2 BACKGROUND AND DESIGN
REQUIREMENTS
In this section, we first introduce the blockchain
technology (subsection 2.1). Then, we detail related
work for data protection (subsection 2.2) and high-
light the design and security requirements (subsection
2.3).
2.1 Blockchain Technology
Bitcoin appeared as an innovative technology ena-
bling users to directly transfer cryptocurrencies in be-
tween with no intermediaries. It is considered as the
first decentralized cryptocurrency transfer system. It
relies on cryptographic proofs of work, digital sig-
natures, and peer-to-peer networking to provide a
distributed ledger containing transactions, and refer-
red to as a blockchain (Crosby et al., 2016), (Swan,
2015). Two approaches, known as permissionless
blockchains, have emerged to implement decentrali-
zed services and applications. The first approach re-
lies on the existing Bitcoin blockchain and builds a
new framework on top of it. The main advantage of
this approach is that the Bitcoin blockchain already
exists and is adopted by many users, which makes
it more secure, transparent and resilient. The dis-
advantage is that blocks are mined every 10 minu-
tes, and the Bitcoin scripting language is not Turing-
complete (Swan, 2015). The second approach is to
build an alternative blockchain with all the desired fe-
atures, which promises full decentralization, such as
Ethereum
2
. Additionally to functions already suppor-
ted by other public blockchain platforms such as bit-
coin, e.g. mining of the digital currencies and tran-
saction management, Ethereum also provides a con-
tract functionality known as smart contract.
Transactions submitted to the Ethereum environment
are organized into blocks and chained to each other
based on a cryptographic hash function, initially re-
lying on a pre-computed genesis block. Once a block
is added to the blockchain, it cannot be modified or
removed for two reasons: first, a block modification
would lead to wrong verification of the chain of hash
values, and second, the block modification would re-
quire intensive efforts to change every replicate of the
blockchain supposed to be hosted on a large number
of independent nodes. The verification and addition
of new blocks to the blockchain is based on the mining
process, which relies on the proof of work feature. In-
deed, miners have to solve a cryptographic challenge
and winners are rewarded. The main idea behind the
2
https://www.ethereum.org/
cryptographic challenge is the regulation of the new
block creation operation.
2.2 Blockchain Related Work for Data
Protection
The nature of the blockchain is particularly suitable
for data accounting and auditing features. It has at-
tracted interest of the research community due to its
shared and fault-tolerance database. Indeed, several
constructions have been introduced to ensure prove-
nance tracking (Fu et al., 2017), (Ouaddah et al.,
2016), (Zyskind et al., 2015), (Kaaniche and Laurent,
2017a).
In (Zyskind et al., 2015), Zyskind et al. presen-
ted a personal data management system that combines
blockchain, considered as an access control modera-
tor, and off-blockchain storage solution. Designed as
unique owners of their personal data, clients are aware
of data collected about them by service providers and
how they are used. However, the (Zyskind et al.,
2015) proposal permits to only define simple per-
mit/deny access policies through a white/blacklisting.
Afterwards, Ouaddah et al. proposed, in (Ouaddah
et al., 2016), a blockchain based access control frame-
work for IoT applications, referred to as FairAccess.
Their proposal relies on the blockchain-based bitcoin
technology as an access moderator that permits to
distribute authorization tokens, where each authori-
zation token represents the data owner signature of
the granted access right. In (Fu et al., 2017), An-
min et al. introduced a blockchain-based auditing sy-
stem for shared data in cloud applications. In order
to mitigate the power abuse of single tracing authori-
ties, (Fu et al., 2017) presents a threshold approach,
where at least t entities have to collaborate to reco-
ver the identity of a malicious user, thus ensuring the
non-frameability of users. Based on a blockchain ar-
chitecture, the proposed construction enables group
users to trace data changes and recover latest correct
data blocks when current data are damaged.
Recently, Neisse et al. discussed design require-
ments of blockchain-based solutions for data prove-
nance tracking (Neisse et al., 2017), namely client-
centric, server-centric and data-centric approaches.
The authors also presented an evaluation of their im-
plementation results, in order to give a comprehensive
overview of different defined approaches. Later, in
(Kaaniche and Laurent, 2017a), Kaaniche and Lau-
rent presented a blockchain-based platform for data
usage auditing while preserving personal data secrecy
and ensuring data availability, relying on the use of
the hierarchical ID-based cryptographic technique.
A Blockchain based Access Control Scheme
169