[go: up one dir, main page]

CN120433962A - A decentralized data access control method for cross-domain collaboration of drones - Google Patents

A decentralized data access control method for cross-domain collaboration of drones

Info

Publication number
CN120433962A
CN120433962A CN202510491342.6A CN202510491342A CN120433962A CN 120433962 A CN120433962 A CN 120433962A CN 202510491342 A CN202510491342 A CN 202510491342A CN 120433962 A CN120433962 A CN 120433962A
Authority
CN
China
Prior art keywords
data
transaction
access
contract
policy
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202510491342.6A
Other languages
Chinese (zh)
Inventor
程子文
文言
陈勇
屠双龙
闵博瀚
纪祖臻
裴植
杨炳珍
季丽花
林元浩
林有彬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang University of Technology ZJUT
Original Assignee
Zhejiang University of Technology ZJUT
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang University of Technology ZJUT filed Critical Zhejiang University of Technology ZJUT
Priority to CN202510491342.6A priority Critical patent/CN120433962A/en
Publication of CN120433962A publication Critical patent/CN120433962A/en
Pending legal-status Critical Current

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

本发明公开了一种面向无人机的跨域协作的去中心化数据访问控制方法,该方法基于的底层架构为区块链网络,并在区块链网络上部署基于智能合约的访问控制模块,该模块嵌入有访问控制算法ScaBAC(Smart‑contract‑enabled attribute‑based AccessControl),一种智能合约驱动的基于属性的去中心化访问控制算法,其工作步骤包括数据权限表达、数据访问执行以及数据权限传递与获得3部分,本发明方法很好地在去中心化环境中量化无人机数据的权限属性,并支持动态任务中的灵活授权,通过智能合约实现链上自动决策与链下数据验证的高效协同,以及确保无人机数据流转过程的可控性与可溯源性等优点。本发明方法能很好地支持多无人机协同任务中的实时权限更新,实现细粒度权限表达。

This paper discloses a decentralized data access control method for cross-domain collaboration of unmanned aerial vehicles (UAVs). This method is based on a blockchain network and deploys a smart contract-based access control module on the blockchain network. This module embeds the access control algorithm ScaBAC (Smart-contract-enabled attribute-based Access Control), a smart contract-driven attribute-based decentralized access control algorithm. Its working steps include data permission expression, data access execution, and data permission transfer and acquisition. This method effectively quantifies the permission attributes of UAV data in a decentralized environment and supports flexible authorization in dynamic tasks. It achieves efficient coordination between on-chain automatic decision-making and off-chain data verification through smart contracts, and ensures the controllability and traceability of the UAV data flow process. This method can effectively support real-time permission updates in multi-UAV collaborative tasks and achieve fine-grained permission expression.

Description

Unmanned aerial vehicle-oriented cross-domain collaboration decentralised data access control method
Technical Field
The invention belongs to the technical field of unmanned aerial vehicle data security and blockchain, and particularly relates to an unmanned aerial vehicle cross-domain cooperation-oriented decentralizing data access control method which is used for realizing fine granularity management, automatic decision and trusted flow of data authority in a dynamic task by an unmanned aerial vehicle group.
Background
Along with the rapid development of unmanned aerial vehicle technology, unmanned aerial vehicles are increasingly widely applied in the fields of military, logistics, agriculture, disaster relief and the like. However, in a large-scale collaboration scenario, the balanced safety and real-time requirements of the unmanned aerial vehicle face challenges, and a brand new unmanned aerial vehicle data access control technology is required to support trusted collaborative operations in a complex airspace.
The existing unmanned aerial vehicle data access control technology has the following problems:
1) The centralized dependence is that the authority management is carried out by relying on a central server or a cloud platform, and single-point faults and malicious attacks are easy to occur;
2) Rights are rigidified, that is, the traditional ABAC strategy cannot adapt to the unmanned aerial vehicle dynamic networking environment, and rights are regulated with lag;
3) The lack of on-chain and off-chain synergy, the separation of data storage and access decisions, results in low verification efficiency and difficulty in tracing.
For example, patent CN202410367300.7 proposes a data sharing scheme of unmanned aerial vehicle based on attribute encryption, but relies on a centralized policy server, which cannot support real-time rights update in multi-unmanned aerial vehicle collaborative tasks. In addition, existing blockchain access control schemes (e.g., BCAC) are limited by on-chain storage performance, making fine-grained rights expression difficult to achieve.
Disclosure of Invention
Aiming at the technical problems in the prior art, the invention aims to provide a cross-domain cooperation decentralizing data access control method for an unmanned aerial vehicle. The technical problems to be solved by the invention include the following points:
1) How to quantify the authority attribute of the unmanned aerial vehicle data in a decentralization environment and support flexible authorization in dynamic tasks;
2) How to realize the efficient coordination of automatic on-chain decision and off-chain data verification through intelligent contracts;
3) How to ensure the controllability and traceability of the unmanned aerial vehicle data flow process.
The technical scheme adopted for solving the technical problems is as follows:
The invention discloses a cross-domain cooperation-oriented decentralization data access control method for an unmanned aerial vehicle, which is implemented on the premise of constructing an effective decentralization access control model, and is shown in fig. 1. The decentralized data access Control model takes a blockchain network as an underlying architecture and consists of a trusted authority (Trusted Authority, TA), a data supply unmanned plane, a data request unmanned plane, an access Control module (Ownership AND ACCESS Control, OSAC) deployed on the blockchain, and an interstellar file-based under-chain data storage module (Inter-PLANETARY DATA SYSTEM, IPDS).
Further, the model framework comprises the following relevant modules:
1) A blockchain network. The blockchain network adopts a alliance chain as an underlying architecture for supporting model operation. Typically consisting of entities such as businesses, government agencies of different geographical distribution, etc. connected by P2P communications. They act as fully trusted blockchain nodes responsible for performing transaction verification, broadcast, blockcreation and consensus tasks related to data access. By deploying a data access control module on the blockchain, access control and flow management of data are performed strictly according to an access control algorithm embedded by the module.
2) Trusted authority TA. The trusted mechanism is used as an initialization component and is responsible for providing system parameters for any participant attempting to join the model, generating identity information (comprising a pair of public Key Pub and private Key Pri generated by a PKI system) of a digital certificate, and only a user who obtains the certificate can join the blockchain network and call a related interface to perform data sharing task operation, and the issued transaction data needs to be signed by an entity account with the private Key for other users to verify the authenticity of the transaction in the block.
3) The data is provided to the unmanned plane, the data authority and the access policy. The data supply drones (Data Providers, DPs) are the drones that supply the data, responsible for customizing the rights and access control policies of the data owned and storing them to the OSAC module on the chain. In addition, the Data supply unmanned aerial vehicle sends the Data to the IFDS in a ciphertext form Encry (Data), and synchronizes the Data to the blockchain ledger at the storage address of the IFDS through the transaction of the blockchain. Data rights are defined as intrinsic rights attributes of data as credentials for data access and flow use. The access authority is defined, and fine granularity authorities such as the attribution authority of data and the use authority of data flow are also related. A simple access policy can be formalized as p= (S, O, a, λ), where S represents a set of access principals, O represents a set of data resources, a represents a set of data permissions, and λ: S x o→a represents an access control function that maps principals and resources into a set of data permissions.
4) The data request unmanned aerial vehicle and the data access authority prove. The data requesting drones (Data Requesters, DRs), herein also referred to as data accessors, are drones that want to acquire data resources. The data request unmanned aerial vehicle matches the attribute of the data request unmanned aerial vehicle through OSAC modules to obtain the authority certificate of the corresponding data, and accesses and uses the data through the authority certificate. The activities of the data request unmanned aerial vehicle are recorded in a distributed account book of the blockchain, so that the traceability of the access process is ensured.
5) The smart contract-based access control module OSAC. The OSAC module is the core component of the model to implement data access control. The component is essentially an intelligent contract system deployed on a blockchain that supports the decentralized access control function without a centralized third party providing service. The process is modeled as an intelligent contract strategy driven access control algorithm, and the intelligent contract strategy driven access control algorithm comprises two functions of data authority expression and authority management. The former is responsible for generating and maintaining rights passcards ProofO wner, providing fine-grained rights settings for the data provider. The latter maintains a list of policy information pi= (P1; P2; PM), P1; P2; PM, representing different policies, for access control decisions and constructs automated decision techniques by integrating attribute-based access control algorithms.
6) And a data storage module IFDS. IFDS is a distributed data storage module based on the interplanetary file system that uses content addressing as a de-centralized storage component to uniquely identify each data file in the data sharing network and to reduce storage pressure for the blockchain system. In the model, the IFDS provides persistent and reliable storage of the shared Data ciphertext Encry (Data) sent by the Data feed drone and returns a unique address identification Url. The data feeder synchronizes Url into the blockchain through transactions as an entry for data access.
Further, the smart contract-based access control module OSAC utilizes three characteristics of smart contracts:
Timestamp: timestamp SCTIMESTAMP of the smart contract, both to record and verify when the operation in the contract took place, and to make access decision decisions and the basis for decision execution OSAC. SCTIMESTAMP may be defined by validated transaction time stamps or blockchain time stamp fields, SCTIMESTAMP =tx.timestamp and SCTIMESTAMP =block.timestamp, respectively. The smart contract time stamp ensures consistency of time in the network, as well as fairness and non-tamper-ability of contract execution.
Transaction triggering-transaction transactions in a blockchain are generally considered to be triggers with data, and only transaction transactions that pass the consensus verification can be recorded and retained by the blockchain, with atomicity, consistency and persistence. The unique trigger setting performed as the smart contract in OSAC ensures that the contract performs the legal and trusted data access control decisions.
Automated execution-smart contracts are essentially a kind of agreement written in code form that can automatically execute and enforce contract terms under specific conditions such as time-stamped transaction triggers. The execution process relies on predefined rules and procedures and is verified by multiple nodes in the network without any human intervention.
On the basis of constructing an effective decentralised access control model, the intelligent contract-based decentralised data access control method for the unmanned aerial vehicle is based on a bottom layer architecture which is a blockchain network, an intelligent contract-based access control module is deployed on the blockchain network, an access control algorithm ScaBAC is embedded in the module, a frame schematic diagram of the ScaBAC algorithm is shown in fig. 2, and the working steps are as follows:
1) And expressing the data authority. In the data authority expression stage, the data provider (i.e. the data supply unmanned aerial vehicle) will first establish a hybrid pass model (Hybrid Data Token Model, HDTM) to establish fine-grained authority of data, and take pass as one of data attribute elements to create and manage access control policies, including release, update, revocation of attributes and policies, response to their query results, and the like.
2) Data access execution, data access execution phase, when the data request unmanned plane sends a request for executing a certain operation on certain data to the blockchain network, scaBAC algorithm firstly converts the request into a transaction and sends the transaction to a Policy execution contract (Policy Enforcement, PE contract), the PE contract firstly analyzes the transaction to obtain a subject, an object and operation semantics in the original access request, creates an access request based on attributes according to Attribute information obtained from an Attribute-Policy management contract (ACSC-Attribute-Policy Manager, ACSC-APM contract), encapsulates the access request and creates a transaction, and sends the transaction to a Policy Decision contract (PD contract) of a corresponding address, and waits for a Decision result of the contract.
3) And data authority is transferred and obtained. In the data authority Transfer and acquisition stage, the pass Transfer intelligent contract (ACSC-Transfer, ACSC-Trans contract) obtains transaction verification CheckProof containing access authority information after analyzing the transaction, and when the unmanned aerial vehicle with the data authority wants to Transfer the data authority to other unmanned aerial vehicles, the unmanned aerial vehicle needs to select some unused data authority passes as input according to the pass Transfer model UFTO (Unspent Fungible Token Outputs), and the address of the receiving party and the authority designated by Transfer CheckProof are designated. Once the inputs and outputs are determined, a data rights transfer transaction is created and broadcast into the network. This transaction contains the sender's digital signature, proving their ownership of the data rights license. Once the transfer transaction is confirmed and contained in a block, these data rights passes are marked as delivered and a new data rights pass is created and assigned to the recipient's address. Because each data rights transfer transaction is based on a previously undelivered data rights pass and each transaction creates a new unused data rights pass. The model makes the transfer and tracking of the data authority easier, and can effectively prevent the problems of data abuse and unauthorized use.
Further, the running algorithm of the update of the attributes and policies of step 1) involves the use of a request-oriented transaction driver module. The module contains the requested transaction representation and transaction verification. The transaction is used as a trigger of function call, and needs to contain a sending address, a receiving address and specific request content, and the form of the transaction is converted into a formula:
Where T represents the trade transaction, i.e., trade transaction expression and trade transaction verification. Se represents the address on the blockchain of a sender, namely an algorithm inputter, re sc represents the intelligent contract address to be called, F and [ F p ] respectively represent the function name in the contract and the input parameter, [ Hash (T pl)]sig represents signing the Hash value of the transaction load; transaction load T pl composed of the above is issued into the blockchain network after the digital signature is completed by the initiator, transaction verification and transaction signature are carried out by nodes on the blockchain, if the returned Boolean value is true, the verification is passed, the corresponding intelligent contract is triggered by the transaction, the next operation of the algorithm is driven, otherwise, the operation of the algorithm is terminated:
Wherein Bool result is a Boolean value returned by a formula, verify is a verification function, output the Boolean value, pub key is a function for verifying signature legitimacy by using a public key corresponding to a sender, H (T pl) is an operation of a verification node on transaction load Hash, namely, verification of the validity of the transaction load signature by Pub key([Hash(Tpl)]sig, and consistency and integrity of the transaction are verified by comparing with Hash (T pl), namely, the transaction load Hash value.
Further, step 1 defines data attributes, and the running algorithm for creating and managing access control policies contains the use of data rights attributes and policy expression modules. The module is designed for the data supply unmanned aerial vehicle, and the data attribute and the access strategy are customized by the module, so that the module is a key component for ensuring the controllable data access of the unmanned aerial vehicle by the algorithm. This section is mainly composed of a data license management contract (ACSC-Token Manager, ACSC-ToM), an Attribute-Policy management contract (ACSC-Attribute-Policy Manager, ACSC-APM), and a Policy blockchain ledger. The ACSC-ToM contract is responsible for generating and managing a certification entity representing the fine-grained authority of data under the drive of a transaction facing the request, is used as a data attribute in a data access decision, and is used for the authority certification of an access stage. The ACSC-APM contract is responsible for maintaining attribute information of data resources, and makes and manages access control rules composed of attribute expressions. In order to solve the problems of high memory consumption caused by storing policies in intelligent contracts, low searching efficiency caused by storing policies in blocks, and the like, as shown in fig. 3, the invention stores policy information by establishing a policy blockchain ledger and adopting a data structure of a key-value pair, namely, when an access control policy is stored in the ledger, the formula is used:
the Policy index generates a storage index, i.e. a "key", to ensure a unique correspondence between the data supply unmanned aerial vehicle and the data authority and to distinguish different data sharing tasks, wherein OwnerId, taskId and Hash (DataId) respectively represent an ID of the data supply unmanned aerial vehicle, an ID of the data sharing task, and a Hash value of the task, and Hash (ownerid+ TaskId +hash (DataId)) represents a Hash operation on the unmanned aerial vehicle body information set, which represents a "value". To ensure the uniqueness and security of the mapping index, the index is further transformed using a SHA-256 cryptographic hash function.
The policy store format design in the ledger is realized by the formula:
{key:<Policyindex>,value:<r1;r2;…;rn>}
Where key is a "key", value is a "value", and r 1;r2;…;rn represents several different sets of access policies.
Further, the mixed Data certification model (HDTM) in step 1 is composed of two parts, namely a Data attribution right identifier Data os and a fine granularity authority set Pres, and the two parts have a dependency relationship. Wherein Data os represents a unique identification on the blockchain of Data that encodes the feature set of the Data into a non-homogenous Data token that is stored in the blockchain account of the Data owner. Pers inherits the Data os attribute and derives a fine-grained authority set consisting of several homogenous and non-homogenous pass characterizing different rights.
HDTM(Data)=Pers<Pft;Pnft>|Dataos
Pft represents a homogeneous pass, pnft represents a non-homogeneous pass, pers < Pft; pnft > represents a plurality of fine-grained authority sets consisting of homogeneous and non-homogeneous passes representing different rights, so that HDTM (Data) is a mixed Data pass model consisting of a Data attribution identifier Data os and a fine-grained authority set Pers.
In the above model, data os is defined as a triplet of Data, namely, a chain number identifier of Data os=(IDos,Meta,BCadd.IDos for identifying the pass Data os, which is an important support for guaranteeing the attribution uniqueness of the Data. ID os=H(PDP,Enc(Url||PDP),Sig(H(Data)||PKDP), t), is typically automatically generated by the data feeding drone by data assembling into a predefined structure and then sending to the smart contract. Wherein P DP represents the public key of the data provider, url represents the storage address of the data in the IFDS, enc (Url P DP) represents that the data provider unmanned aerial vehicle uses the public key P DP to asymmetrically encrypt the data storage address, and only its corresponding private key Pk DP can be decrypted. Sig (H (Data) ||Pk DP) indicates that the Data feeding drone signs the hash H (Data) of the original Data using its private key Pk DP, and its corresponding public key P DP can verify its signature, thereby verifying the integrity of the Data and the authenticity of the Data ownership by the provider. t is a time stamp. Meta indicates metadata information of the pass Data os, including contents such as name, function description information, ownership information, transaction record, etc., plays a vital role in determining the uniqueness, ownership, value and transaction transparency of Data os. BCadd denotes creating an intelligent contract address for Data os for verifying its authenticity. Pers inherits the Data os property, and if Data os is empty, pres is also empty.Representing the non-union set of the homogeneity and passing elements and preserving the source information of the elements, ensuring the unique identification of all the elements.The non-homogeneous verification elements are not crossed and the source information of the elements is reserved, so that the unique identification of all the elements is ensured.
Pft i and pnft j, respectively represent homogeneous and heterogeneous pass elements in a fine-grained authority set, where the former elements are generally used to represent operation authorities, such as readability, usage rights, etc., that do not involve data content modification, and have replicability and combinability. In contrast, the latter generally represents rights related to the data itself, such as a writable right update right, and is a minimum rights unit that is indivisible and has combinability.
pfti=(H(Dataos),pname,dt,num,metadata)
pnftj=(nftID,pname,dt,num,metadata,history=(addrfrom,addrto))
Wherein pname, dt, num, metadata respectively represents the rights name (range), effective time period, usable times and meta information description related to the rights pass, which includes data owner, data information, pass generation time, user, etc. In contrast, pft i is homogenous, so its in-chain ID can be identified with the hash character H (Data os) of Data os. The non-homogenous pnft j on-chain logos nftID are unique logos generated by the associated smart contracts. In addition, pnft j has the property of inseparable but circulation, so that the data structure also comprises the current circulation information of the pass card, which consists of a source address addr from and a transfer address addr to, and the metadata comprises the history transaction record of circulation, thereby ensuring the transparency and traceability of circulation after the data is accessed. The history represents current flow information.
Further, step 2 may be represented in the algorithm as a policy-based data access decision module. When an access request occurs, the module compares the attribute values of the access unmanned aerial vehicle and the accessed unmanned aerial vehicle with a strategy defined in a strategy blockchain account book, and judges whether an access subject has the right to access the data object and execute the requested operation. This process can be formally expressed as:
Decision=F(Ob,Su,Ac,En)
Where Decision represents the result of an access control Decision, i.e. either allow or reject. Ob, su, ac, en respectively represent attribute values of the basic elements, ob (Object) which is a data resource stored by an Object such as an unmanned plane, su (Object) which is a host such as a data requesting unmanned plane, ac (Action) which is a type of operation (e.g. read, write, modify, etc.) which is requested to be performed, en (Environment) which is an access occurring environment attribute (e.g. time, task state, context condition, etc.). F represents a decision criterion. The invention defines F as an automatically executed intelligent contract and a calling process thereof, and encapsulates 4 core parts, namely Policy execution (Policy Enforcement, PE), role attribute verification (Role Confirmation, RC), task information management (TASK MANAGEMENT, TM) and Policy Decision (PD) respectively according to a Decision process. And judging whether the access subject has the right to execute the operation corresponding to the request content on the data through the call among 4 contracts so as to realize the decentralized access control execution. The PE contract is responsible for receiving a request transaction, and the RC contract and the TM contract are respectively used for inquiring and verifying character attribute information of an access requester and attribute information of a current data sharing task and serve as auxiliary decision information of the PD contract. The block chain-based decentralization data sharing involves multiple participants, so that character attributes are introduced to distinguish different tasks, and the data sharing task attributes are used for representing the current task sequence and preventing the data sharing from being used repeatedly at one time. The PD contract is then responsible for performing authorization decision making decisions to either allow or deny requests to access the principal.
Further, step 3 may be represented in the algorithm as a rights transfer module. The rights transfer module realizes data flow judgment and tracing by designing a universal certificate transfer model UFTO (Unspent Fungible Token Outputs, UFTO). The UFTO pass transfer model simulates a bitcoin UTXO model, and when data passes are transferred among different data request unmanned aerial vehicles, the UFTO model can verify the legality of pass transfer and inflow, ensure that enough rights are available for data transfer operation, and enhance the traceability and controllability of data rights transfer.
UFTO the pass transfer model defines the data structure of the data authority of the pass representative transferred among different subjects, and helps the user to effectively control the data circulation range while decoupling the authority and the access subjects in the access control model.
txTrans={NumOutput,{PersOut},NumInput,{PersIn}}
From the modeling of the data passing evidence, the data passing evidence can be combined and transferred (including the rights represented by the data homogenizing passing evidence can be copied). Each combination and transfer of data passes generates a new data structure record, which may be represented by transfer transaction tx Trans (Transfer transactions). Num Output and Pers Out respectively represent the number of data passes and the formed pass set output from the account of the currently accessed unmanned aerial vehicle data holder, and Num Input and Pers In respectively represent the number and set of passes transferred to the account of the accessing unmanned aerial vehicle. Meanwhile, the phenomenon of attribute inheritance in the constraint data pass transfer process is met in the pass transfer process, namely, inherent attributes such as authority range (pname), effective time (dt) and use times (num) in the data pass are inherited. In addition to inheriting some inherent properties, the meta information descriptions associated in the data pass, including the data owner, the pass generation time, the user, etc. need to be modified and recorded according to the properties of the inheriter. When Num Output=NumInput, it indicates that all the certificates are passed through verification, and the legal validity of the data stream path is described. When Num Output>NumInput, it indicates that there is an illegal rights transfer procedure, the corresponding data operation request will be denied. Each UFTO passes the certificate through a chain of rights between the owner and the recipient based on encryption technology. In the blockchain, all UFTO form a set to ensure that the stream of data rights is auditable and verifiable, each pass leaving the data structure record to form a complete stream link of data.
A schematic diagram of UFTO pass-through syndrome transfer model is shown in FIG. 4.
The certificate passing intelligent contract (ACSC-Trans) is used as a predefined execution carrier and is responsible for managing the circulation and verification rules of data certificate passing. The validation of data may be combined and transferred (including the rights represented by the homomorphism validation of data may be replicated).
Further, the smart contracts presented herein will be further described at the embodiments.
Compared with the prior art, the invention has the beneficial effects that:
1) Fine granularity authority control, namely supporting independent management of data operation authorities (reading, writing, sharing, updating, deleting and circulating) of 6 unmanned aerial vehicles;
2) The decentralization high-efficiency decision is that experiments show that the throughput rate of the algorithm reaches 170TPS, and the time delay is lower than 5 seconds;
3) And the anti-attack capability is that the tampering probability of the malicious node approaches zero based on the PoW consensus.
Drawings
FIG. 1 is a schematic diagram of a decentralised data access control model (showing model framework and related modules)
FIG. 2 illustrates a schematic diagram of an intelligent contract-based decentralized access control algorithm (ScaBAC algorithm) framework (showing transaction drivers, rights attributes and policy expressions, data access decisions, rights delivery modules) for an unmanned aerial vehicle;
FIG. 3 is a schematic diagram of an attribute and policy store data structure (data structure store logic showing "key-value" pairs);
FIG. 4 is a schematic diagram of a UFTO certification transfer model (showing transfer and circulation paths of an input-output certification authority set);
FIG. 5 ScaBAC Algorithm Smart contract execution dependency (interactive logic showing contracts such as ACSC-ToM, ACSC-APM, ACSC-PD)
Detailed description of the preferred embodiments
The algorithm execution process in the above three steps of the present invention will be specifically described with reference to the accompanying drawings in combination with different smart contracts.
1) And expressing the data authority. In the data authority expression stage, the data supply unmanned aerial vehicle firstly establishes fine-grained authority of data according to the certification model HDTM, and creates and manages access control strategies including issuing, updating, cancelling of the attributes and the strategies, response to query results of the attributes and the strategies and the like by taking certification as one of data attribute elements. The dependencies between the data certification management intelligent contracts (ACSC-ToM) and the attribute-policy management intelligent contracts (ACSC-APM) involved in this process are shown in fig. 5.
ACSC-ToM contract (Create data evidence portion) is triggered by the transaction Tx Create-Toekn (Create evidence transaction) created by the data-feeding drone, by parsing the transaction, the data-feeding drone with an identity ID and public Key < UserId, pub-Key > calls a contract with an address of API ACSC-ToM, and executes an create data evidence operation CreateToken. Wherein Data, permits are respectively a Data information parameter set and a right parameter set which are customized by the Data supply unmanned aerial vehicle, sign (DataInfo) represents signing of the Data information, is equal to Sign (H (Data) ||pk DP) operation, and represents signing of hash of the original Data by the Data supply unmanned aerial vehicle by using a private key thereof. t is a timestamp, and Type token is a pass Type. The created data pass will be automatically stored in the account of the data feed drone for authorization and transfer in subsequent access control.
The key steps of ACSC-ToM contract are as follows:
An initialization operation is performed to generate a unique user identification UserInfo index for the UserID (i.e., user ID) using the SHA-256 cryptographic hash function.
When fcn= "create token", i.e. the request operation is to create a data pass, if the Type token = = nft, i.e. the pass Type is a non-homogenous pass, a Hash operation Hash (time. Now, userID, keyPub) is performed based on the time. Now, userID, keyPub) to generate a unique identity nftID. And extracting authority parameters, namely, a name (pname), a data type (dt) and a number (num) and assigning the authority parameters to the data type corresponding to the pass. The metadata is constructed to record the user ID, data identification, hash value, and empty history. And combining the nftID, the authority parameters, the metadata and the empty history to obtain the NFT pass, adding the NFT pass to the user account, and successfully creating the pass. If Type token = ft, namely the pass Type is a homogeneous pass, generating a unique ftID based on a Hash value Hash (Data os) of the Data identifier, and executing the same flow as above to successfully create the final pass.
The data supply drone invokes the ToM contract to create a data pass and then generates a transaction Tx Attri-Policy representing a transaction relating to the drone attribute or policy. The transaction triggers ACSC-APM contract operation, and creates attributes and access policies of corresponding data for the data with identity information < UserId, pub-Key > for the unmanned aerial vehicle.
The core logic of ACSC-APM contracts is:
Definition:
1) The identity attribute sa= UserId, taskId, taskRole of the data request unmanned aerial vehicle represents the unique identity of the data visitor, the corresponding data sharing task number and the task role currently assumed by the data visitor.
2) The Data attribute da= DataId, ownerID, proTime, dueDate, taskId, HDTM (Data) includes the number identification of the Data, the Data owner, the Data generation time, the valid time the Data can access, the corresponding Data sharing task number, and the rights clearance information of the Data.
3) The data sharing persona attribute taa= TaskId, DRId, time start;timeend, including the task identity, task publisher, start time, and end time of the data sharing.
4) Action attributesWherein the method comprises the steps ofRepresenting an empty set, i.e. rejecting the access request. { pft i,…,pnftj } represents a permission request and at the same time a permission pass of the data is generated, serving as a credential Proof of access.
When performing operation fcn= = "AddPolic" y (adding policy), checking the existence of policy, if policy does not exist, storing policy into policy public ledger, and returning that policy addition is successful. When the operation fcn= = "QueryPoliyc" (query policy) is performed, the queried policy information is directly returned. When fcn= "UpdatePolciy" (update policy) or fcn= "DelPolicy" (Delete policy) is executed, the user identity UserId and public Key Pub-Key are extracted from the transaction, and if UserId = = da. Userid, indicating that the user identity matches the data owner identity, the PutState function is invoked to override the original policy or the Delete function is invoked to remove the policy record.
The execution function Fcn PM mainly includes storage, modification, query and deletion of attributes or policies, etc.:
FcnPM={AddPolicy(),UadatePolicy(),QueryPolicy(),DelPolicy()}
Wherein AddPolicy () function is used to create access policies, and index policy information is generated and stored as a value in the policy public ledger. When the data supply unmanned aerial vehicle needs to change the access policy information of the data, the intelligent contract UadatePolicy () function is called to update and maintain the policy information in the policy public ledger. QueryPolicy () function is used to query access policies and is also an important source of basis for ACSC-PD contract decisions. DelPolicy () function is used to delete the corresponding rights policy information. It should be noted that, before the last three functions are called, the identity information of the caller is checked according to the transaction, so that only the supplier corresponding to the data is authorized to execute the corresponding operation. The corresponding transaction triggering formula is as follows:
Wherein < UserId, pub-Key > represents the identity ID and public Key identification of the requesting machine, API ACSC-APM is the deployment address of the attribute policy management contract, and < SA, DA, TAA, AA > is the data attribute set of the unmanned aerial vehicle, wherein SA is the unmanned aerial vehicle attribute allowed to be accessed, DA is the data supply unmanned aerial vehicle attribute, TAA is the cooperation task attribute, and AA is the access action attribute. Fcn PM is an executive function based on ACSC-APM contracts, sig pri-Key is a signature operation based on private keys.
2) And executing data access. The data access execution stage mainly carries out decision, response and execution of an access request, and the process involves the access execution intelligent contract (ACSC-PE), the policy decision intelligent contract (ACSC-PD), the task information management intelligent contract (ACSC-TM) and the role attribute verification intelligent contract (ACSC-RC) to be dependent and transacted to trigger as shown in figure 5. When a data requesting drone (or other data access machine) sends a request to the network to perform an operation on certain data, the ScaBAC algorithm first converts it into a transaction Tx Req on the access request and sends it to the ACSC-PE. Where < UserId, pub-Key > represents the identity ID and public Key identity of the requestor, API ACSC-CE represents the address at which the PE is on the chain, fcn PE represents the corresponding function name in the PE contract, < UserId, dataId, action > represents the requesting operation by the requestor UserId that the Action proposed on the data identified as DataId is an Action. TID is the unique identifier of the transaction. Sig pri-Key represents a private key based signature operation.
The core logic of the PE contract is that ACSC-PE firstly analyzes Tx Req to obtain a subject UserId, a guest DataId and operation semantic actions in an original access request, creates an access request Attri-Rule based on attribute information obtained from the ACSC-APM contract, encapsulates the Attri-Rule and creates a transaction Tx PD based on the PD contract, sends the transaction Tx PD to the ACSC-PD contract with a contract address of API ACSC-PD, and waits for a decision result.
The core logic of the PD contract is that an access request Attri-Rule based on the attribute is obtained by analyzing the transaction Tx PD, and the index of the corresponding access strategy of the data on the chain is obtained by a formula according to the attribute of the requested data. Then, information such as index information, subject and object in the request is sent to ACSC-APM, ACSC-TM and ACSC-RC contract, and policy information, authentication information of the data sharing task, role authentication information of the access subject and the like are obtained respectively. This information will be used with Attri-Rule as an input parameter for ACSC-PD to perform the access decision. The specific formula is as follows:
Where API ACSC-PD represents the address at which the PD closes on the chain, fcn PD represents the corresponding function name in the PD contract, and TID is the unique identifier of the transaction. Attri-Rule is an attribute-based access request, i.e., an access Rule. Sig pri-Key represents a private key based signature operation.
The decision process determines that the request is a satisfying policy by traversing the comparison if Attri-Rule satisfies the constraints and predicates in a certain access control policy, allows access, and creates a proof of authority CheckProof represented by the pass. If the decision is to deny access, the following situations may be included, where the policy of the accessed data does not exist, and the data is denied access. And secondly, if the verification of the task attribute fails, the data sharing task is finished, and the data is not in the validity period of the allowed access. Thirdly, the role verification of the access subject fails, which means that the subject is not a participant corresponding to the data sharing task. These measures can effectively reduce the risk of data misuse.
3) And data authority is transferred and obtained. The transmission and acquisition of the data authority are based on ACSC-Trans intelligent contracts, and the core logic is as follows:
By parsing the data transfer transaction Tx Trans to obtain CheckProof containing access rights information, when a user with data rights wants to transfer the data rights to other users, they need to select some unused data rights passes as input according to the UFTO model and specify the address of the recipient and transfer CheckProof the rights specified. Once the inputs and outputs are determined, a data rights transfer transaction is created and broadcast to the network that contains the sender's digital signature, proving their ownership of the data rights. Once the transfer transaction is confirmed and contained in a block, these data rights passes are marked as delivered and a new data rights pass is created and assigned to the recipient's address. Because each data rights transfer transaction is based on a previously undelivered data rights pass and each transaction creates a new unused data rights pass. The model makes the transfer and tracking of the data authority easier, and can effectively prevent the problems of data abuse and unauthorized use.

Claims (5)

1.一种面向无人机的跨域协作的去中心化数据访问控制方法,其特征在于该方法基于的底层架构为区块链网络,并在区块链网络上部署基于智能合约的访问控制模块,该模块嵌入有访问控制算法ScaBAC,所述方法的工作步骤如下:1. A decentralized data access control method for cross-domain collaboration of drones, characterized in that the method is based on a blockchain network as its underlying architecture and deploys a smart contract-based access control module on the blockchain network. The module is embedded with the access control algorithm ScaBAC. The method operates as follows: 1)数据权限表达:数据权限表达阶段,数据供给者即数据供给无人机将首先建立混合通证模型HDTM,并以此建立数据的细粒度权限,将通证作为数据属性要素之一,创建和管理访问控制策略,包括属性和策略的发布、更新、撤销以及对它们查询结果的响应;1) Data Permission Expression: During the data permission expression phase, the data provider, i.e., the data supply drone, will first establish a hybrid token model (HDTM) and use it to establish fine-grained permissions for the data. Using the token as one of the data attribute elements, it will create and manage access control policies, including the publication, update, and revocation of attributes and policies, as well as responses to their query results. 2)数据访问执行:数据访问执行阶段,当数据请求无人机向区块链网络中发送对某一数据执行某项操作的请求时,ScaBAC算法首先将该请求转换为交易事务并发送至策略执行合约PE合约,PE合约首先分析该交易事务得到原始访问请求中的主体、客体和操作语义,根据从属性-策略管理合约ACSC-APM合约得到的属性信息创建基于属性的访问请求,并将该访问请求封装并创建交易,发送至对应地址的策略决策合约PD合约,等待该合约的决策结果;2) Data access execution: During the data access execution phase, when a data requesting drone sends a request to the blockchain network to perform an operation on a certain data, the ScaBAC algorithm first converts the request into a transaction and sends it to the policy execution contract (PE). The PE contract first analyzes the transaction to obtain the subject, object, and operation semantics in the original access request, and then creates an attribute-based access request based on the attribute information obtained from the attribute-policy management contract (ACSC-APM). The access request is then encapsulated and a transaction is created. The transaction is then sent to the policy decision contract (PD) at the corresponding address, awaiting the decision result of the contract. 3)数据权限传递与获得:数据权限传递与获得阶段,建立通证传递智能合约ACSC-Trans合约通过解析交易事务后得到包含访问权限信息的交易事务验证Ch eckProof,当拥有数据权限的无人机想要将数据权限转移给其他无人机时,需要依据通证传递模型UFTO选择一些未使用的数据权限通证作为输入,并指定接收方的地址和转移CheckProof指定的权限;一旦输入和输出被确定,数据权限转移交易就会被创建并广播到网络中;这个交易包含了发送无人机的数字签名,证明了他们对这些数据权限通证的所有权;一旦转移交易被确认并包含在一个区块中,这些数据权限通证就会被标记为已经传递,新的数据权限通证会被创建并分配给接收方的地址。3) Data rights transfer and acquisition: In the data rights transfer and acquisition stage, a token transfer smart contract ACSC-Trans is established. The contract obtains the transaction verification CheckProof containing access rights information after parsing the transaction. When a drone with data rights wants to transfer data rights to other drones, it needs to select some unused data rights tokens as input based on the token transfer model UFTO, and specify the recipient's address and the rights specified by the transfer CheckProof; once the input and output are determined, a data rights transfer transaction will be created and broadcast to the network; this transaction contains the digital signature of the sending drone, proving their ownership of these data rights tokens; once the transfer transaction is confirmed and included in a block, these data rights tokens will be marked as transferred, and new data rights tokens will be created and assigned to the recipient's address. 2.如权利要求1所述的方法,其特征在于步骤1)属性和策略的更新的运行算法包含面向请求的事务驱动模块的使用,该模块包含请求的交易事务表达和交易事务验证,交易事务作为功能调用的触发器,需要包含发送地址、接收方地址以及具体请求内容,将其形式转化为公式:2. The method according to claim 1, characterized in that the algorithm for updating attributes and policies in step 1) includes the use of a request-oriented transaction driver module, which includes a transaction expression and transaction verification for the request. The transaction, as a trigger for a function call, needs to include a sending address, a receiving address, and specific request content, which is converted into a formula: 其中T表示交易事务,即交易事务表达和交易事务验证;Se表示发送方即算法输入者的区块链上地址,Resc表示要调用的智能合约地址,F和[Fp]分别表示合约中的函数名称以及输入的参数,[Hash(Tpl)]sig表示对交易负载的哈希值进行签名;上述内容组成的交易负载Tpl由发起方完成数字签名后被发布至区块链网络中,由区块链上节点进行交易验证和交易签名,若返回的布尔值为真,则验证通过,交易事务触发对应的智能合约,驱动算法下一步运行,否则算法运行终止;交易验证公式如下:Where T represents the transaction, i.e., the transaction expression and verification; Se represents the blockchain address of the sender, i.e., the algorithm input; Re sc represents the address of the smart contract to be called; F and [F p ] represent the function name and input parameters in the contract, respectively; [Hash(T pl )] sig represents the signature of the hash value of the transaction payload; the transaction payload T pl composed of the above content is digitally signed by the initiator and published to the blockchain network. The nodes on the blockchain perform transaction verification and transaction signature. If the returned Boolean value is true, the verification is passed, and the transaction triggers the corresponding smart contract to drive the next step of the algorithm; otherwise, the algorithm terminates. The transaction verification formula is as follows: 其中Boolresult为公式返回的布尔值,Verify为验证函数,输出布尔值,Pubkey函数表示使用发送方对应的公钥验证签名合法性,H(Tpl)表示验证节点对交易负载哈希的操作,即通过Pubkey([Hash(Tpl)]sig)验证交易负载签名合法性,并与Hash(Tpl)即交易负载哈希值对比,验证交易的一致性与完整性。Where Bool result is the Boolean value returned by the formula, Verify is a verification function that outputs a Boolean value, the Pub key function uses the sender's public key to verify the legitimacy of the signature, and H(T pl ) represents the verification node's operation on the transaction payload hash, that is, verifying the legitimacy of the transaction payload signature through the Pub key ([Hash(T pl )] sig ) and comparing it with Hash(T pl ), the transaction payload hash value, to verify the consistency and integrity of the transaction. 3.如权利要求1所述的方法,其特征在于步骤1)定义数据属性,以及创建和管理访问控制策略的运行算法包含数据权限属性与策略表达模块的使用,该模块是面向数据供给无人机设计的,他们通过模块自定义数据属性和访问策略,是算法确保无人机数据访问可控的关键组件,该部分主要由数据通证管理合约ACSC-ToM合约、属性-策略管理合约ACSC-APM和策略区块链账本组成;其中,ACSC-ToM合约在面向请求的交易事务驱动下,负责生成和管理表征数据细粒度权限的通证实体,作为数据访问决策中的数据属性,并用于访问阶段的权限证明;ACSC-APM合约负责维护数据资源的属性信息,制定和管理访问控制规则,规则由属性表达组成;3. The method of claim 1, wherein step 1) defines data attributes, and the algorithm for creating and managing access control policies includes the use of a data permission attribute and policy expression module. This module is designed for data-supplying drones. The module customizes data attributes and access policies, and is a key component of the algorithm to ensure controllable drone data access. This module is primarily composed of a data token management contract (ACSC-ToM), an attribute-policy management contract (ACSC-APM), and a policy blockchain ledger. Driven by request-oriented transactions, the ACSC-ToM contract is responsible for generating and managing token entities representing fine-grained data permissions, serving as data attributes in data access decisions and used for permission certification during the access phase. The ACSC-APM contract is responsible for maintaining attribute information of data resources, formulating and managing access control rules, and the rules are composed of attribute expressions. 为了解决将策略存储在智能合约中导致的内存高消耗,以及存储在区块中带来的搜索效率低的问题,通过建立策略区块链账本并采用“键-值”对的数据结构存储策略信息,即账本中存储访问控制策略时使用公式:In order to solve the problems of high memory consumption caused by storing policies in smart contracts and low search efficiency caused by storing them in blocks, a policy blockchain ledger is established and a "key-value" pair data structure is used to store policy information. That is, the formula used when storing access control policies in the ledger is: 其中Policyindex为生成存储索引即“键”,以确保数据供给无人机与数据权限唯一对应关系,并区分不同的数据共享任务;OwnerId、TaskId和Hash(DataId)分别表示数据供给无人机的ID、数据共享任务的ID以及任务的哈希值;Hash(OwnerId+TaskId+Hash(DataId))表示的是对上述无人机身份信息集合进行哈希操作,代表的是“值”;为了确保映射索引的唯一性和安全性,进一步使用SHA-256加密哈希函数对索引进行转换;The Policy index is used to generate the storage index, or "key," to ensure the unique correspondence between the data-supplying drone and the data permissions, and to distinguish different data-sharing tasks. OwnerId, TaskId, and Hash(DataId) represent the ID of the data-supplying drone, the ID of the data-sharing task, and the hash value of the task, respectively. Hash(OwnerId+TaskId+Hash(DataId)) represents the hash operation performed on the aforementioned drone identity information set, representing the "value." To ensure the uniqueness and security of the mapping index, the SHA-256 cryptographic hash function is further used to convert the index. 账本中的策略存储格式设计通过以下公式来实现:The policy storage format design in the ledger is implemented through the following formula: {key:<Policindex>,value:<r1;r2;…;rn>}{key:<Polic index >,value:<r 1 ;r 2 ;…;r n >} 其中key是“键”,value是“值”,r1;r2;…;rn表示若干组不同的访问策略。Where key is the key, value is the value, r 1 ; r 2 ;…; r n represent several groups of different access strategies. 4.如权利要求1所述的方法,其特征在于步骤2)基于策略的数据访问决策模块进行数据访问执行,当访问请求发生时,该模块根据访问无人机与被访问无人机的属性值和策略区块链账本中定义的策略进行比对,判断访问主体是否有权对数据客体进行访问和执行请求的操作;这一过程可以形式化表示为:4. The method of claim 1, characterized in that step 2) a policy-based data access decision module performs data access execution. When an access request occurs, the module compares the attribute values of the accessing and accessed drones with the policies defined in the policy blockchain ledger to determine whether the access subject has the right to access the data object and perform the requested operation. This process can be formally expressed as follows: Decision=F(Ob,Su,Ac,En)Decision = F(Ob,Su,Ac,En) 其中,Decision表示访问控制决策的结果,即允许或拒绝;Ob、Su、Ac、En则分别表示基本要素的属性值:Ob:客体如无人机存储的数据资源;Su:主体如数据请求无人机;Ac:请求执行的操作类型,包括读取、写入、修改;En:访问发生的环境属性,包括时间、任务状态;F表示判断决策准则,将F定义为自动执行的智能合约及其调用过程,并根据决策过程分别封装策略执行PE(Policy Enforcement)、角色属性验证RC(Role Confirmation)、任务信息管理TM(Task Management)和策略决策PD(Policy Decision)这4个核心部分,通过4个合约之间的调用判断访问主体是否有权对数据执行请求内容对应的操作,以实现去中心化的访问控制执行;其中,PE合约负责接收请求交易事务,RC合约和TM合约分别用于查询验证访问请求者的角色属性信息以及当前数据共享任务的属性信息,作为PD合约的辅助决策信息;PD合约则负责执行授权决策决定允许或拒绝访问主体的请求。Among them, Decision represents the result of the access control decision, that is, permission or rejection; Ob, Su, Ac, and En respectively represent the attribute values of the basic elements: Ob: the object, such as the data resource stored by the drone; Su: the subject, such as the data requesting drone; Ac: the type of operation requested, including read, write, and modify; En: the environmental attributes of the access, including time and task status. F represents the judgment decision criterion, which is defined as an automatically executed smart contract and its calling process. According to the decision process, it encapsulates four core parts: policy enforcement (PE), role confirmation (RC), task management (TM), and policy decision (PD). Through the calls between these four contracts, it is determined whether the access subject has the right to perform the operation corresponding to the requested content on the data, thereby realizing decentralized access control execution. Among them, the PE contract is responsible for receiving request transactions, and the RC contract and TM contract are used to query and verify the role attribute information of the access requester and the attribute information of the current data sharing task, respectively, which serve as auxiliary decision-making information for the PD contract. The PD contract is responsible for executing the authorization decision to determine whether to allow or deny the access subject's request. 5.如权利要求1所述的算法,其特征在于步骤3)基于权限传递模块进行数据权限传递与获得,权限传递模块通过设计通证传递模型UFTO实现数据流转判定与溯源,当数据通证在不同数据请求无人机之间进行传递时,UFTO模型会验证通证转出与流入的合法性,确保有足够的权限进行数据流转操作,增强数据权限流转可追溯性与可控性,ACSC-Trans智能合约则作为预定义的执行载体,负责管理数据通证的流转与验证规则;数据的通证可以被组合和传递,包括数据的同质化通证所代表的权限可以被复制;数据通证每次组合与传递都会生成新的数据结构记录,该过程可以用传递交易事务txTrans表示。5. The algorithm of claim 1, characterized in that step 3) transfers and obtains data permissions based on a permissions transfer module. The permissions transfer module implements data flow determination and traceability by designing a token transfer model UFTO. When data tokens are transferred between different data-requesting drones, the UFTO model verifies the legitimacy of token transfers and inflows, ensuring sufficient permissions for data transfer operations and enhancing the traceability and controllability of data permission transfers. The ACSC-Trans smart contract serves as a predefined execution carrier, responsible for managing the flow and verification rules of data tokens. Data tokens can be combined and transferred, including the permissions represented by homogeneous data tokens can be copied. Each combination and transfer of data tokens generates a new data structure record, which can be represented by the transfer transaction tx Trans .
CN202510491342.6A 2025-04-18 2025-04-18 A decentralized data access control method for cross-domain collaboration of drones Pending CN120433962A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202510491342.6A CN120433962A (en) 2025-04-18 2025-04-18 A decentralized data access control method for cross-domain collaboration of drones

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202510491342.6A CN120433962A (en) 2025-04-18 2025-04-18 A decentralized data access control method for cross-domain collaboration of drones

Publications (1)

Publication Number Publication Date
CN120433962A true CN120433962A (en) 2025-08-05

Family

ID=96556971

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202510491342.6A Pending CN120433962A (en) 2025-04-18 2025-04-18 A decentralized data access control method for cross-domain collaboration of drones

Country Status (1)

Country Link
CN (1) CN120433962A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN120974537A (en) * 2025-08-11 2025-11-18 北京幂律智能科技有限责任公司 A method for access control of legal consultation data

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN120974537A (en) * 2025-08-11 2025-11-18 北京幂律智能科技有限责任公司 A method for access control of legal consultation data

Similar Documents

Publication Publication Date Title
Liu et al. Fabric-IoT: A blockchain-based access control system in IoT
US11611560B2 (en) Systems, methods, and apparatuses for implementing consensus on read via a consensus on write smart contract trigger for a distributed ledger technology (DLT) platform
Sharma et al. Blockchain technology for cloud storage: A systematic literature review
US10708070B2 (en) System and method for utilizing connected devices to enable secure and anonymous electronic interaction in a decentralized manner
CN108985089B (en) Internet data sharing system
CN108737370B (en) Block chain-based Internet of things cross-domain authentication system and method
CN101631116B (en) A distributed dual authorization and access control method and system
US20210073806A1 (en) Data processing system utilising distributed ledger technology
US8726342B1 (en) Keystore access control system
CN115552441A (en) Low Trust Privileged Access Management
CN109325359B (en) Account system setting method, system, computer device and storage medium
CN101997876A (en) Attribute-based access control model and cross domain access method thereof
CN111800410B (en) Block chain-based data access control method, electronic device and storage medium
CN114239043B (en) A shared encrypted storage system based on blockchain technology
US11954672B1 (en) Systems and methods for cryptocurrency pool management
Chai et al. BHE-AC: a blockchain-based high-efficiency access control framework for Internet of Things
KR20220050606A (en) System and Method for Intelligent mediating based enhanced smart contract for privacy protection
CN120433962A (en) A decentralized data access control method for cross-domain collaboration of drones
CN120639451A (en) A cross-domain identity authentication and access authorization method, system, device and medium
CN102972005B (en) Pay authentication method
CN120561161B (en) Structured data fields are used to control methods, devices, media, and products.
CN117786635A (en) A ship data management system based on user rights management in the ship supply chain
CN103069767B (en) Consigning authentication method
Almakhour et al. Trustless blockchain-based access control in dynamic collaboration.
CN117896130B (en) Industrial Internet data access control method, device, equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination