Data Provenance and Access Control Rules for Ownership Transfer Using Blockchain

Data Provenance and Access Control Rules for Ownership Transfer Using Blockchain

Randhir Kumar, Rakesh Tripathi
Copyright: © 2021 |Pages: 26
DOI: 10.4018/IJISP.2021040105
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Provenance provides information about how data came to be in its present state. Recently, many critical applications are working with data provenance and provenance security. However, the main challenges in provenance-based applications are storage representation, provenance security, and centralized approach. In this paper, the authors propose a secure trading framework which is based on the techniques of blockchain that includes various features like decentralization, immutability, and integrity in order to solve the trust crisis in centralized provenance-based system. To overcome the storage representation of data provenance, they propose JavaScript object notation (JSON) structure. To improve the provenance security, they propose the access control language (ACL) rule. To implement the JSON structure and ACL rules, permissioned blockchain based tool “Hyperledger Composer” has been used. They demonstrate that their framework minimizes the execution time when the number of transaction increases in terms of storage representation of data provenance and security.
Article Preview
Top

1. Introduction

In the past decade, numerous works on data provenance have been reported (O. Q. Zhang et al., 2012)(Imran & Hlavacs, 2012) (Ahmed, Khan, Anjum, Ahmed, & Habib, 2020). The term “data provenance” refers to a record trail that accounts for the origin of information along with an evidence of how and why it came into its present state. Data provenance has been successfully used in numerous domains including healthcare, food production and databases for verification of items and objects (Hammad & Wu, 2014)(Moreau, Batlajery, Huynh, Michaelides, & Packer, 2018) (Guedes, Jesus, Ocaña, Drummond, & de Oliveira, 2020). However, the main challenge in provenance is storage representation since data provenance can grow up to 22 times the size of actual data(Phua & Ko, 2018)(Feng, Li, & Long, 2013). The relationships between entities depend on data sharing, which creates a critical demand for data provenance in various domains. However, security issues have been raised as provenance may contain both sensitive and non-sensitive information. For instance, provenance security deals with issues such as absence of date on an article that can be reused by aggregators (e.g Google News). This can lead to economic losses if the investors misinterpret this information (Cheney, 2011). Therefore, we need to develop a secure framework for data provenance in order to provide authentic access to sensitive information with immutability, transparency, and integrity. Most of the work on provenance security have effectively applied known techniques such as digital signature verification, information flow control, and access control(Cheney, 2011) with centralized storage (third-party) services.

Currently, the third-party services are widely used for provenance data storage by the commercial applications with on demand services. The underlying services of third-party storage are facilitated by different vendors with heterogeneous software and log based services for data provenance (Debruyne, Pandit, Lewis, & O’Sullivan, 2020). The security of these services can be compromised due to unreliable data traceability. Therefore, the data provenance activities demands the assured provenance and distributed infrastructure, where data and its traceability can be easily handled. Thus, it is important not only to protect the data but also to ensure the integrity, immutability, and trustworthiness of the data through provenance.

The Blockchain (BC) is an emerging technology that supports a decentralized and fully distributed ledger of append-only records in a Peer-to-peer (P2P) network. It provides a high level of immutability, security, trust, and integrity to data in a trust-less environment (Ulybyshev et al., 2018) (Y. Zhang, Wu, Jin, & Du, 2017). It is suitable for keeping record trail of ownership transfer in TF owing to its DLT based storage approach. However, its adoption in this application requires careful consideration of roles and access control. Blockchain is categorized into two different types:

  • a)

    Public, and b) Permissioned blockchain. Public blockchain allows anonymous users to join the blockchain network (Liang et al., 2017) whereas permissioned blockchain allows only known participants to join the network. In our TF, entities cannot be anonymous and are limited to generate a specific type of operations based on their roles. Assurance of the identities of a TF for different traders and their control over the privacy of data compel the use of a permissioned blockchain rather than a public one. We have proposed ownership transfer in a TF using Hyperledger Composer permissioned BC. Recently, most of the research efforts have been made for the provenance management (Hammad & Wu, 2014) (Liang et al., 2017), whereas a few research efforts focused on provenance security (Shweta & Mirajkar, 2017)(Warekuromor, James, Anifowose, & Trodd, 2017).

Along with data provenance, it is also important to maintain provenance security. Hence, there must be some mechanism for safety of information using access control techniques (Tosh, Shetty, Liang, Kamhoua, & Njilla, 2017). Thus, in order to ensure provenance security, we utilize access control language (ACL) rules for the entities (traders) using set theory relationship. The access control rules are designed to manage the resources and their associated policies. It prevents from the unauthorized access of resources. In this proposed model, we have used policies of set-theory (1:1 and N:1) rules to manage the resources.

Complete Article List

Search this Journal:
Reset
Volume 18: 1 Issue (2024)
Volume 17: 1 Issue (2023)
Volume 16: 4 Issues (2022): 2 Released, 2 Forthcoming
Volume 15: 4 Issues (2021)
Volume 14: 4 Issues (2020)
Volume 13: 4 Issues (2019)
Volume 12: 4 Issues (2018)
Volume 11: 4 Issues (2017)
Volume 10: 4 Issues (2016)
Volume 9: 4 Issues (2015)
Volume 8: 4 Issues (2014)
Volume 7: 4 Issues (2013)
Volume 6: 4 Issues (2012)
Volume 5: 4 Issues (2011)
Volume 4: 4 Issues (2010)
Volume 3: 4 Issues (2009)
Volume 2: 4 Issues (2008)
Volume 1: 4 Issues (2007)
View Complete Journal Contents Listing