CN117424747A - Cross-domain access control method and system based on multi-block chain - Google Patents
Cross-domain access control method and system based on multi-block chain Download PDFInfo
- Publication number
- CN117424747A CN117424747A CN202311536545.XA CN202311536545A CN117424747A CN 117424747 A CN117424747 A CN 117424747A CN 202311536545 A CN202311536545 A CN 202311536545A CN 117424747 A CN117424747 A CN 117424747A
- Authority
- CN
- China
- Prior art keywords
- domain
- access control
- chain
- cross
- request
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 51
- 238000011156 evaluation Methods 0.000 claims abstract description 12
- 230000006870 function Effects 0.000 claims description 38
- 238000006243 chemical reaction Methods 0.000 claims description 27
- 230000008569 process Effects 0.000 claims description 16
- 230000009471 action Effects 0.000 claims description 15
- 238000012545 processing Methods 0.000 claims description 15
- 238000012795 verification Methods 0.000 claims description 14
- 230000005540 biological transmission Effects 0.000 claims description 9
- 230000007246 mechanism Effects 0.000 claims description 9
- 238000013507 mapping Methods 0.000 claims description 5
- 230000004044 response Effects 0.000 claims description 5
- 238000003860 storage Methods 0.000 claims description 5
- 238000011217 control strategy Methods 0.000 claims 1
- 230000007613 environmental effect Effects 0.000 claims 1
- 238000004806 packaging method and process Methods 0.000 claims 1
- 238000007726 management method Methods 0.000 abstract description 14
- 238000005516 engineering process Methods 0.000 abstract description 10
- 238000013524 data verification Methods 0.000 abstract description 5
- IESVDEZGAHUQJU-ZLBXKVHBSA-N 1-hexadecanoyl-2-(4Z,7Z,10Z,13Z,16Z,19Z-docosahexaenoyl)-sn-glycero-3-phosphocholine Chemical compound CCCCCCCCCCCCCCCC(=O)OC[C@H](COP([O-])(=O)OCC[N+](C)(C)C)OC(=O)CC\C=C/C\C=C/C\C=C/C\C=C/C\C=C/C\C=C/CC IESVDEZGAHUQJU-ZLBXKVHBSA-N 0.000 description 19
- IIZPXYDJLKNOIY-JXPKJXOSSA-N 1-palmitoyl-2-arachidonoyl-sn-glycero-3-phosphocholine Chemical compound CCCCCCCCCCCCCCCC(=O)OC[C@H](COP([O-])(=O)OCC[N+](C)(C)C)OC(=O)CCC\C=C/C\C=C/C\C=C/C\C=C/CCCCC IIZPXYDJLKNOIY-JXPKJXOSSA-N 0.000 description 8
- 101000735376 Homo sapiens Protocadherin-8 Proteins 0.000 description 8
- 102100034958 Protocadherin-8 Human genes 0.000 description 8
- 230000006399 behavior Effects 0.000 description 6
- 238000013461 design Methods 0.000 description 4
- 238000013475 authorization Methods 0.000 description 3
- 238000010586 diagram Methods 0.000 description 3
- 238000004891 communication Methods 0.000 description 2
- 238000012217 deletion Methods 0.000 description 2
- 230000037430 deletion Effects 0.000 description 2
- 238000005111 flow chemistry technique Methods 0.000 description 2
- 238000011160 research Methods 0.000 description 2
- 238000006467 substitution reaction Methods 0.000 description 2
- 238000004458 analytical method Methods 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 239000004744 fabric Substances 0.000 description 1
- 230000014509 gene expression Effects 0.000 description 1
- 238000002955 isolation Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000004886 process control Methods 0.000 description 1
- 230000000750 progressive effect Effects 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
- H04L63/205—Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer And Data Communications (AREA)
Abstract
Description
技术领域Technical field
本发明涉及区块链信息安全技术领域,特别涉及一种基于多区块链的跨域访问控制方法及系统。The present invention relates to the field of blockchain information security technology, and in particular to a multi-blockchain-based cross-domain access control method and system.
背景技术Background technique
随着大数据、物联网、云计算等信息技术的快速发展,人们逐步认识到数据的价值,数据已经成为包含医疗、金融和科学研究在内各个领域的新生产要素。在大数据背景下,数据呈爆炸式增长且分散在不同机构建立的业务信息系统中,这些机构为了满足数据隐私性需求往往被划分为不同的安全域,各安全域根据不同业务需求设计不同的安全策略,使各安全域呈现域内互通、域间孤立的特征,导致数据未被充分利用。因此,打破不同信息系统的信息隔离现状,使不同安全域的数据进行流动,实现从封闭式单域向协作式跨域的数据共享是十分必要的。但是数据共享过程中安全性事件层出不穷,所以必须降低多域环境下数据共享过程中的数据泄露风险,保证数据安全性。With the rapid development of information technologies such as big data, the Internet of Things, and cloud computing, people are gradually realizing the value of data. Data has become a new production factor in various fields including medical care, finance, and scientific research. In the context of big data, data is growing explosively and is scattered in business information systems established by different organizations. In order to meet data privacy requirements, these organizations are often divided into different security domains. Each security domain designs different security domains based on different business needs. Security policies make each security domain interconnected within the domain and isolated between domains, resulting in data being underutilized. Therefore, it is necessary to break the information isolation status of different information systems, enable the flow of data in different security domains, and realize data sharing from closed single domain to collaborative cross-domain. However, security incidents occur one after another during the data sharing process, so it is necessary to reduce the risk of data leakage during the data sharing process in a multi-domain environment and ensure data security.
访问控制技术是保证多域数据共享系统中数据安全的重要安全技术,通过限制用户对数据的访问权限,防止非法用户的访问行为以及合法用户的非法访问行为。同时,访问控制技术还可以帮助管理者控制和限制用户对系统中各项资源的访问权限,保证数据的机密性、完整性和可用性,维持系统的安全和稳定运行。目前如自主访问控制、强制访问控制和基于角色的访问控制的传统访问控制模型已十分成熟且已被大规模用于保护资源,但是上述模型并不能在多域环境下的直接应用,亟需细粒度、灵活性的访问控制模型满足多域环境下的访问控制需求。基于属性的访问控制模型通过实体属性描述权限信息,能够更加灵活、细粒度地应对多域复杂环境下的访问需求,但是基于属性的访问控制模型在实现判决透明性和可审计性等方面有所缺失,这就需要引入新的技术进行完善。Access control technology is an important security technology to ensure data security in multi-domain data sharing systems. By restricting users' access rights to data, it prevents illegal users' access behaviors and legal users' illegal access behaviors. At the same time, access control technology can also help managers control and limit users' access rights to various resources in the system, ensure the confidentiality, integrity and availability of data, and maintain the security and stable operation of the system. At present, traditional access control models such as discretionary access control, mandatory access control and role-based access control are very mature and have been used on a large scale to protect resources. However, the above models cannot be directly applied in multi-domain environments and are in urgent need of detailed The granular and flexible access control model meets the access control needs in multi-domain environments. The attribute-based access control model describes permission information through entity attributes and can respond to access requirements in multi-domain complex environments more flexibly and fine-grainedly. However, the attribute-based access control model has limitations in achieving decision transparency and auditability. If it is missing, new technologies need to be introduced to improve it.
近些年,多域数据共享下的访问控制研究大多聚焦于使用集中式架构,即各域依赖“中心化”的第三方服务器去执行数据操作,但集中式架构会面临单点故障、策略篡改、权限判定可靠性等问题。区块链技术为实现访问控制系统提供了新的思路,其天然具备的分布式、防篡改、公开透明等特性以及无需第三方背书的可信执行特性可以有效解决集中式访问控制架构所带来的风险。但是,目前基于区块链的访问控制更多关注单域内的实现,单链式区块链架构的账本对参与节点公开透明,所以不能处理跨信任域数据,基于区块链的跨域方法可扩展性和域间隐私不理想。In recent years, most access control research under multi-domain data sharing has focused on the use of a centralized architecture, that is, each domain relies on a "centralized" third-party server to perform data operations. However, a centralized architecture will face single points of failure and policy tampering. , issues such as the reliability of authority determination. Blockchain technology provides new ideas for implementing access control systems. Its natural distributed, tamper-proof, open and transparent characteristics, as well as its trusted execution characteristics without third-party endorsement, can effectively solve the problems caused by centralized access control architecture. risks of. However, current access control based on blockchain focuses more on implementation within a single domain. The ledger of a single-chain blockchain architecture is open and transparent to participating nodes, so it cannot handle cross-trust domain data. Cross-domain methods based on blockchain can Scalability and inter-domain privacy are not ideal.
发明内容Contents of the invention
为此,本发明提供一种基于多区块链的跨域访问控制方法及系统,利用区块链技术建立低成本、高效且能够保证域间隐私性的可信任跨域访问控制机制,以解决现有区块链访问控制中不能处理跨信任域数据、扩展性和域间隐私不理想的情形。To this end, the present invention provides a multi-blockchain-based cross-domain access control method and system, using blockchain technology to establish a low-cost, efficient and trustworthy cross-domain access control mechanism that can ensure inter-domain privacy to solve the problem Existing blockchain access control cannot handle cross-trust domain data, scalability, and inter-domain privacy issues that are not ideal.
按照本发明所提供的设计方案,提供一种基于多区块链的跨域访问控制方法,包含:According to the design scheme provided by the present invention, a multi-blockchain-based cross-domain access control method is provided, including:
未注册的用户与服务提供者基于属性权威将各自属性注册至对应业务区块链安全域中,并通过调用域内智能合约将属性、属性对应关系及服务提供者自定义的访问控制策略在各安全域的访问控制链上进行上链存储;Unregistered users and service providers register their respective attributes into the corresponding business blockchain security domain based on attribute authority, and by calling smart contracts in the domain, the attributes, attribute correspondences, and service provider-defined access control policies are registered in each security domain. On-chain storage is performed on the domain’s access control chain;
各业务区块链安全域内的访问控制链部署至策略执行客户端节点,各策略执行客户端节点通过中继链跨域链接其他业务区块链安全域内的访问控制链,其中,访问控制链以域内智能合约形式部署ABAC访问控制模型中的属性权威、策略管理点和策略决策点,中继链利用域间智能合约形式执行域间数据传输;The access control chain in the security domain of each business blockchain is deployed to the policy execution client node. Each policy execution client node links the access control chain in the security domain of other business blockchains across domains through the relay chain. The access control chain is The intra-domain smart contract form deploys the attribute authority, policy management point and policy decision point in the ABAC access control model, and the relay chain uses the inter-domain smart contract form to perform inter-domain data transmission;
访问请求域中资源请求者发起域内访问请求时,策略执行客户端节点利用访问控制链并通过调用域内智能合约建立资源请求者和资源拥有者之间的数据交换;访问请求域中资源请求者发起域间访问请求时,策略执行客户端节点利用中继链并通过调用域间智能合约建立请求域资源请求者和目标域资源拥有者之间的数据交换。When the resource requester in the access request domain initiates an intra-domain access request, the policy execution client node uses the access control chain and establishes data exchange between the resource requester and the resource owner by calling the intra-domain smart contract; the resource requester in the access request domain initiates When an inter-domain access request is made, the policy execution client node utilizes the relay chain and establishes the data exchange between the requesting domain resource requester and the target domain resource owner by calling the inter-domain smart contract.
作为本发明基于多区块链的跨域访问控制方法,进一步地,域内智能合约包含:用于对访问控制策略进行增加、删除和更新操作的策略处理合约函数,用于对实体属性进行删除更新操作的属性处理合约函数,用于通过解析访问请求来对访问控制进行判决的访问控制处理合约函数,及对接入域内的策略执行客户端节点进行跨域访问控制请求响应处理的域间数据流处理合约函数。As the multi-blockchain-based cross-domain access control method of the present invention, further, the intra-domain smart contract includes: a policy processing contract function for adding, deleting and updating access control policies, and deleting and updating entity attributes. The attribute processing contract function of the operation, the access control processing contract function used to make judgments on access control by parsing access requests, and the inter-domain data flow for processing cross-domain access control request responses to policy execution client nodes in the access domain Handle contract functions.
作为本发明基于多区块链的跨域访问控制方法,进一步地,域间智能合约包含:用于跨链数据转换的数据转换合约函数,用于跨链数据路由转发的路由合约函数,和用于将访问实体进行跨链身份注册和链内身份映射的注册合约函数。As the cross-domain access control method based on multi-blockchains of the present invention, further, the inter-domain smart contract includes: a data conversion contract function for cross-chain data conversion, a routing contract function for cross-chain data routing and forwarding, and Registration contract function for cross-chain identity registration and intra-chain identity mapping of access entities.
作为本发明基于多区块链的跨域访问控制方法,进一步地,中继链中各节点通过节点部署的域间智能合约来判定当前节点担任角色类型,且各节点中的角色类型分为适配器节点角色类型、路由节点角色类型和注册节点角色类型,其中,适配器节点角色类型基于数据转换合约函数对异构业务区块链安全域上跨链数据进行格式转换处理,路由节点角色类型基于路由合约函数判定路由节点身份并维护链上跨链路由信息,注册节点角色类型基于注册合约函数对跨链用户信息进行注册标识。As the cross-domain access control method based on multi-blockchain of the present invention, further, each node in the relay chain determines the role type of the current node through the inter-domain smart contract deployed by the node, and the role type in each node is divided into adapters Node role type, routing node role type and registration node role type. Among them, the adapter node role type performs format conversion processing on cross-chain data in the heterogeneous business blockchain security domain based on the data conversion contract function, and the routing node role type is based on the routing contract. The function determines the identity of the routing node and maintains cross-chain routing information on the chain. The registration node role type registers and identifies cross-chain user information based on the registration contract function.
作为本发明基于多区块链的跨域访问控制方法,进一步地,策略执行客户端节点利用访问控制链并通过调用域内智能合约建立资源请求者和资源拥有者之间的数据交换,包含:As the multi-blockchain-based cross-domain access control method of the present invention, further, the policy execution client node uses the access control chain and establishes data exchange between the resource requester and the resource owner by calling the smart contract in the domain, including:
首先,针对资源请求者作为访问控制主体发送的原始访问控制请求,策略执行客户端节点基于域内智能合约对原始访问控制请求进行解析并通过主客体相关属性列表来查询访问请求的相关控制策略,以判定主客体属性是否满足相关控制策略要求并基于合法用户信任管理对主客体进行实时信任评估,其中,原始访问控制请求包括主体唯一标识、客体唯一标识和主体要求对客体的动作,相关属性列表包括主客体属性、环境属性及表示主客体当前信任关系的信任属性;First, for the original access control request sent by the resource requester as the access control subject, the policy execution client node parses the original access control request based on the smart contract in the domain and queries the relevant control policy of the access request through the subject-object related attribute list to Determine whether the attributes of the subject and object meet the relevant control policy requirements and conduct a real-time trust assessment of the subject and object based on legitimate user trust management. The original access control request includes the subject's unique identifier, the object's unique identifier and the action required by the subject on the object. The relevant attribute list includes Subject and object attributes, environment attributes and trust attributes representing the current trust relationship between the subject and object;
然后,基于实时信任评估结果,策略执行客户端节点将判决结果反馈至访问客体,以使访问客体对访问控制请求进行响应。Then, based on the real-time trust evaluation results, the policy execution client node feeds back the judgment results to the access object, so that the access object responds to the access control request.
作为本发明基于多区块链的跨域访问控制方法,进一步地,策略执行客户端节点利用中继链并通过调用域间智能合约建立请求域资源请求者和目标域资源拥有者之间的数据交换,包含:As the multi-blockchain-based cross-domain access control method of the present invention, further, the policy execution client node uses the relay chain and establishes data between the requesting domain resource requester and the target domain resource owner by calling the inter-domain smart contract. Exchange, including:
首先,针对资源请求者作为访问控制主体发送的原始访问控制请求,该对应请求域内的策略执行客户端节点基于域内智能合约对原始访问控制请求进行解析并获取主体属性列表,基于主体属性列表调整访问控制请求并将调整后的访问控制请求发送至中继链,其中,原始访问控制请求包括请求域主体唯一标识、目标域客体唯一标识和主体要求对客体的动作;First, for the original access control request sent by the resource requester as the access control subject, the policy execution client node in the corresponding request domain parses the original access control request based on the smart contract in the domain and obtains the subject attribute list, and adjusts the access based on the subject attribute list Control the request and send the adjusted access control request to the relay chain, where the original access control request includes the unique identifier of the requesting domain subject, the unique identifier of the target domain object, and the action requested by the subject on the object;
接着,中继链解析访问控制请求并基于域间智能合约对客体进行路由寻址,以寻找目标域策略执行客户端节点并生成请求域标识和目标域标识,基于请求域标识和目标域标识重构访问控制请求并将重构后的访问控制请求发送至目标域策略执行客户端节点;Next, the relay chain parses the access control request and routes the object based on the inter-domain smart contract to find the target domain policy execution client node and generates the request domain ID and target domain ID. Based on the request domain ID and target domain ID, the relay chain Construct the access control request and send the reconstructed access control request to the target domain policy execution client node;
然后,目标域策略执行客户端节点解析访问控制请求并基于域内智能合约获取访问客体属性信息和代表跨域主客体当前信任关系的信任属性,以基于属性来匹配符合条件的访问控制策略,并基于合法用户信任管理对主客体进行实时信任评估;Then, the target domain policy execution client node parses the access control request and obtains the access object attribute information and the trust attribute representing the current trust relationship between the cross-domain subject and object based on the smart contract in the domain, so as to match the qualified access control policy based on the attributes, and based on Legitimate user trust management conducts real-time trust assessment of subjects and objects;
最后,基于实时信任评估结果,目标域策略执行客户端节点将访问控制策略匹配结果反馈至访问客体,以使访问客体对访问控制请求进行响应。Finally, based on the real-time trust evaluation results, the target domain policy execution client node feeds back the access control policy matching results to the access object, so that the access object responds to the access control request.
作为本发明基于多区块链的跨域访问控制方法,进一步地,中继链解析访问控制请求并基于域间智能合约对客体进行路由寻址,包含:As the multi-blockchain-based cross-domain access control method of the present invention, further, the relay chain parses the access control request and routes the object based on the inter-domain smart contract, including:
通过调用域间智能合约对访问接入的请求域访问控制链相关访问请求数据进行数据转换,对访问中跨链请求进行路由转发,对跨链数据事务在中继链上的区块交易历史进行隐式记录,其中,数据转换包含:去除冗余参数,提取跨链具体参数及将跨链具体参数封装为跨链数据事务,其中,所述跨链具体参数包括请求域标识、目标域标识、主客体标识、主体属性信息及主体要求对壳体的动作信息。By calling the inter-domain smart contract, the access request data related to the access request domain access control chain is converted, the cross-chain requests during the access are routed and forwarded, and the block transaction history of the cross-chain data transactions on the relay chain is processed. Implicit recording, where data conversion includes: removing redundant parameters, extracting cross-chain specific parameters and encapsulating cross-chain specific parameters into cross-chain data transactions, where the cross-chain specific parameters include request domain identification, target domain identification, Subject and object identification, subject attribute information and action information requested by the subject on the shell.
作为本发明基于多区块链的跨域访问控制方法,进一步地,对访问中跨链请求进行路由转发,包含:设置路由器区块链节点,根据访问中跨链请求的传输连接要求及路由器区块链中路由表来进行路由转发,其中,路由器区块链中的路由信息以链上事务形式进行存储,以使跨链请求通过已存的路由信息来查找跨链数据转换处理的中继链节点并通过该中继链节点进行数据转发。As the multi-blockchain-based cross-domain access control method of the present invention, further routing and forwarding cross-chain requests during access includes: setting up a router blockchain node, and based on the transmission connection requirements of the cross-chain request during access and the router area The routing table in the blockchain is used for routing forwarding. The routing information in the router blockchain is stored in the form of on-chain transactions, so that cross-chain requests can find the relay chain for cross-chain data conversion processing through the existing routing information. node and forward data through the relay chain node.
作为本发明基于多区块链的跨域访问控制方法,进一步地,对跨链数据事务在中继链上的区块交易历史进行隐式记录,还包含:利用简单支付验证SPV算法对中继链中的跨链数据事务真实性进行验证,该验证过程包括:As the cross-domain access control method based on multi-blockchains of the present invention, further, implicitly recording the block transaction history of cross-chain data transactions on the relay chain also includes: using the simple payment verification SPV algorithm to Verify the authenticity of cross-chain data transactions in the chain. The verification process includes:
首先,中继链依据跨链数据事务中的跨链请求标识并通过布隆过滤器查找跨链交易所在区块,并根据区块号返回哈希认证路径,其中,哈希认证路径由跨链交易所在Merkle子树相邻叶子结点的哈希值及相邻子树的根节点哈希值组成;First, the relay chain searches for the block where the cross-chain transaction is located based on the cross-chain request identification in the cross-chain data transaction and uses the Bloom filter, and returns the hash authentication path based on the block number. The hash authentication path is determined by the cross-chain transaction. The chain transaction consists of the hash value of the adjacent leaf node of the Merkle subtree and the hash value of the root node of the adjacent subtree;
然后,源链依据哈希认证路径并根据存储的中继链区块头信息进行Merkle证明,并依据证明结果来判定跨链数据事务在中继链上的真实存在性。Then, the source chain performs Merkle proof based on the hash authentication path and the stored relay chain block header information, and determines the true existence of the cross-chain data transaction on the relay chain based on the proof results.
进一步地,本发明还提供一种基于多区块链的跨域访问控制系统,包含:访问控制域、中继链跨域系统、访问控制实体及访问控制链,其中,Further, the present invention also provides a cross-domain access control system based on multi-blockchain, including: access control domain, relay chain cross-domain system, access control entity and access control chain, wherein,
访问控制域,依据访问角色划分为访问控制请求域和访问控制目标域,各访问控制域内均部署有用于对域内和域间访问请求进行控制的访问控制链;Access control domains are divided into access control request domains and access control target domains based on access roles. Access control chains are deployed in each access control domain to control intra-domain and inter-domain access requests;
中继链跨域系统,通过中继节点连接各域内节点,以接入各访问控制域内的访问控制链;The relay chain cross-domain system connects nodes in each domain through relay nodes to access the access control chain in each access control domain;
访问控制实体,由将域内实体属性上传至域内访问控制链上的访问控制主体和将自定义客体访问控制策略上传至域内访问控制链上的访问控制客体组成;The access control entity consists of an access control subject that uploads domain entity attributes to the intra-domain access control chain and an access control object that uploads custom object access control policies to the intra-domain access control chain;
访问控制链,以链上事务形式存储ABAC访问控制模型中访问控制机制相关属性、策略和访问行为记录;The access control chain stores the attributes, policies and access behavior records related to the access control mechanism in the ABAC access control model in the form of on-chain transactions;
该跨域访问控制系统在具体实现中:The specific implementation of this cross-domain access control system:
首先,未注册的用户与服务提供者基于属性权威将各自属性注册至对应业务区块链安全域中,并通过调用域内智能合约将属性、属性对应关系及服务提供者自定义的访问控制策略在各安全域的访问控制链上进行上链存储;First, unregistered users and service providers register their respective attributes into the corresponding business blockchain security domain based on attribute authority, and call the smart contract in the domain to register the attributes, attribute correspondences, and service provider-defined access control policies in the domain. On-chain storage is performed on the access control chain of each security domain;
各业务区块链安全域内的访问控制链部署至策略执行客户端节点,各策略执行客户端节点通过中继链跨域链接其他业务区块链安全域内的访问控制链,其中,访问控制链以域内智能合约形式部署ABAC访问控制模型中的属性权威、策略管理点和策略决策点,中继链利用域间智能合约形式执行域间数据传输;The access control chain in the security domain of each business blockchain is deployed to the policy execution client node. Each policy execution client node links the access control chain in the security domain of other business blockchains across domains through the relay chain. The access control chain is The intra-domain smart contract form deploys the attribute authority, policy management point and policy decision point in the ABAC access control model, and the relay chain uses the inter-domain smart contract form to perform inter-domain data transmission;
访问请求域中资源请求者发起域内访问请求时,策略执行客户端节点利用访问控制链并通过调用域内智能合约建立资源请求者和资源拥有者之间的数据交换;访问请求域中资源请求者发起域间访问请求时,策略执行客户端节点利用中继链并通过调用域间智能合约建立请求域资源请求者和目标域资源拥有者之间的数据交换。When the resource requester in the access request domain initiates an intra-domain access request, the policy execution client node uses the access control chain and establishes data exchange between the resource requester and the resource owner by calling the intra-domain smart contract; the resource requester in the access request domain initiates When an inter-domain access request is made, the policy execution client node utilizes the relay chain and establishes the data exchange between the requesting domain resource requester and the target domain resource owner by calling the inter-domain smart contract.
本发明的有益效果:Beneficial effects of the present invention:
本发明通过在各安全域内部署基于属性的访问控制模型的访问控制链,将域内和域间的访问决策下放至各域内访问控制链,支持域内自主授权,实现细粒度、可追溯的访问控制,通过中继链跨链技术兼容各安全域内的异构访问控制链,实现跨域访问控制信息的转发与记录;基于跨域访问控制的智能合约在域内和域间访问控制流程中引入ABAC模型中的策略决策合约、策略管理合约、属性权威合约、域间中介合约,引入信任管理的信任评估合约,实现域内、域间无需第三方接入的可信跨域访问控制机制;通过中继链的跨链控制数据转发机制,基于跨链互操作和SPV数据验证算法实现跨域访问访问控制数据的安全保证,能够适用于多域环境下的跨域访问控制场景,可以满足多域环境下域间隐私性和扩展性需求,具有较好的应用前景。By deploying the access control chain of the attribute-based access control model in each security domain, the present invention decentralizes intra-domain and inter-domain access decisions to the intra-domain access control chain, supports independent authorization within the domain, and realizes fine-grained and traceable access control. The relay chain cross-chain technology is compatible with heterogeneous access control chains in each security domain to realize the forwarding and recording of cross-domain access control information; smart contracts based on cross-domain access control are introduced into the ABAC model in intra-domain and inter-domain access control processes. The policy decision-making contract, policy management contract, attribute authority contract, inter-domain intermediary contract, and the trust evaluation contract of trust management are introduced to realize a trusted cross-domain access control mechanism without third-party access within and between domains; through the relay chain The cross-chain control data forwarding mechanism is based on cross-chain interoperability and SPV data verification algorithms to ensure the security of cross-domain access control data. It can be applied to cross-domain access control scenarios in multi-domain environments and can meet the needs of inter-domain operations in multi-domain environments. Privacy and scalability requirements, with good application prospects.
附图说明:Picture description:
图1为实施例中基于多区块链的跨域访问控制架构示意;Figure 1 is a schematic diagram of the cross-domain access control architecture based on multiple blockchains in the embodiment;
图2为实施例中域内访问控制流程示意;Figure 2 is a schematic diagram of the intra-domain access control process in the embodiment;
图3为实施例中域内访问控制流程示意;Figure 3 is a schematic diagram of the intra-domain access control process in the embodiment;
图4为实施例中基于中继链的跨链互操作框架。Figure 4 shows the cross-chain interoperability framework based on the relay chain in the embodiment.
具体实施方式:Detailed ways:
为使本发明的目的、技术方案和优点更加清楚、明白,下面结合附图和技术方案对本发明作进一步详细的说明。In order to make the purpose, technical solutions and advantages of the present invention clearer and clearer, the present invention will be described in further detail below in conjunction with the accompanying drawings and technical solutions.
目前大多区块链业务系统使用单链架构,整体区块链网络中数据必须经过所有节点达成共识后再添加至账本,这种串行方式极大降低整体网络的吞吐量,所以并不适用于多域下实体域内和域间访问请求频繁的场景,而且各安全域根据实际需求设定不同的访问控制策略,单链架构很难在一条公开透明的链上处理所有的跨链数据。针对现有区块链跨域访问控制方法无法满足多域环境下域间隐私性和扩展性需求,本发明实施例,提供一种基于多区块链的跨域访问控制系统,包含:访问控制域、中继链跨域系统、访问控制实体及访问控制链,其中,Currently, most blockchain business systems use a single-chain architecture. Data in the overall blockchain network must reach consensus among all nodes before being added to the ledger. This serial approach greatly reduces the throughput of the overall network, so it is not suitable for In multi-domain scenarios where intra-domain and inter-domain access requests are frequent, and each security domain sets different access control policies based on actual needs, it is difficult for a single-chain architecture to process all cross-chain data on an open and transparent chain. In view of the fact that existing blockchain cross-domain access control methods cannot meet inter-domain privacy and scalability requirements in a multi-domain environment, embodiments of the present invention provide a multi-blockchain-based cross-domain access control system, including: access control Domain, relay chain cross-domain system, access control entity and access control chain, among which,
访问控制域,依据访问角色划分为访问控制请求域和访问控制目标域,各访问控制域内均部署有用于对域内和域间访问请求进行控制的访问控制链;Access control domains are divided into access control request domains and access control target domains based on access roles. Access control chains are deployed in each access control domain to control intra-domain and inter-domain access requests;
中继链跨域系统,通过中继节点连接各域内节点,以接入各访问控制域内的访问控制链;The relay chain cross-domain system connects nodes in each domain through relay nodes to access the access control chain in each access control domain;
访问控制实体,由将域内实体属性上传至域内访问控制链上的访问控制主体和将自定义客体访问控制策略上传至域内访问控制链上的访问控制客体组成;The access control entity consists of an access control subject that uploads domain entity attributes to the intra-domain access control chain and an access control object that uploads custom object access control policies to the intra-domain access control chain;
访问控制链,以链上事务形式存储ABAC访问控制模型中访问控制机制相关属性、策略和访问行为记录。The access control chain stores the attributes, policies and access behavior records related to the access control mechanism in the ABAC access control model in the form of on-chain transactions.
参见图1所示,从访问控制跨域角色将访问控制域划分为访问控制请求域和目标域,其中,域内部署一个域内区块链平台的访问控制系统,负责对域内和域间传递的访问请求进行访问控制。可将ABAC模型中的属性权威(Attribute Authority,AA)、策略管理点(Policy Administration Point,PAP)和策略执行点(Policy Decision Point,PDP)以智能合约的形式进行编译部署,域内拥有与中继链连接的节点同时也作为策略执行客户端(PEP Client),负责对访问请求进行转发,如果是域内访问请求则将请求转发至域内访问控制链,如果是域外访问请求则转发至中继链,通过中继链获取访问结果。加入信任评估合约TEC,实现对合法用户的信任管理,支持动态访问控制。跨域系统也称为中继链跨链系统,通过中继节点连接各域内节点实现中继链平台接入各安全域内的访问控制区块链。通过部署中介合约ICC实现域间数据传输和数据转换,接入的域内访问控制链也可以通过轻节点下载中继链区块头数据进行跨域数据验证。访问控制实体中,资源使用者(Data User,DU),资源使用者作为访问控制主体,负责将域内实体属性上传至域内访问控制链。资源拥有者(Data Owner,DO),资源拥有者作为定义访问控制客体的实体,客体的访问控制策略由资源所有者进行定义和上传。访问控制链中,各安全域内通过区块链上智能合约实现一个基于ABAC模型的访问控制系统主体逻辑,访问控制链以链上事务形式存储访问控制机制相关的属性、策略和访问行为记录,链上所有事务公开透明、可追溯、不可篡改,基于区块链实现域内访问控制系统可以降低受单点攻击的影响。As shown in Figure 1, the access control domain is divided into an access control request domain and a target domain based on the access control cross-domain role. Among them, an access control system of an intra-domain blockchain platform is deployed in the domain to be responsible for access within and between domains. Request access control. The Attribute Authority (AA), Policy Administration Point (PAP) and Policy Decision Point (PDP) in the ABAC model can be compiled and deployed in the form of smart contracts, and can be owned and relayed within the domain. The nodes connected by the chain also serve as policy execution clients (PEP Client), responsible for forwarding access requests. If it is an intra-domain access request, the request will be forwarded to the intra-domain access control chain. If it is an out-of-domain access request, it will be forwarded to the relay chain. Obtain access results through the relay chain. Join the trust evaluation contract TEC to realize trust management of legal users and support dynamic access control. The cross-domain system is also called the relay chain cross-chain system. It connects the nodes in each domain through relay nodes to realize the access control blockchain of the relay chain platform in each security domain. Inter-domain data transmission and data conversion are achieved by deploying the intermediary contract ICC. The accessed intra-domain access control chain can also download the relay chain block header data through light nodes for cross-domain data verification. Among the access control entities, the resource user (Data User, DU) serves as the access control subject and is responsible for uploading the attributes of entities in the domain to the access control chain in the domain. Resource owner (Data Owner, DO), the resource owner is the entity that defines the access control object, and the access control policy of the object is defined and uploaded by the resource owner. In the access control chain, each security domain implements the main logic of an access control system based on the ABAC model through smart contracts on the blockchain. The access control chain stores attributes, policies and access behavior records related to the access control mechanism in the form of on-chain transactions. The chain All transactions on the Internet are open, transparent, traceable, and cannot be tampered with. Implementing an intra-domain access control system based on blockchain can reduce the impact of single-point attacks.
基于上述的系统架构,本发明实施例,还提供一种基于多区块链的跨域访问控制方法,包含:Based on the above system architecture, embodiments of the present invention also provide a multi-blockchain-based cross-domain access control method, including:
S101、未注册的用户与服务提供者基于属性权威将各自属性注册至对应业务区块链安全域中,并通过调用域内智能合约将属性、属性对应关系及服务提供者自定义的访问控制策略在各安全域的访问控制链上进行上链存储。S101. Unregistered users and service providers register their respective attributes into the corresponding business blockchain security domain based on attribute authority, and register the attributes, attribute correspondences, and service provider-defined access control policies in the domain by calling smart contracts in the domain. The access control chain of each security domain is stored on the chain.
参与访问流程的实体可划分为访问主体和访问客体,主体即向服务或资源请求访问的实体,客体通常为服务提供者或资源提供者,所有实体需要通过注册来参与访问流程控制。Entities participating in the access process can be divided into access subjects and access objects. The subject is the entity that requests access to services or resources. The object is usually a service provider or resource provider. All entities need to register to participate in access process control.
S102、各业务区块链安全域内的访问控制链部署至策略执行客户端节点,各策略执行客户端节点通过中继链跨域链接其他业务区块链安全域内的访问控制链,其中,访问控制链以域内智能合约形式部署ABAC访问控制模型中的属性权威、策略管理点和策略决策点,中继链利用域间智能合约形式执行域间数据传输。S102. The access control chain in the security domain of each business blockchain is deployed to the policy execution client node. Each policy execution client node links the access control chain in the security domain of other business blockchains across domains through the relay chain, where access control The chain deploys attribute authority, policy management points and policy decision points in the ABAC access control model in the form of intra-domain smart contracts, and the relay chain uses inter-domain smart contracts to perform inter-domain data transmission.
其中,域内智能合约包含:用于对访问控制策略进行增加、删除和更新操作的策略处理合约函数,用于对实体属性进行删除更新操作的属性处理合约函数,用于通过解析访问请求来对访问控制进行判决的访问控制处理合约函数,及对接入域内的策略执行客户端节点进行跨域访问控制请求响应处理的域间数据流处理合约函数。域间智能合约包含:用于跨链数据转换的数据转换合约函数,用于跨链数据路由转发的路由合约函数,和用于将访问实体进行跨链身份注册和链内身份映射的注册合约函数。Among them, the smart contract in the domain includes: policy processing contract functions for adding, deleting and updating access control policies, attribute processing contract functions for deleting and updating entity attributes, and analyzing access requests. Controls the access control processing contract function for making decisions, and the inter-domain data flow processing contract function for processing cross-domain access control request responses to policy execution client nodes in the access domain. The inter-domain smart contract includes: data conversion contract function for cross-chain data conversion, routing contract function for cross-chain data routing and forwarding, and registration contract function for cross-chain identity registration and intra-chain identity mapping of access entities. .
各智能合约具体设计的功能函数详见下表1所示。The specific designed functions of each smart contract are shown in Table 1 below.
表1各智能合约功能Table 1 Functions of each smart contract
(a)PAPC负责策略相关操作(a) PAPC is responsible for policy-related operations
DO通过调用PAPC中的AddPolicy、DeletePolicy、UpdatePolicy方法来对区块中的TXpolicy进行增加、删除和更新操作。PAPC必须通过DO属性列表的哈希值与TXpolicy中的Pid进行匹配,匹配成功后才可进行后续删改操作。DO adds, deletes, and updates the TX policy in the block by calling the AddPolicy, DeletePolicy, and UpdatePolicy methods in PAPC. PAPC must match the hash value of the DO attribute list with the Pid in the TX policy . Subsequent deletion operations can only be performed after successful matching.
PAPC中的QueryPolicy函数只有PDPC可以调用,根据PDPC所提供的AAR来查询符合条件的访问控制策略,并将查询到的访问控制相关策略以策略集的形式返回,以供PDPC进行策略判决。The QueryPolicy function in PAPC can only be called by PDPC. It queries qualified access control policies based on the AAR provided by PDPC, and returns the queried access control-related policies in the form of a policy set for PDPC to make policy decisions.
(b)AAC负责属性相关操作(b)AAC is responsible for attribute-related operations
安全域内管理者通过调用AddAttribute、DeleteAttribute、UpdateAttribute实现实体的属性上传、删除、更新,AAC通过获取调用智能合约了解合约调用者的身份是否符合条件,如调用智能合约者是否拥有某个属性来验证智能合约调用者身份。Managers in the security domain implement attribute uploading, deletion, and updating of entities by calling AddAttribute, DeleteAttribute, and UpdateAttribute. AAC understands whether the identity of the contract caller meets the conditions by obtaining the calling smart contract, such as whether the calling smart contract possesses a certain attribute to verify the smart contract. The identity of the contract caller.
PDPC调用AAC的QueryAttribute方法实现获取属性关系,属性的查找操作对由PEP发送至PDPC进行解构后的主客体属性列表,查找成功后返回给PDPC。PDPC calls the QueryAttribute method of AAC to obtain the attribute relationship. The attribute search operation deconstructs the subject and object attribute lists sent by PEP to PDPC, and returns it to PDPC after the search is successful.
(c)PDPC负责访问控制判决相关操作(c) PDPC is responsible for operations related to access control decisions
PDPC负责接收并解析链下PEP客户端发送的自然访问请求(Nautural AccessRequest,NAR),通过解析NAR后获取已上传的链上属性、链上访问控制策略,PDPC最后根据获取的三种访问控制原语进行自动化访问控制判决,并将结果返回给PEP客户端。PDPC is responsible for receiving and parsing the Natural Access Request (NAR) sent by the off-chain PEP client. After parsing the NAR, it obtains the uploaded on-chain attributes and on-chain access control policies. PDPC finally obtains the three access control principles based on the obtained language to make automated access control decisions and return the results to the PEP client.
(d)ICC负责域间数据流处理(d) ICC is responsible for inter-domain data flow processing
ICC由跨域系统即中继链跨链系统进行部署,负责对接入域内的PEP客户端发送的跨域访问控制请求与响应进行处理。ICC is deployed by a cross-domain system, that is, a relay chain cross-chain system, and is responsible for processing cross-domain access control requests and responses sent by PEP clients in the access domain.
中继链中各节点可通过节点部署的域间智能合约来判定当前节点担任角色类型,且各节点中的角色类型分为适配器节点角色类型、路由节点角色类型和注册节点角色类型,其中,适配器节点角色类型基于数据转换合约函数对异构业务区块链安全域上跨链数据进行格式转换处理,路由节点角色类型基于路由合约函数判定路由节点身份并维护链上跨链路由信息,注册节点角色类型基于注册合约函数对跨链用户信息进行注册标识。Each node in the relay chain can determine the role type of the current node through the inter-domain smart contract deployed by the node, and the role types in each node are divided into adapter node role type, routing node role type and registration node role type. Among them, adapter The node role type performs format conversion processing on cross-chain data in the heterogeneous business blockchain security domain based on the data conversion contract function. The routing node role type determines the identity of the routing node based on the routing contract function and maintains cross-link routing information on the chain, and registers the node. The role type registers and identifies cross-chain user information based on the registration contract function.
S103、访问请求域中资源请求者发起域内访问请求时,策略执行客户端节点利用访问控制链并通过调用域内智能合约建立资源请求者和资源拥有者之间的数据交换;访问请求域中资源请求者发起域间访问请求时,策略执行客户端节点利用中继链并通过调用域间智能合约建立请求域资源请求者和目标域资源拥有者之间的数据交换。S103. When the resource requester in the access request domain initiates an intra-domain access request, the policy execution client node uses the access control chain and establishes data exchange between the resource requester and the resource owner by calling the intra-domain smart contract; the resource request in the access request domain When a requester initiates an inter-domain access request, the policy execution client node uses the relay chain and establishes a data exchange between the requesting domain resource requester and the target domain resource owner by calling the inter-domain smart contract.
具体地,策略执行客户端节点利用访问控制链并通过调用域内智能合约建立资源请求者和资源拥有者之间的数据交换,可设计为包含如下内容:Specifically, the policy execution client node uses the access control chain and establishes data exchange between the resource requester and the resource owner by calling the smart contract in the domain. It can be designed to include the following content:
首先,针对资源请求者作为访问控制主体发送的原始访问控制请求,策略执行客户端节点基于域内智能合约对原始访问控制请求进行解析并通过主客体相关属性列表来查询访问请求的相关控制策略,以判定主客体属性是否满足相关控制策略要求并基于合法用户信任管理对主客体进行实时信任评估,其中,原始访问控制请求包括主体唯一标识、客体唯一标识和主体要求对客体的动作,相关属性列表包括主客体属性、环境属性及表示主客体当前信任关系的信任属性;First, for the original access control request sent by the resource requester as the access control subject, the policy execution client node parses the original access control request based on the smart contract in the domain and queries the relevant control policy of the access request through the subject-object related attribute list to Determine whether the attributes of the subject and object meet the relevant control policy requirements and conduct a real-time trust assessment of the subject and object based on legitimate user trust management. The original access control request includes the subject's unique identifier, the object's unique identifier and the action required by the subject on the object. The relevant attribute list includes Subject and object attributes, environment attributes and trust attributes representing the current trust relationship between the subject and object;
然后,基于实时信任评估结果,策略执行客户端节点将判决结果反馈至访问客体,以使访问客体对访问控制请求进行响应。Then, based on the real-time trust evaluation results, the policy execution client node feeds back the judgment results to the access object, so that the access object responds to the access control request.
访问控制流程的初始化,即区块链网络初始化、智能合约部署和跨链系统的介入必须由管理员提前完成。在授权之前,主客体必须完成属性注册,将属性注册到所在的属性权威中属性,调用AA Contract中AddAttribute接口将属性链及属性对应关系的哈希值注册上链。同时客体拥有者定义访问控制策略PDO,调用PAP Contract中AddPolicy进行策略的上链。如图2所示,资源与资源请求者在同域时,由域内访问控制链进行访问控制判决,域内访问控制详细步骤可描述如下:The initialization of the access control process, that is, blockchain network initialization, smart contract deployment and cross-chain system intervention must be completed in advance by the administrator. Before authorization, the subject and object must complete the attribute registration, register the attributes into the attributes of the attribute authority, and call the AddAttribute interface in the AA Contract to register the attribute chain and the hash value of the attribute correspondence on the chain. At the same time, the object owner defines the access control policy P DO and calls AddPolicy in the PAP Contract to upload the policy. As shown in Figure 2, when the resource and the resource requester are in the same domain, the access control decision is made by the intra-domain access control chain. The detailed steps of intra-domain access control can be described as follows:
(a)资源请求者作为访问控制主体向PEP客户端发送原始访问控制请求(NaturalAccess Request,NAR),NAR参数包含:主体唯一标识IDDU,客体唯一标识IDDO,主体要求对客体的动作TDO。(a) The resource requester sends an original access control request (Natural Access Request, NAR) to the PEP client as the access control subject. The NAR parameters include: the subject's unique identifier ID DU , the object's unique identifier ID DO , and the subject's requested action T DO on the object. .
(b)PEP客户端将NAR传递至PDPC,PDPC进行NAR解析,获取NAR中主客体标识和动作。(b) The PEP client passes the NAR to PDPC, and PDPC parses the NAR and obtains the subject and object identifiers and actions in the NAR.
(c)PDPC将主体客体标识发送至AAC中,通过调用AAC中QueryAttribute获取存储至链上TXattr中的相关属性列表AL,包括主客体属性、环境属性和代表主客体当前信任关系的信任属性。(c) PDPC sends the subject and object identification to AAC, and obtains the relevant attribute list AL stored in the TX attr on the chain by calling QueryAttribute in AAC, including subject and object attributes, environment attributes and trust attributes representing the current trust relationship between the subject and object.
(d)PDPC将返回的属性列表进行组合成属性访问请求(Attribute AccessRequest,AAR),然后将AAR发送给PAPC进行相关策略查询,将查询到的TXpolicy返回至PDPC。(d) PDPC combines the returned attribute list into an Attribute Access Request (AAR), then sends the AAR to PAPC for related policy query, and returns the queried TX policy to PDPC.
(e)PDPC首先判断信任属性是否满足策略要求,满足要求后对PAPC和AAC返回的属性列表AL和TXpolicy集中策略PDO集进行访问控制判决,判决结束后将判决结果和访问行为返回至PEP客户端和TEC,TEC根据反馈进行实时信任评估,而PEP客户端再返回至客体,客体对访问控制结果进行响应。(e) PDPC first determines whether the trust attribute meets the policy requirements. After meeting the requirements, it makes an access control decision on the attribute list AL and TX policy centralized policy P DO set returned by PAPC and AAC. After the decision is completed, the decision result and access behavior are returned to PEP. The client and TEC, TEC performs real-time trust assessment based on feedback, and the PEP client returns to the object, and the object responds to the access control results.
具体地,策略执行客户端节点利用中继链并通过调用域间智能合约建立请求域资源请求者和目标域资源拥有者之间的数据交换,可设计为包含如下内容:Specifically, the policy execution client node uses the relay chain and establishes the data exchange between the requesting domain resource requester and the target domain resource owner by calling the inter-domain smart contract, which can be designed to include the following content:
首先,针对资源请求者作为访问控制主体发送的原始访问控制请求,该对应请求域内的策略执行客户端节点基于域内智能合约对原始访问控制请求进行解析并获取主体属性列表,基于主体属性列表调整访问控制请求并将调整后的访问控制请求发送至中继链,其中,原始访问控制请求包括请求域主体唯一标识、目标域客体唯一标识和主体要求对客体的动作;First, for the original access control request sent by the resource requester as the access control subject, the policy execution client node in the corresponding request domain parses the original access control request based on the smart contract in the domain and obtains the subject attribute list, and adjusts the access based on the subject attribute list Control the request and send the adjusted access control request to the relay chain, where the original access control request includes the unique identifier of the requesting domain subject, the unique identifier of the target domain object, and the action requested by the subject on the object;
接着,中继链解析访问控制请求并基于域间智能合约对客体进行路由寻址,以寻找目标域策略执行客户端节点并生成请求域标识和目标域标识,基于请求域标识和目标域标识重构访问控制请求并将重构后的访问控制请求发送至目标域策略执行客户端节点;Next, the relay chain parses the access control request and routes the object based on the inter-domain smart contract to find the target domain policy execution client node and generates the request domain ID and target domain ID. Based on the request domain ID and target domain ID, the relay chain Construct the access control request and send the reconstructed access control request to the target domain policy execution client node;
然后,目标域策略执行客户端节点解析访问控制请求并基于域内智能合约获取访问客体属性信息和代表跨域主客体当前信任关系的信任属性,以基于属性来匹配符合条件的访问控制策略,并基于合法用户信任管理对主客体进行实时信任评估;Then, the target domain policy execution client node parses the access control request and obtains the access object attribute information and the trust attribute representing the current trust relationship between the cross-domain subject and object based on the smart contract in the domain, so as to match the qualified access control policy based on the attributes, and based on Legitimate user trust management conducts real-time trust assessment of subjects and objects;
最后,基于实时信任评估结果,目标域策略执行客户端节点将访问控制策略匹配结果反馈至访问客体,以使访问客体对访问控制请求进行响应。Finally, based on the real-time trust evaluation results, the target domain policy execution client node feeds back the access control policy matching results to the access object, so that the access object responds to the access control request.
如图3所示,中继链作为跨域平台,在两个域内基于区块链访问控制起纽带作用,实现跨域访问控制数据的转发,域间访问控制流程如下所示:As shown in Figure 3, the relay chain, as a cross-domain platform, serves as a link between two domains based on blockchain access control, realizing the forwarding of cross-domain access control data. The inter-domain access control process is as follows:
(a)主体向请求域PEP客户端发送跨域原始访问控制请求(Cross-domain NaturalAccess Request,C-NAR),C-NAR会根据具体情形变化其中参数。请求域内的称为C-NAR1,请求参数包含:请求域主体唯一标识C-UIDDU,目标域客体的唯一标识C-UIDDO和主体要求对客体的动作TDO。(a) The subject sends a cross-domain NaturalAccess Request (C-NAR) to the requesting domain PEP client. C-NAR will change the parameters according to the specific situation. The one in the request domain is called C-NAR1. The request parameters include: the unique identifier C-UID DU of the subject in the request domain, the unique identifier C-UID DO of the object in the target domain and the action T DO requested by the subject on the object.
(b)请求域PEP客户端向本域AAC请求访问主体的属性列表,PEP客户端在收到返回属性列表后向中继链上的ICC发送变更后的C-NAR2,C-NAR2请求参数包括:请求域主体唯一标识C-UIDDU和主体属性信息ALDU,目标域客体的唯一标识C-UIDDO,主体要求对客体的动作TDO。(b) The PEP client in the requesting domain requests the attribute list of the access subject from the AAC of this domain. After receiving the returned attribute list, the PEP client sends the changed C-NAR2 to the ICC on the relay chain. The C-NAR2 request parameters include : The request domain subject’s unique identifier C-UID DU and subject attribute information AL DU , the unique identifier of the target domain object C-UID DO , and the subject requires the action T DO on the object.
(c)跨域系统,即中继链跨链系统中ICC接收到C-NAR中客体的跨域统一身份标识对C-UIDDO进行路由寻址,寻到目标域的PEP客户端后,重构成C-NAR3,参数包括:来源域标识LDU,目标域标识LDO,请求域主体唯一标识C-UIDDU和主体属性信息ALDU,目标域客体的唯一标识C-UIDDO,主体要求对客体的动作TDO。(c) Cross-domain system, that is, in the relay chain cross-chain system, the ICC receives the cross-domain unified identity of the object in the C-NAR and performs routing addressing on the C-UID DO . After finding the PEP client of the target domain, it re- Constitute C-NAR3, the parameters include: source domain identifier L DU , target domain identifier L DO , request domain subject unique identifier C-UID DU and subject attribute information AL DU , target domain object unique identifier C-UID DO , subject requirements for The object's action T DO .
(d)目标域中PEP客户端接收到寻址成功后的C-NAR3后,生成新的C-NAR4,参数包括:来源域标识LDU,请求域主体唯一标识C-UIDDU和主体属性信息ALDU,目标域客体的唯一标识C-UIDDO,主体要求对客体的动作TDO。将C-NAR4发送至PDP进行访问控制判决。(d) After the PEP client in the target domain receives the successfully addressed C-NAR3, it generates a new C-NAR4. The parameters include: source domain identifier L DU , request domain subject unique identifier C-UID DU and subject attribute information. AL DU , the unique identifier of the target domain object C-UID DO , the subject requires the action T DO on the object. Send C-NAR4 to PDP for access control decision.
(e)目标域中PDPC首先将传递至C-UIDDU,C-UIDDO至本域的AAC获取客体属性信息和代表跨域主客体当前信任关系的信任属性。PDPC将传递来的所有属性信息生成AAR发送至目标域PAPC匹配符合条件的访问控制策略集,PAPC找寻到符合条件的访问控制策略集后返回PDPC。(e) The PDPC in the target domain will first be passed to the C-UID DU , and the C-UID DO will be sent to the AAC of this domain to obtain the object attribute information and the trust attribute representing the current trust relationship between the cross-domain subject and object. PDPC generates an AAR for all the passed attribute information and sends it to the target domain. PAPC matches the qualified access control policy set. PAPC returns to PDPC after finding the qualified access control policy set.
(f)目标域PDPC对访问控制策略集进行集中判决,将判决结果返回至目标域PEP客户端,目标域客户端再讲判决结果传递至ICC,返回参数为:请求域主体唯一标识C-UIDDU,目标域客体的唯一标识C-UIDDO和访问控制结果。(f) The target domain PDPC makes a centralized decision on the access control policy set and returns the decision result to the target domain PEP client. The target domain client then passes the decision result to the ICC. The return parameter is: Request domain subject unique identifier C-UID DU , the unique identifier C-UID DO of the target domain object and the access control result.
其中,中继链解析访问控制请求并基于域间智能合约对客体进行路由寻址,可包含:Among them, the relay chain parses access control requests and routes objects based on inter-domain smart contracts, which can include:
通过调用域间智能合约对访问接入的请求域访问控制链相关访问请求数据进行数据转换,对访问中跨链请求进行路由转发,对跨链数据事务在中继链上的区块交易历史进行隐式记录,其中,数据转换包含:去除冗余参数,提取跨链具体参数及将跨链具体参数封装为跨链数据事务,其中,所述跨链具体参数包括请求域标识、目标域标识、主客体标识、主体属性信息及主体要求对壳体的动作信息。By calling the inter-domain smart contract, the access request data related to the access request domain access control chain is converted, the cross-chain requests during the access are routed and forwarded, and the block transaction history of the cross-chain data transactions on the relay chain is processed. Implicit recording, where data conversion includes: removing redundant parameters, extracting cross-chain specific parameters and encapsulating cross-chain specific parameters into cross-chain data transactions, where the cross-chain specific parameters include request domain identification, target domain identification, Subject and object identification, subject attribute information and action information requested by the subject on the shell.
对访问中跨链请求进行路由转发,可设计为包含:设置路由器区块链节点,根据访问中跨链请求的传输连接要求及路由器区块链中路由表来进行路由转发,其中,路由器区块链中的路由信息以链上事务形式进行存储,以使跨链请求通过已存的路由信息来查找跨链数据转换处理的中继链节点并通过该中继链节点进行数据转发。Routing and forwarding of cross-chain requests during access can be designed to include: setting up router blockchain nodes, and routing and forwarding based on the transmission connection requirements of cross-chain requests during access and the routing table in the router blockchain, where the router block The routing information in the chain is stored in the form of on-chain transactions, so that cross-chain requests can use the stored routing information to find the relay chain node for cross-chain data conversion processing and forward the data through the relay chain node.
目前集中式的跨域访问控制机制通过安全域外第三方服务器统一进行跨域控制信息的转发,无法保证跨域信息的可追溯性和可审计性,而且各安全域的基于区块链的访问控制系统因为事先未协商平台的一致性,所以无法直接进行跨链的数据交换,为此,本案实施例中,基于中继链实现跨链控制信息转发机制,通过中继链对各安全域内的平行异构链进行兼容,同时保证跨域访问控制的安全可信、可审计。其中,基于中继链的跨链互操作框架如图4所示,可由以下三个部分构成:The current centralized cross-domain access control mechanism uniformly forwards cross-domain control information through third-party servers outside the security domain, which cannot guarantee the traceability and auditability of cross-domain information. Moreover, the blockchain-based access control of each security domain Because the system has not negotiated the consistency of the platform in advance, it cannot directly exchange data across chains. For this reason, in the embodiment of this case, a cross-chain control information forwarding mechanism is implemented based on the relay chain, and the parallel data in each security domain is processed through the relay chain. Heterogeneous chains are compatible while ensuring the security, trustworthiness and auditability of cross-domain access control. Among them, the cross-chain interoperability framework based on the relay chain is shown in Figure 4, which can be composed of the following three parts:
(a)平行链:平行链在跨链控制信息交换中扮演跨链操作的请求者和接收者,负责实现各信任域内的业务系统。每个平行链都是一个独立的区块链网络,但是为了能够将异构区块链平台进行链接,平行链不仅可以利用链上智能合约实现自我审计也可通过基于SPV的数据验证算法来验证本地存储的中继链交易区块头,证明区块头中跨链请求信息的存在真实性以实现链间的可信审计。通过中继链链接平行链的模式可以连接多条并行运行的独立区块链,可以形成“绳状结构”,增强区块链与区块链之间的跨链互操作性,支持跨域应用以跨链的形式进行实现。(a) Parallel chain: Parallel chain plays the role of requester and receiver of cross-chain operations in cross-chain control information exchange, and is responsible for implementing business systems in each trust domain. Each parachain is an independent blockchain network, but in order to be able to link heterogeneous blockchain platforms, the parachain can not only use on-chain smart contracts to achieve self-auditing, but also verify through SPV-based data verification algorithms. The locally stored relay chain transaction block header proves the authenticity of the cross-chain request information in the block header to achieve trustworthy auditing between chains. The mode of linking parallel chains through relay chains can connect multiple independent blockchains running in parallel, forming a "rope-like structure" to enhance cross-chain interoperability between blockchains and support cross-domain applications. Implemented in the form of cross-chain.
(b)中继链:中继链作为链接各平行区块链的主链,负责对平行链上的节点所发送跨链请求进行数据转换解析及路由转发,实现链与链间的数据传递,同时中继链对各平行链传递来的每一个交易进行隐式记录,各平行链客户端可根据中继链存储的接入各平行链的区块头数据进行在验证环节,利用SPV进行交易验证。架构如图4所示,中继链上节点主要分为三类角色,为适配器节点、路由节点和注册节点,中继链上节点角色不固定且可以兼任,主要以节点部署智能合约来判定某时刻节点所担任角色。适配器节点连接平行链与中继链,允许发送交易和查询不同类型区块链协议和网络,可通过部署数据转换合约(DataConversion Contract,DCC)实现对异构区块链上跨链数据格式的处理,如对使用Fabric中基于Goland的链码发送的跨链数据原语进行解析、存储和转换;路由节点是实现链间路由寻址和路由转发,通过中继链上的部署路由合约(Router Contract,RC)来判定路由节点身份,同时路由节点负责维护链上跨链路由信息;注册节点也整体中继链上负责对跨链用户进行信息注册的节点,通过统一用户标识来对每个用户进行标识。(b) Relay chain: As the main chain linking each parallel blockchain, the relay chain is responsible for data conversion, analysis and routing forwarding of cross-chain requests sent by nodes on the parallel chain to realize data transfer between chains. At the same time, the relay chain implicitly records every transaction passed by each parachain. Each parachain client can perform transaction verification based on the block header data stored in the relay chain and access each parachain, using SPV for transaction verification. . The architecture is shown in Figure 4. The nodes on the relay chain are mainly divided into three types of roles, namely adapter nodes, routing nodes and registration nodes. The roles of nodes on the relay chain are not fixed and can be concurrently held. The node deployment smart contract is mainly used to determine a certain node. The role played by the time node. The adapter node connects the parallel chain and the relay chain, allowing transactions to be sent and querying different types of blockchain protocols and networks. It can process cross-chain data formats on heterogeneous blockchains by deploying a Data Conversion Contract (DCC). , such as parsing, storing and converting cross-chain data primitives sent using the Goland-based chain code in Fabric; the routing node implements inter-chain routing addressing and routing forwarding, through the deployment of routing contracts (Router Contract) on the relay chain , RC) to determine the identity of the routing node. At the same time, the routing node is responsible for maintaining cross-link routing information on the chain; the registration node is also the node on the overall relay chain responsible for registering information for cross-chain users, and each user is registered through a unified user identity. Make identification.
(c)跨链交易实体:主要分为源链请求方和目标链接收者,跨链交易实体可以是部署跨链智能合约的异构平行链中任意链,但是必须保证所有跨链交易实体拥有统一的跨链身份标识。(c) Cross-chain transaction entities: Mainly divided into source chain requesters and target chain recipients. Cross-chain transaction entities can be any chain in heterogeneous parallel chains deploying cross-chain smart contracts, but it must be ensured that all cross-chain transaction entities have Unified cross-chain identity.
中继链上域间智能合约的设计可描述如下:The design of the inter-domain smart contract on the relay chain can be described as follows:
(a)数据转换合约DCC(a) Data conversion contract DCC
区块链是一个封闭而独立的系统,而不同安全域内基于区块链的应用系统平台在使用中继链进行链接前彼此之间是未知的,所以存在区块链上事务不兼容问题。为了实现链之间的连接,必须增加一个特定的角色来作为连接方,方便进行双方之间的信息交换。适配器节点就负责中继链和平行链的信息交换,而部署在适配器节点的DCC主要负责跨链数据的转换,即将从平相链传递的跨链数据进行解析、修改和封装。DCC首先负责将平行链发送的跨链信息进行解析,转换并去除其中如区块高度等冗余参数,只获取跨链具体参数,如跨链访问控制请求中的主客体标识等具体信息。然后将具体内容封装进跨链事务中,中继链上所有操作除路由表信息外都通过跨链事务来进行,其中,DCC将经过数据转换后的具体内容封装至跨链事务封装跨链数据事务,跨链数据事务具体信息可表示为:The blockchain is a closed and independent system, and the blockchain-based application system platforms in different security domains are unknown to each other before using the relay chain to link, so there is a problem of transaction incompatibility on the blockchain. In order to realize the connection between chains, a specific role must be added as the connecting party to facilitate the exchange of information between the two parties. The adapter node is responsible for the information exchange between the relay chain and the parallel chain, and the DCC deployed on the adapter node is mainly responsible for the conversion of cross-chain data, that is, parsing, modifying and encapsulating the cross-chain data passed from the parallel chain. DCC is first responsible for parsing the cross-chain information sent by the parallel chain, converting and removing redundant parameters such as block height, and only obtaining specific cross-chain parameters, such as subject and object identifiers in cross-chain access control requests and other specific information. Then the specific content is encapsulated into a cross-chain transaction. All operations on the relay chain, except routing table information, are performed through cross-chain transactions. Among them, DCC encapsulates the specific content after data conversion into a cross-chain transaction to encapsulate the cross-chain data. Transactions, the specific information of cross-chain data transactions can be expressed as:
TXcross-chain={SourceChainID,DestinationChainID,Type,Txid,Timestamp,Content}TX cross-chain ={SourceChainID,DestinationChainID,Type,Txid,Timestamp,Content}
其中,SourceChai-nID为源链标识,DestinationChainID为目标链标识,Type为跨链事务类型,可以为访问控制类,Txid为事务唯一标识,也可以为其他事务类型,Timestamp为跨链事务生成时间戳,Content为封装的从平行链传递的具体内容。Among them, SourceChai-nID is the source chain ID, DestinationChainID is the target chain ID, Type is the cross-chain transaction type, which can be an access control class, Txid is the unique identifier of the transaction, or it can be other transaction types, and Timestamp generates timestamps for cross-chain transactions. , Content is the encapsulated specific content passed from the parachain.
(b)路由合约RC(b) Routing contract RC
区块链路由可以将一些区块链实体或节点作为路由器,在不同的区块链网络之间发送请求在区块链路由器网络中,区块链扮演路由器的功能,根据通信协议分析和传输连接请求,保留区块链网络的动态通信布局。在本方法中选择使用智能合约的形式,即使用路由合约进行路由转发,保证跨链数据可以通过已存的路由信息查找与平行链链接的适配器节点,再通过适配器节点上的进行数据解包与转发,其中,路由交易由路由器节点根据路由器区块链中写入的路由表进行传输。路由信息以链上事务形式存储,具体表示如下:Blockchain routing can use some blockchain entities or nodes as routers to send requests between different blockchain networks. In the blockchain router network, the blockchain acts as a router, analyzing and transmitting according to the communication protocol. Connection requests,preserving the dynamic communication layout of the blockchain,network. In this method, we choose to use a smart contract, that is, use a routing contract for routing and forwarding to ensure that cross-chain data can find the adapter node linked to the parallel chain through the existing routing information, and then unpack and process the data through the adapter node. Forwarding, where routing transactions are transmitted by router nodes based on routing tables written in the router blockchain. Routing information is stored in the form of on-chain transactions, specifically expressed as follows:
TXRouting={BlockchainID,Pority,Timestamp,AdapterAddr}TX Routing ={BlockchainID,Pority,Timestamp,AdapterAddr}
其中,Block-chainID为区块链应用系统的唯一标识,Pority为路由优先级,优先级最高的包含最新接入跨链系统的区块链信息,Timestamp为路由信息生成的时间戳,Address为连接区块链网络的适配器节点地址。Among them, Block-chainID is the unique identifier of the blockchain application system, Portity is the routing priority, the one with the highest priority contains the latest blockchain information connected to the cross-chain system, Timestamp is the timestamp generated by the routing information, and Address is the connection. The adapter node address of the blockchain network.
(3)注册合约RCC(3)Registration Contract RCC
注册合约负责将实体在各链中账户进行统一映射方便跨链管理,用户通过调用RCC合约上注册函数进行跨链身份注册和链内身份映射。The registration contract is responsible for uniformly mapping entities' accounts in each chain to facilitate cross-chain management. Users can perform cross-chain identity registration and intra-chain identity mapping by calling the registration function on the RCC contract.
根据以上合约,中继链上数据转换算法如下表2所示:According to the above contract, the data conversion algorithm on the relay chain is shown in Table 2 below:
表2基于中继链数据交换Table 2 is based on relay chain data exchange
其中,利用简单支付验证SPV算法对中继链中的跨链数据事务真实性进行验证,该验证过程可设计为包括如下内容:Among them, the simple payment verification SPV algorithm is used to verify the authenticity of cross-chain data transactions in the relay chain. The verification process can be designed to include the following:
首先,中继链依据跨链数据事务中的跨链请求标识并通过布隆过滤器查找跨链交易所在区块,并根据区块号返回哈希认证路径,其中,哈希认证路径由跨链交易所在Merkle子树相邻叶子结点的哈希值及相邻子树的根节点哈希值组成;First, the relay chain searches for the block where the cross-chain transaction is located based on the cross-chain request identification in the cross-chain data transaction and uses the Bloom filter, and returns the hash authentication path based on the block number. The hash authentication path is determined by the cross-chain transaction. The chain transaction consists of the hash value of the adjacent leaf node of the Merkle subtree and the hash value of the root node of the adjacent subtree;
然后,源链依据哈希认证路径并根据存储的中继链区块头信息进行Merkle证明,并依据证明结果来判定跨链数据事务在中继链上的真实存在性。Then, the source chain performs Merkle proof based on the hash authentication path and the stored relay chain block header information, and determines the true existence of the cross-chain data transaction on the relay chain based on the proof results.
中继链负责对接入的异构平行链进行数据转换和对跨链请求进行路由转发,同时对发送的跨链事务在中继链上的区块交易历史中进行隐式记录,但是各异构链无法确定发出的跨链事务是否在中继区块链完整地进行相对应处理,这时就需要一个各平行链通过跨链事务验证算法来验证所提交的跨链事务在中继链上存在的真实性。简单支付验证(SPV)是一种基于默克尔树结构的数据存在性校验算法。在区块体中,每笔交易都挂载在默克尔树的一个叶子节点上,用户只需要保存每个区块的区块头信息即可完成对某笔交易的支付验证(其本质为验证某笔交易所在的区块是否为共识区块)。基于此,本案实施例中,选择使用SPV算法对存储中继链上交易进行存在真实性验证,其中,基于SPV的数据验证算法伪代码可如下表3所示:The relay chain is responsible for data conversion of accessed heterogeneous parallel chains and routing and forwarding of cross-chain requests. At the same time, the sent cross-chain transactions are implicitly recorded in the block transaction history on the relay chain, but they are different. The construction chain cannot determine whether the cross-chain transaction sent is completely processed in the relay blockchain. In this case, each parallel chain needs to verify that the submitted cross-chain transaction is on the relay chain through the cross-chain transaction verification algorithm. The reality of existence. Simple Payment Verification (SPV) is a data existence verification algorithm based on the Merkle tree structure. In the block body, each transaction is mounted on a leaf node of the Merkel tree. The user only needs to save the block header information of each block to complete the payment verification of a certain transaction (its essence is verification Whether the block in which a certain transaction is located is a consensus block). Based on this, in the embodiment of this case, the SPV algorithm is chosen to verify the existence authenticity of transactions on the storage relay chain. The pseudo code of the SPV-based data verification algorithm can be shown in Table 3 below:
表3基于SPV的跨链数据存在性验证算法Table 3 Cross-chain data existence verification algorithm based on SPV
节点发送跨链请求后的会接收到CCId,即CCId在Merkle二叉哈希树中以叶子节点的形式进行存储。平行链首先向中继链发送CCId,中继链通过布隆过滤器快速查询交易所在区块,中继链根据区块号返回由交易所在子树相邻叶子结点的哈希值和相邻子树的根节点哈希值组成的哈希认证路径;源链接收到哈希认证路径后根据存储的中继链区块头信息进行Merkle证明,证明成功后则表示跨链事务在中继链上存在。After the node sends a cross-chain request, it will receive the CCId, that is, the CCId is stored in the form of a leaf node in the Merkle binary hash tree. The parachain first sends the CCId to the relay chain. The relay chain quickly queries the block where the transaction is located through the Bloom filter. The relay chain returns the hash value sum of the adjacent leaf nodes of the subtree where the transaction is based on the block number. A hash authentication path composed of the hash value of the root node of the adjacent subtree; after the source link receives the hash authentication path, it performs Merkle proof based on the stored relay chain block header information. If the proof is successful, it means that the cross-chain transaction is in the relay exists on the chain.
针对现有区块链跨域访问控制方案无法满足多域环境下域间隐私性和扩展性需求,本案实施例中,通过在各安全域内部署基于属性的访问控制模型的访问控制链,将域内和域间的访问决策下放至各域内访问控制链,支持域内自主授权,实现细粒度、可追溯的访问控制,通过中继链链通各安全域内的异构访问控制链,实现跨域访问请求响应的转发与记录;设计支持跨域访问控制的智能合约,通过在域内和域间访问控制流程中引入域内策略决策合约、策略管理合约、属性权威合约、信任评估合约和域间中介合约,实现域内、域间无需第三方接入的可信跨域访问控制流程;并通过设计中继链上转发智能合约和基于SPV的跨链数据存在性算法,保证跨链的可审计性和可验证性,能够适用于多域环境下的跨域访问控制场景,可以满足多域环境下域间隐私性和扩展性需求。In view of the fact that the existing blockchain cross-domain access control scheme cannot meet the inter-domain privacy and scalability requirements in a multi-domain environment, in the embodiment of this case, an access control chain based on attribute-based access control models is deployed in each security domain. and inter-domain access decisions are delegated to the intra-domain access control chains, supporting independent authorization within the domain to achieve fine-grained and traceable access control. The heterogeneous access control chains in each security domain are linked through the relay chain to realize cross-domain access requests. Forwarding and recording of responses; designing smart contracts that support cross-domain access control, by introducing intra-domain policy decision-making contracts, policy management contracts, attribute authority contracts, trust evaluation contracts and inter-domain intermediary contracts into the intra-domain and inter-domain access control processes. Trusted cross-domain access control process without third-party access within and between domains; and by designing forwarding smart contracts on the relay chain and SPV-based cross-chain data existence algorithm to ensure cross-chain auditability and verifiability , can be applied to cross-domain access control scenarios in multi-domain environments, and can meet inter-domain privacy and scalability requirements in multi-domain environments.
除非另外具体说明,否则在这些实施例中阐述的部件和步骤的相对步骤、数字表达式和数值并不限制本发明的范围。Unless otherwise specifically stated, the relative order of components and steps, numerical expressions, and numerical values set forth in these examples do not limit the scope of the invention.
本说明书中各个实施例采用递进的方式描述,每个实施例重点说明的都是与其他实施例的不同之处,各个实施例之间相同相似部分互相参见即可。对于实施例公开的系统而言,由于其与实施例公开的方法相对应,所以描述的比较简单,相关之处参见方法部分说明即可。Each embodiment in this specification is described in a progressive manner. Each embodiment focuses on its differences from other embodiments. The same and similar parts between the various embodiments can be referred to each other. As for the system disclosed in the embodiment, since it corresponds to the method disclosed in the embodiment, the description is relatively simple. For relevant details, please refer to the description in the method section.
结合本文中所公开的实施例描述的各实例的单元及方法步骤,能够以电子硬件、计算机软件或者二者的结合来实现,为了清楚地说明硬件和软件的可互换性,在上述说明中已按照功能一般性地描述了各示例的组成及步骤。这些功能是以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。本领域普通技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不认为超出本发明的范围。The units and method steps of each example described in conjunction with the embodiments disclosed herein can be implemented with electronic hardware, computer software, or a combination of both. In order to clearly illustrate the interchangeability of hardware and software, in the above description The composition and steps of each example have been generally described in terms of function. Whether these functions are performed in hardware or software depends on the specific application and design constraints of the technical solution. Persons of ordinary skill in the art may use different methods to implement the described functions for each specific application, but such implementations are not considered to be beyond the scope of the present invention.
本领域普通技术人员可以理解上述方法中的全部或部分步骤可通过程序来指令相关硬件完成,所述程序可以存储于计算机可读存储介质中,如:只读存储器、磁盘或光盘等。可选地,上述实施例的全部或部分步骤也可以使用一个或多个集成电路来实现,相应地,上述实施例中的各模块/单元可以采用硬件的形式实现,也可以采用软件功能模块的形式实现。本发明不限制于任何特定形式的硬件和软件的结合。Those of ordinary skill in the art can understand that all or part of the steps in the above method can be completed by instructing relevant hardware through a program. The program can be stored in a computer-readable storage medium, such as a read-only memory, a magnetic disk or an optical disk. Optionally, all or part of the steps of the above embodiments can also be implemented using one or more integrated circuits. Correspondingly, each module/unit in the above embodiments can be implemented in the form of hardware, or can also be implemented in the form of software function modules. Form realization. The invention is not limited to any particular form of combination of hardware and software.
最后应说明的是:以上所述实施例,仅为本发明的具体实施方式,用以说明本发明的技术方案,而非对其限制,本发明的保护范围并不局限于此,尽管参照前述实施例对本发明进行了详细的说明,本领域的普通技术人员应当理解:任何熟悉本技术领域的技术人员在本发明揭露的技术范围内,其依然可以对前述实施例所记载的技术方案进行修改或可轻易想到变化,或者对其中部分技术特征进行等同替换;而这些修改、变化或者替换,并不使相应技术方案的本质脱离本发明实施例技术方案的精神和范围,都应涵盖在本发明的保护范围之内。因此,本发明的保护范围应所述以权利要求的保护范围为准。Finally, it should be noted that the above-mentioned embodiments are only specific implementations of the present invention and are used to illustrate the technical solution of the present invention rather than to limit it. The protection scope of the present invention is not limited thereto. Although refer to the foregoing The embodiments illustrate the present invention in detail. Those of ordinary skill in the art should understand that any person familiar with the technical field can still modify the technical solutions recorded in the foregoing embodiments within the technical scope disclosed by the present invention. It may be easy to think of changes, or equivalent substitutions of some of the technical features; and these modifications, changes or substitutions do not cause the essence of the corresponding technical solutions to deviate from the spirit and scope of the technical solutions of the embodiments of the present invention, and they should all be included in the present invention. within the scope of protection. Therefore, the protection scope of the present invention should be determined by the protection scope of the claims.
Claims (10)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311536545.XA CN117424747A (en) | 2023-11-17 | 2023-11-17 | Cross-domain access control method and system based on multi-block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311536545.XA CN117424747A (en) | 2023-11-17 | 2023-11-17 | Cross-domain access control method and system based on multi-block chain |
Publications (1)
Publication Number | Publication Date |
---|---|
CN117424747A true CN117424747A (en) | 2024-01-19 |
Family
ID=89522948
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202311536545.XA Pending CN117424747A (en) | 2023-11-17 | 2023-11-17 | Cross-domain access control method and system based on multi-block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN117424747A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117708181A (en) * | 2024-02-05 | 2024-03-15 | 人民法院信息技术服务中心 | Heterogeneous data cross-link query method, device, system and equipment for private link |
CN119004427A (en) * | 2024-10-24 | 2024-11-22 | 下一代互联网关键技术和评测北京市工程研究中心有限公司 | Data space infrastructure-oriented data use control negotiation method |
-
2023
- 2023-11-17 CN CN202311536545.XA patent/CN117424747A/en active Pending
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117708181A (en) * | 2024-02-05 | 2024-03-15 | 人民法院信息技术服务中心 | Heterogeneous data cross-link query method, device, system and equipment for private link |
CN117708181B (en) * | 2024-02-05 | 2024-04-30 | 人民法院信息技术服务中心 | Heterogeneous data cross-link query method, device, system and equipment for private link |
CN119004427A (en) * | 2024-10-24 | 2024-11-22 | 下一代互联网关键技术和评测北京市工程研究中心有限公司 | Data space infrastructure-oriented data use control negotiation method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11995618B2 (en) | Blockchain network interaction controller | |
Liu et al. | Fabric-IoT: A blockchain-based access control system in IoT | |
CN111488595B (en) | Method for realizing authority control and related equipment | |
CN117424747A (en) | Cross-domain access control method and system based on multi-block chain | |
US20240259249A1 (en) | Supporting graphql based queries on yang based configuration data models | |
US9667654B2 (en) | Policy directed security-centric model driven architecture to secure client and cloud hosted web service enabled processes | |
CN101043478B (en) | Service gateway and method for implementing secure message processing | |
Falazi et al. | Smart contract invocation protocol (SCIP): A protocol for the uniform integration of heterogeneous blockchain smart contracts | |
Bush et al. | Active networks and active network management: a proactive management framework | |
CN110351381A (en) | A kind of Distributed data share method that Internet of Things based on block chain is credible | |
CN113542117B (en) | Internet of things equipment resource access control method based on hierarchical block chain | |
US8365298B2 (en) | Comprehensive security architecture for dynamic, web service based virtual organizations | |
US7610332B2 (en) | Overlay networks | |
CN113271311B (en) | A digital identity management method and system in a cross-chain network | |
CN111950019A (en) | Block chain-based Internet of things access control system and method | |
CN101594386B (en) | Method and device for constructing reliable virtual organization based on distributed strategy verification | |
CN118041667A (en) | A blockchain-based IoT attribute access control system and method in an edge computing environment | |
CN103957174A (en) | Method for semantic switch loose coupling system to process information | |
CN119254404A (en) | Block chain-based data security circulation method in hierarchical novel cloud manufacturing application scene | |
CN114640473A (en) | Cross-data center access control method and system based on block chain and ABAC | |
CN116601925A (en) | System and method for data communication | |
CN103957173A (en) | Semantic switch | |
Xi et al. | Decentralized access control for secure microservices cooperation with blockchain | |
US12105813B2 (en) | Secure on-premises to cloud connector framework | |
Zangaraki et al. | SecShield: An IoT access control framework with edge caching using software defined network |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information | ||
CB02 | Change of applicant information |
Country or region after: China Address after: 450000 Science Avenue 62, Zhengzhou High-tech Zone, Henan Province Applicant after: Information Engineering University of the Chinese People's Liberation Army Cyberspace Force Address before: No. 62 Science Avenue, High tech Zone, Zhengzhou City, Henan Province Applicant before: Information Engineering University of Strategic Support Force,PLA Country or region before: China |