute-based access control. Computer, 2015, 48: 85--88. Google Scholar

[5] Kosba A, Miller A, Shi E, et al. Hawk: the blockchain model of cryptography and privacy-preserving smart contracts. In: Proceedings of IEEE Symposium on Security and Privacy (SP), San Jose, 2016. 839--858. Google Scholar

[6] Buterin V. Ethereum: a next-generation smart contra-łinebreak ct and decentralized application platform.hspace-0.5 mm 2017. https:łinebreak //github.com/ethereum/wiki/wiki/White-Paper. Google Scholar

[7] Androulaki E, Cachin C, Christidis K, et al. Hyperl-łinebreak edger fabric proposals: next consensus architecture pr-łinebreak oposal. 2017. http://github.com/hyperledger/fabric/łinebreak blob/master/proposals/r1/Next-Consensus-Architectłinebreak ure-Proposal.md. Google Scholar

[8] Kent A D, Liebrock L M. Secure communication via shared knowledge and a salted hash in ad-hoc environments. In: Proceedings of Computer Software and Applications Conference Workshops, Munich, 2011.łinebreak 122--127. Google Scholar

[9] Boldyreva A, Chenette N, O'Neill A. Order-preserving encryption revisited: improved security analysis and alternative solutions. In: Proceedings of the 31st Annual Conference on Advances in Cryptology, Santa Barbara, 2011. 578--595. Google Scholar

  • Figure 1

    (Color online) DESC framework workflow.

  •   

    Algorithm 1 Policy enforcement algorithm

    Require:ea: exchange attributes; pa: policy attributes.

    Output:result: application result for data exchange.

    for $\rm{identity}~\in~\rm{pa.blacklist}$

    if $\rm{ea.identity}~=~\rm{identity}$ then

    $\rm{result}~\leftarrow~``\rm{deny~application}"$;

    Return $\rm{result};~~~\blacktriangleright$ deny application

    end if

    end for

    for $\rm{identity}~\in~\rm{pa.whitelist}$

    if $\rm{ea.identity}~=~\rm{identity}$ then

    $\rm{result}~\leftarrow~\rm{genLicense}()$;

    Return $\rm{result};~~~\blacktriangleright$ grant license

    end if

    end for

    if $\rm{ea.price}~\in~\rm{pa.priceRange}~\textbf{~and~}$ $\rm{ea.time}~\in~\rm{pa.exchangeTimeRange}~\textbf{~and~}$ $\rm{ea.sample}~\in~\rm{pa.sampleRateRange}~\textbf{~and~}$ $\rm{ea.update}~\in~\rm{pa.updateFrequencyRange}~\textbf{~and~}$ $\rm{ea.damages}~\in~\rm{pa.liquidatedDamagesRange}$ then

    $\rm{result}~\leftarrow~\rm{genLicense}()$;

    Return $\rm{result};~~~~\blacktriangleright$ grant license

    end if

    $\rm{result}~\leftarrow~``\rm{deny~application}"$;

    Return $\rm{result}.~~~~~\blacktriangleright$ deny application

Copyright 2020 Science China Press Co., Ltd. 《中国科学》杂志社有限责任公司 版权所有

京ICP备18024590号-1