Simple Science

Cutting edge science explained simply

# Computer Science# Cryptography and Security

FACOS: A New Approach to Data Security

FACOS offers a secure way to manage sensitive data using blockchain technology.

― 6 min read


Data Security with FACOSData Security with FACOSadvanced blockchain solutions.FACOS enhances data protection using
Table of Contents

In today's world, large amounts of data are generated every day in areas like finance, government, and healthcare. This data must be stored securely, shared easily, and accessed carefully to protect information. The emergence of blockchain technology offers a way to keep this information safe while still allowing access when needed.

Blockchain is a special type of technology that enables secure and Decentralized Storage of data. It connects records in a sequence, ensuring that data cannot be changed or tampered with. However, while blockchain has many advantages, there are still challenges to overcome, especially in areas such as data privacy and access control.

Challenges in Data Management

One major challenge with traditional blockchain systems is dealing with sensitive data. Public blockchains-those open to anyone-aren't ideal for personal or sensitive information. They often lack the necessary security and privacy features to protect users' data effectively.

Another challenge is the management of access to data. When many users need to access data, it becomes crucial to ensure that only those with the right permissions can do so. Additionally, the process must be efficient, especially as the amount of data continues to grow.

Many existing solutions focus on storing data off the blockchain or using smart contracts for access control. However, these methods often fail to guarantee privacy or security, particularly when sensitive information is involved. There is a need for new solutions that combine the benefits of blockchain technology with effective access control.

Proposed Solutions

To address these issues, a new system is proposed that utilizes blockchain technology to provide a more secure and efficient way of managing sensitive data. This system, called FACOS, aims to enhance privacy and provide fine-grained access control both on-chain (within the blockchain) and off-chain (outside the blockchain).

Key Features of FACOS

Decentralized Storage

FACOS employs a decentralized network to store data securely. Instead of relying on a single location for storage, data is held across multiple nodes. This technique helps prevent data loss and makes it difficult for unauthorized individuals to access the information.

Access Control Methods

FACOS includes three main access control methods:

  1. Attribute-Based Encryption (ABE): This method allows data owners to determine who can access data based on specific attributes of users, such as roles or permissions.

  2. Broadcast Encryption (BE): This approach allows a group of users to access specific information, making it effective when dealing with multiple users needing the same data.

  3. Threshold Encryption (TE): This technique ensures that data can only be accessed when a certain number of users come together. This helps bolster security by requiring multiple parties to agree before information can be obtained.

Each of these methods can be customized to meet the specific needs of different users, ensuring that the right people have the right access.

Trusted Execution Environment (TEE)

A Trusted Execution Environment helps verify the identities of users who request access to data. This layer of security ensures that only authorized clients can access sensitive information, further enhancing privacy.

Asynchronous Byzantine Fault Tolerance (BFT)

FACOS employs an advanced fault tolerance protocol that guarantees the reliability of the off-chain storage. Even if some nodes fail, the system can continue to operate smoothly without data loss or corruption. This technique is essential for maintaining the integrity of data.

Workflow of FACOS

The operation of FACOS can be divided into two main phases: the writing phase and the reading phase.

Writing Phase

  1. Input Data: The data owner inputs a message (data) they want to store securely.

  2. Select Access Control Method: The data owner chooses one of the three access control methods that suit their needs.

  3. Encrypt Data: The message is encrypted using the chosen access control method, ensuring that unauthorized users cannot read it.

  4. Store Hash and Ciphertext: The system stores the hash (a digital fingerprint of the data) and the encrypted message in off-chain storage.

  5. Consensus and Storage: The nodes in the storage system reach an agreement on the stored data, confirming that it is accurate and secure.

  6. On-Chain Storage: Once the off-chain storage is confirmed, the access type and relevant encrypted data are written to the blockchain, creating an immutable record.

Reading Phase

  1. Request Access: A data requester (user) sends their request to access the stored data, including their access credentials.

  2. Validation: The trusted verifier checks if the requester has the necessary permissions to access the data.

  3. Receive Key: If the requester is authorized, they receive a key necessary to decrypt the data.

  4. Retrieve Data: The requester can then retrieve the encrypted data from off-chain storage and decrypt it to access the original message.

Evaluating FACOS

To ensure that FACOS is efficient and practical, extensive evaluations were conducted. The evaluation process involved deploying the system on cloud platforms and testing it under real-world conditions. Performance metrics assessed included speed, reliability, and overall effectiveness of the system.

Performance Metrics

  1. Latency: The time taken for users to upload and download data was recorded. On average, it took about 2.79 seconds to upload and 0.96 seconds to download.

  2. Scalability: The system exhibited high scalability, meaning it was able to accommodate a growing number of users without a significant drop in performance.

  3. Security: The private and sensitive data remained secure throughout the process, satisfying privacy requirements.

  4. Efficiency: Comparisons with existing systems showed that FACOS provided better performance in terms of time taken for data transactions.

Real-World Applications

FACOS can be beneficial across several sectors, including:

  • Finance: Securely sharing financial records and transactions while maintaining privacy and compliance with regulations.

  • Healthcare: Protecting patient data while allowing necessary access to medical professionals.

  • Government: Safeguarding sensitive information and ensuring that only authorized personnel can access critical data.

Conclusion

In the rapidly evolving digital landscape, managing sensitive data poses significant challenges. The FACOS system presents a powerful solution to these challenges by combining blockchain technology with advanced access control and secure storage methods.

By adopting FACOS, organizations can enhance their privacy and security measures while facilitating efficient and streamlined access to important information. This system empowers users to maintain control over their data, protecting their privacy and ensuring that only those with the right permissions can access it.

In summary, FACOS represents a significant advancement in data management technology, offering a promising approach to securing sensitive data across various domains.

Original Source

Title: FACOS: Enabling Privacy Protection Through Fine-Grained Access Control with On-chain and Off-chain System

Abstract: Data-driven landscape across finance, government, and healthcare, the continuous generation of information demands robust solutions for secure storage, efficient dissemination, and fine-grained access control. Blockchain technology emerges as a significant tool, offering decentralized storage while upholding the tenets of data security and accessibility. However, on-chain and off-chain strategies are still confronted with issues such as untrusted off-chain data storage, absence of data ownership, limited access control policy for clients, and a deficiency in data privacy and auditability. To solve these challenges, we propose a permissioned blockchain-based privacy-preserving fine-grained access control on-chain and off-chain system, namely FACOS. We applied three fine-grained access control solutions and comprehensively analyzed them in different aspects, which provides an intuitive perspective for system designers and clients to choose the appropriate access control method for their systems. Compared to similar work that only stores encrypted data in centralized or non-fault-tolerant IPFS systems, we enhanced off-chain data storage security and robustness by utilizing a highly efficient and secure asynchronous Byzantine fault tolerance (BFT) protocol in the off-chain environment. As each of the clients needs to be verified and authorized before accessing the data, we involved the Trusted Execution Environment (TEE)-based solution to verify the credentials of clients. Additionally, our evaluation results demonstrated that our system offers better scalability and practicality than other state-of-the-art designs.

Authors: Chao Liu, Cankun Hou, Tianyu Jiang, Jianting Ning, Hui Qiao, Yusen Wu

Last Update: 2024-06-05 00:00:00

Language: English

Source URL: https://arxiv.org/abs/2406.03695

Source PDF: https://arxiv.org/pdf/2406.03695

Licence: https://creativecommons.org/licenses/by/4.0/

Changes: This summary was created with assistance from AI and may have inaccuracies. For accurate information, please refer to the original source documents linked here.

Thank you to arxiv for use of its open access interoperability.

More from authors

Similar Articles