Author
Listed:
- Kunyang Li
(Academy of Cyberspace Security, Zhongyuan University of Technology, Zhengzhou 450007, China)
- Heng Pan
(Academy of Cyberspace Security, Zhongyuan University of Technology, Zhengzhou 450007, China)
- Yaoyao Zhang
(Academy of Cyberspace Security, Guangzhou University, Guangzhou 510006, China)
- Bowei Zhang
(Academy of Cyberspace Security, Zhongyuan University of Technology, Zhengzhou 450007, China)
- Ying Xing
(Academy of Cyberspace Security, Zhongyuan University of Technology, Zhengzhou 450007, China)
- Yuyang Zhan
(Academy of Cyberspace Security, Zhongyuan University of Technology, Zhengzhou 450007, China)
- Gaoxu Zhao
(Academy of Cyberspace Security, Zhongyuan University of Technology, Zhengzhou 450007, China)
- Xueming Si
(Academy of Cyberspace Security, Zhongyuan University of Technology, Zhengzhou 450007, China)
Abstract
With the rapid development of artificial intelligence, multi-party collaboration based on data sharing has become an inevitable trend. However, in practical applications, shared data often originate from multiple providers. Therefore, achieving secure and efficient data sharing while protecting the rights and interests of each data provider is a key challenge currently faced. Existing access control methods have the following shortcomings in multi-owner data scenarios. Most methods rely on centralized management, which makes it difficult to solve conflicts caused by inconsistent permission policies among multiple owners. There are problems such as poor consistency of permission management, low security, and lack of protection for the autonomous will of each owner. To this end, our paper proposes a fine-grained decentralized autonomous access control scheme based on blockchain, which includes three core stages: formulation, deployment, and execution of access control policies. In the access control policy formulation stage, the scheme constructs a multi-owner data policy matrix and introduces a benefit function based on a Stackelberg game to balance conflicting attributes to form a unified access policy. Secondly, in the access control policy deployment stage based on smart contracts, all data owners vote on the access control policy by calculating their own benefits to achieve a consensus on joint decision-making on the policy. Finally, in the policy execution and joint authorization phase, a decentralized authorization method based on threshold passwords is used to distribute access keys to each owner, ensuring that data is only granted after receiving authorization from a sufficient number of owners, thereby ensuring the ultimate control of each owner and the fine-grained access control. Finally, we verified the feasibility of the solution through case analysis and experiments.
Suggested Citation
Kunyang Li & Heng Pan & Yaoyao Zhang & Bowei Zhang & Ying Xing & Yuyang Zhan & Gaoxu Zhao & Xueming Si, 2025.
"A Blockchain-Enabled Decentralized Autonomous Access Control Scheme for Data Sharing,"
Mathematics, MDPI, vol. 13(17), pages 1-21, August.
Handle:
RePEc:gam:jmathe:v:13:y:2025:i:17:p:2712-:d:1730764
Download full text from publisher
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jmathe:v:13:y:2025:i:17:p:2712-:d:1730764. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
We have no bibliographic references for this item. You can help adding them by using this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .
Please note that corrections may take a couple of weeks to filter through
the various RePEc services.