Back to Search Start Over

Blockchain-based cross-data center anonymous and verifiable identity authentication scheme

Authors :
Shujiang XU, Chaoyang ZHANG, Lianhai WANG, Shuhui ZHANG, Wei SHAO
Source :
网络与信息安全学报, Vol 10, Iss 2, Pp 47-58 (2024)
Publication Year :
2024
Publisher :
POSTS&TELECOM PRESS Co., LTD, 2024.

Abstract

With the progression of big data and cloud computing technologies, there has been an escalating trend in cross-institutional data sharing and interaction within the financial sector. However, the frequent occurrence of privacy breaches poses significant challenges to ensuring data security protection. This necessitates the elevation of requirements for identity authentication across data centers and other technologies related to data security management. The traditional centralized identity authentication schemes are inherently flawed in security and scalability, which hampers their ability to meet the demands of high-frequency cross-center data sharing applications. The blockchain technology has emerged as a potential solution, offering exceptional characteristics such as a distributed nature, tamper-proof properties, traceability, and the ability to achieve multi-party consensus. In practical application scenarios, it is essential to not only protect the privacy of user identities but also to effectively regulate anonymous identities. An anonymous and supervisable cross-data center identity authentication scheme based on blockchain was proposed. This scheme did not necessitate alterations to the original architecture of each data center. Instead, a distributed multi-center consortium blockchain was formed by leveraging more than one server from each data center to establish a data center union. Blockchain technology was utilized to ensure the transparency and reliability of the identity authentication process. Additionally, attribute signatures were employed to safeguard user identity privacy while simultaneously creating an identity mapping table that facilitated the tracking of real user identities. Consequently, the scheme was designed to protect user privacy during cross-data center identity authentication and to enable effective supervision over anonymous identities. A thorough security analysis and the results of experiments demonstrate that the proposed scheme possesses the following attributes: it does not require users to re-register, it exhibits characteristics of unforgeability and traceability, and it is capable of withstanding various network attacks, including replay attacks, denial of service attacks, tampering attacks, and man-in-the-middle attacks.

Details

Language :
English, Chinese
ISSN :
2096109x and 2096109X
Volume :
10
Issue :
2
Database :
Directory of Open Access Journals
Journal :
网络与信息安全学报
Publication Type :
Academic Journal
Accession number :
edsdoj.6c9b488e966f4fbcb2362adf84dc17c6
Document Type :
article
Full Text :
https://doi.org/10.11959/j.issn.2096-109x.2024031