A Blockchain-Enabled Decentralized Autonomous Access Control Scheme for Data Sharing
Kunyang Li,
Heng Pan (),
Yaoyao Zhang,
Bowei Zhang,
Ying Xing,
Yuyang Zhan,
Gaoxu Zhao and
Xueming Si
Additional contact information
Kunyang Li: Academy of Cyberspace Security, Zhongyuan University of Technology, Zhengzhou 450007, China
Heng Pan: Academy of Cyberspace Security, Zhongyuan University of Technology, Zhengzhou 450007, China
Yaoyao Zhang: Academy of Cyberspace Security, Guangzhou University, Guangzhou 510006, China
Bowei Zhang: Academy of Cyberspace Security, Zhongyuan University of Technology, Zhengzhou 450007, China
Ying Xing: Academy of Cyberspace Security, Zhongyuan University of Technology, Zhengzhou 450007, China
Yuyang Zhan: Academy of Cyberspace Security, Zhongyuan University of Technology, Zhengzhou 450007, China
Gaoxu Zhao: Academy of Cyberspace Security, Zhongyuan University of Technology, Zhengzhou 450007, China
Xueming Si: Academy of Cyberspace Security, Zhongyuan University of Technology, Zhengzhou 450007, China
Mathematics, 2025, vol. 13, issue 17, 1-21
Abstract:
With the rapid development of artificial intelligence, multi-party collaboration based on data sharing has become an inevitable trend. However, in practical applications, shared data often originate from multiple providers. Therefore, achieving secure and efficient data sharing while protecting the rights and interests of each data provider is a key challenge currently faced. Existing access control methods have the following shortcomings in multi-owner data scenarios. Most methods rely on centralized management, which makes it difficult to solve conflicts caused by inconsistent permission policies among multiple owners. There are problems such as poor consistency of permission management, low security, and lack of protection for the autonomous will of each owner. To this end, our paper proposes a fine-grained decentralized autonomous access control scheme based on blockchain, which includes three core stages: formulation, deployment, and execution of access control policies. In the access control policy formulation stage, the scheme constructs a multi-owner data policy matrix and introduces a benefit function based on a Stackelberg game to balance conflicting attributes to form a unified access policy. Secondly, in the access control policy deployment stage based on smart contracts, all data owners vote on the access control policy by calculating their own benefits to achieve a consensus on joint decision-making on the policy. Finally, in the policy execution and joint authorization phase, a decentralized authorization method based on threshold passwords is used to distribute access keys to each owner, ensuring that data is only granted after receiving authorization from a sufficient number of owners, thereby ensuring the ultimate control of each owner and the fine-grained access control. Finally, we verified the feasibility of the solution through case analysis and experiments.
Keywords: blockchain; decentralized access control; multi-owner data; Stackelberg game; threshold cryptography (search for similar items in EconPapers)
JEL-codes: C (search for similar items in EconPapers)
Date: 2025
References: View complete reference list from CitEc
Citations:
Downloads: (external link)
https://www.mdpi.com/2227-7390/13/17/2712/pdf (application/pdf)
https://www.mdpi.com/2227-7390/13/17/2712/ (text/html)
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:gam:jmathe:v:13:y:2025:i:17:p:2712-:d:1730764
Access Statistics for this article
Mathematics is currently edited by Ms. Emma He
More articles in Mathematics from MDPI
Bibliographic data for series maintained by MDPI Indexing Manager ().