Journal of Frontiers of Computer Science and Technology ›› 2025, Vol. 19 ›› Issue (8): 1981-2000.DOI: 10.3778/j.issn.1673-9418.2410079

• Frontiers·Surveys • Previous Articles     Next Articles

Review of Access Control Research for Blockchain Data Sharing

FENG Xinhao, LI Leixiao, LIU Dongjiang, DU Jinze, LIN Hao   

  1. 1. College of Data Science and Application, Inner Mongolia University of Technology, Hohhot 010080, China
    2. Inner Mongolia Key Laboratory of Beijiang Cyberspace Security, Hohhot 010080, China
    3. Inner Mongolia Autonomous Region Software Service Engineering Technology Research Center Based on Big Data, Hohhot 010080, China
    4. School of Computer Science and Engineering, Tianjin University of Technology, Tianjin 300384, China
  • Online:2025-08-01 Published:2025-07-31

面向区块链数据共享的访问控制研究综述

冯鑫昊,李雷孝,刘东江,杜金泽,林浩   

  1. 1. 内蒙古工业大学 数据科学与应用学院,呼和浩特 010080 
    2. 内蒙古自治区北疆网络空间安全重点实验室,呼和浩特 010080
    3. 内蒙古自治区基于大数据的软件服务工程技术研究中心,呼和浩特 010080
    4. 天津理工大学 计算机科学与工程学院,天津 300384

Abstract: With the advent of the digital age, data sharing plays a crucial role in promoting social and economic development as well as technological progress. How to effectively control access to the data sharing process while ensuring data security and privacy is an urgent problem to be solved. Firstly, the applications of access control technology in the existing blockchain projects are presented. Secondly, the research issues of access control for blockchain data sharing are formally defined. Then, the data sharing process is divided into the preparation stage, the data upload stage, and the authorization and access stage. In these three stages, the research status of blockchain data sharing access control technology is systematically organized and the advantages and limitations of related technologies are summarized. Among them, the attribute encryption, searchable encryption, homomorphic encryption, and proxy re-encryption technologies in the data upload stage of blockchain access control are analyzed in detail. Finally, the deficiencies in the existing research on blockchain data sharing access control are summarized, including the insufficiency of the dynamicity of access control policies, the difficulty in converting legal provisions into policies, the poor security of smart contracts, the insufficiently lightweight encryption algorithms, and the coarse data classification granularity. Prospects are proposed from five aspects: dynamic policy generation based on large language models, automatic conversion of legal policies using natural language processing technology, establishment of security standards for smart contracts, development of lightweight encryption algorithms, and realization of automatic data classification with the aid of machine learning technology.

Key words: blockchain, smart contract, data sharing, access control

摘要: 随着数字化时代的到来,数据共享在推动社会经济发展和技术进步方面发挥着重要作用。如何在保障数据安全和隐私的前提下,有效地对数据共享过程进行访问控制,是一个亟待解决的问题。介绍了现有区块链项目中访问控制技术的应用情况。对区块链数据共享的访问控制研究问题进行了形式化定义。将数据共享过程划分为准备阶段、数据上传阶段、授权与访问阶段,在这三个阶段系统整理了区块链数据共享访问控制技术的研究现状并总结了相关技术的优点和局限性,其中着重分析了数据上传阶段中区块链访问控制的属性加密、可搜索加密、同态加密和代理重加密技术。总结了现有区块链数据共享访问控制研究中存在的不足,包括访问控制策略动态性不足、法律条款转化为策略困难、智能合约安全性欠佳、加密算法不够轻量级以及数据分级粒度较粗等问题,并从基于大语言模型的动态策略生成、利用自然语言处理技术实现法律策略自动转化、建立智能合约安全规范标准、开发轻量级加密算法,以及借助机器学习技术实现数据自动分级五个方面提出了展望。

关键词: 区块链, 智能合约, 数据共享, 访问控制