• 中国计算机学会会刊
  • 中国科技核心期刊
  • 中文核心期刊

计算机工程与科学 ›› 2025, Vol. 47 ›› Issue (9): 1609-1617.

• 计算机网络与信息安全 • 上一篇    下一篇

基于区块链和属性基加密的用户分类分级访问控制模型

尹晓帆1,李晓会1,张思琪2   

  1. (1.辽宁工业大学电子与信息工程学院,辽宁 锦州 121001;
    2.天津轻工职业技术学院电子信息与自动化学院,天津 300350) 
  • 收稿日期:2023-10-07 修回日期:2024-07-02 出版日期:2025-09-25 发布日期:2025-09-22
  • 基金资助:
    国家自然科学基金(61802161);辽宁省应用基础研究计划(2022JH2/101300278);辽宁工业大学研究生教育改革创新项目(YJG2023013)

A user classification and hierarchical access control model based on blockchain and attribute-based encryption

YIN Xiaofan1,LI Xiaohui1,ZHANG Siqi2   

  1. (1.School of Electronics & Information Engineering,Liaoning University of Technology,Jinzhou 121001;
    2.School of Electronic Information and Automation,Tianjin Light Industry Vocational Technical College,Tianjin 300350,China)

  • Received:2023-10-07 Revised:2024-07-02 Online:2025-09-25 Published:2025-09-22

摘要: 针对用户的理财数据发布隐私保护方法,利用联盟链多方维护的特点,采用链上链下相结合的方式,减少存储开销,由用户自定义访问策略,采用属性基加密技术实现用户分类分级的访问控制。该方案提出一种基于属性基加密的用户分类分级访问控制模型,该模型采用链上和链下相结合的形式,利用基于属性的访问控制模型,采取密文策略的属性加密,将声誉激励机制嵌入智能合约中,根据用户的上传和查询操作自动修改信任积分,根据数据请求者的信任积分对其进行分类分级的操作,从而实现让不同级别的用户拥有不同的访问数据权限,既能保证数据的安全性,又能保证用户访问数据时的灵活性。

关键词: 属性基加密, 区块链, 访问控制, 分类分级

Abstract: The privacy protection method for users financial data publishing utilizes the characteristics of multi-party maintenance in the consortium chain,and adopts a combination of on-chain and off-chain to reduce storage costs.The access policy is customized by the user, and the attribute-based encryption technology is used to achieve access control for user classification and hierarchy.This paper proposes a user classification and hierarchical access control model based on attribute based encryption.The model combines on-chain and off-chain forms,utilizes attribute-based access control model,adopts ciphertext policy attribute-based  encryption,embeds reputation incentive mechanism into smart contracts,automatically modifies trust scores based on user upload and query operations,and establishes the classifications and hierarchies of  data requesters based on their trust scores,thereby,different levels of users have different access permissions to data,ensuring both data security and flexibility when accessing data.
Key words:attribute-based encryption;blockchain;access control;classification and hierarchical