Next Article in Journal
FR3 Path Loss in Outdoor Corridors: Physics-Guided Two-Ray Residual Learning
Previous Article in Journal
Tensorized Multi-View Subspace Clustering via Tensor Nuclear Norm and Block Diagonal Representation
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Blockchain-Enabled Decentralized Autonomous Access Control Scheme for Data Sharing

1
Academy of Cyberspace Security, Zhongyuan University of Technology, Zhengzhou 450007, China
2
Academy of Cyberspace Security, Guangzhou University, Guangzhou 510006, China
*
Author to whom correspondence should be addressed.
Mathematics 2025, 13(17), 2712; https://doi.org/10.3390/math13172712
Submission received: 17 July 2025 / Revised: 21 August 2025 / Accepted: 21 August 2025 / Published: 22 August 2025
(This article belongs to the Special Issue Advances in Blockchain and Intelligent Computing)

Abstract

With the rapid development of artificial intelligence, multi-party collaboration based on data sharing has become an inevitable trend. However, in practical applications, shared data often originate from multiple providers. Therefore, achieving secure and efficient data sharing while protecting the rights and interests of each data provider is a key challenge currently faced. Existing access control methods have the following shortcomings in multi-owner data scenarios. Most methods rely on centralized management, which makes it difficult to solve conflicts caused by inconsistent permission policies among multiple owners. There are problems such as poor consistency of permission management, low security, and lack of protection for the autonomous will of each owner. To this end, our paper proposes a fine-grained decentralized autonomous access control scheme based on blockchain, which includes three core stages: formulation, deployment, and execution of access control policies. In the access control policy formulation stage, the scheme constructs a multi-owner data policy matrix and introduces a benefit function based on a Stackelberg game to balance conflicting attributes to form a unified access policy. Secondly, in the access control policy deployment stage based on smart contracts, all data owners vote on the access control policy by calculating their own benefits to achieve a consensus on joint decision-making on the policy. Finally, in the policy execution and joint authorization phase, a decentralized authorization method based on threshold passwords is used to distribute access keys to each owner, ensuring that data is only granted after receiving authorization from a sufficient number of owners, thereby ensuring the ultimate control of each owner and the fine-grained access control. Finally, we verified the feasibility of the solution through case analysis and experiments.

1. Introduction

The rapid advancement in information technology and networking has catalyzed explosive growth in data generation. The extensive adoption of cloud computing and big data technologies further enhances data sharing capabilities [1,2]. In practical applications, these shared data are typically generated not by a single entity but through collaboration among multiple participants. To fully harness the potential of such data, it is typically necessary to aggregate, share, and circulate data from multiple participating entities. The aggregated data is referred to as multi-owner data, and in this paper the users who contribute the data are called data owners. However, data is often processed and managed by third-party institutions, making it difficult to protect the rights and interests of each contributor in multi-owner data. This results in a low willingness among data owners to contribute data, thereby increasing the difficulty of data aggregation and sharing.
Access control constitutes a vital mechanism for securing data. By setting the access control policy, the authorizer can limit the access ability and scope of the requester and control its access behavior and operation. Access control mainly includes mandatory access control, discretionary access control, role-based access control, and attribute-based access control [3,4,5]. Mandatory access control (MAC) determines access rights based on predefined security policies and data security levels. In this model, the access control policy is enforced by the system, which has the merit of high security, but the user or data owner change the permissions, leading to a lack of flexibility [6]. In discretionary access control (DAC), the owner of a resource or data typically sets an access control list; this list determines which users are allowed to access the owner’s resources. The advantage is that the power of the resource owner is fully considered, but because each resource owner can set permissions independently, it may lead to confusion and inconsistency in rights management, which in turn leads to security risks. In addition, in complex scenarios, especially in distributed scenarios such as multi-node collaboration, it is difficult for DAC to provide sufficient flexibility and fine-grained access control [7]. Role-based access control (RBAC) assigns roles to users, each of which has a predefined set of permissions. Its merits are that it is simple and easy to manage, but the shortcomings are poor flexibility and low security [8]. Attribute-based access control (ABAC) is a dynamic fine-grained access control scheme that determines whether users are allowed to access by defining access policies for multiple attributes such as users, environment, and resources. It has the merits of high flexibility, good dynamics, and fine-grained access control. It is the most commonly used method in recent years, especially in centralized access control environments such as cloud computing. However, ABAC is difficult to apply in distributed environments, particularly when multiple data owners define conflicting access control policies [9].
In addition to the mainstream access control methods mentioned above, there are also dynamic access control methods based on risk or trust evaluation [10,11], which are typically tailored to specific application requirements. Such methods have strong dynamic adaptability but poor versatility. Therefore, they are not as widely used as the above four access control methods (DAC, MAC, RBAC, and ABAC) [12].
With the increasing demand for multi-party collaboration, research on access control methods such as multi-node and multi-source data sharing is still insufficient. Regarding how to protect the access control rights of each data contributor and ensure the consistency and security of access control management, there is still a lack of effective solutions.
To address the above challenges, this paper proposes a decentralized autonomous access control scheme based on blockchain. The scheme effectively integrates the advantages of both DAC and ABAC, ensuring that the access control rights of all data owners from multiple sources are protected. At the same time, it enables consistency in access permissions for multi-owner data, supports fine-grained access control, and enhances the security of traditional DAC mechanisms.
The main contributions of our paper are as follows:
  • We construct a decentralized autonomous access control model based on blockchain. This model includes three stages: policy formulation, policy voting, and policy execution. It allows multiple resource owners to define attribute-based access control policies according to their own needs. This enables the joint formulation, execution, and authorization of decentralized policies, effectively addressing the security shortcomings of traditional centralized access control.
  • Aiming at the special needs of multi-owner access control scenarios, an access control policy formulation method that balances conflicting attributes is designed. First, this method constructs a policy matrix for multi-owner access control attributes. Then, based on the owners’ preferences and mutual influence regarding the conflicting attributes, a benefit function is introduced to balance these conflicts. Thus, a fine-grained access control policy that takes into account multi-owner data requirements is obtained.
  • An access control policy consensus method based on a Stackelberg game is proposed. This method constructs a leader and follower model for the access control policy after attribute conflict balance, in which the followers make voting decisions according to their own calculated benefits. When the benefits exceed the set threshold, they vote for it. Through the majority voting mechanism, the consistency of multi-owner data access control policy management is realized.
  • We design a decentralized joint authorization mechanism based on blockchain and threshold cryptography. Each data owner provides an access control decryption key share according to the results of attribute-based access control smart contract running locally. On the basis of guaranteeing the owner’s autonomous access control right, the security of autonomous access control is further enhanced.

2. Related Work

As the cornerstone of information security, access control guarantees the use of system resources within the scope of authorization through a permission constraint mechanism. In the traditional model, discretionary access control and mandatory access control constitute two basic models, which adapt to different security requirements scenarios. Discretionary access control realizes object access restriction based on subject identity recognition, and its core mechanism is derived from the access matrix model of a time-sharing system [13]. Typical implementations, such as the UNIX 9-bit permission model and ACL-based control tables, enable flexible management through owner-defined authorizations. However, DAC has the inherent defects of decentralized management: the user can arbitrarily pass permissions, resulting in permission diffusion (such as sending sensitive files by mail) and a lack of a unified security baseline. This limitation gives rise to a more stringent access control paradigm—mandatory access control. Aiming at the risk of privilege abuse of DAC, mandatory access control achieves rigid constraints through system-level security attribute binding. MAC adopts the dynamic matching mechanism between the subject security label and the object security label and strictly follows the confidentiality rules of ‘no reading, no writing’. With the complexity of application scenarios, the MAC model continues to evolve into a multi-dimensional expansion. Ray et al. [14] proposed a location-enhanced MAC architecture, which associates the location with the security level and controls the disclosure of the location information of the subject and the object to ensure that only people with appropriate security permissions can enter a specific location and prevent illegal information flow. On this basis, McCune et al. [15] focused on the security requirements of a distributed computing environment, integrated virtualization technology and trusted computing technology, and used a virtual machine monitor and MAC virtual machine to control communication, combined with a secure MAC tag tunnel and remote attestation technology, to ensure that cross-machine communication and resource sharing conform to MAC policy so as to realize mandatory access control in a distributed environment. At the same time, in view of the security challenges of mobile intelligent terminals, Bugiel et al. [16] proposed a hierarchical reinforcement policy. On the basis of inheriting the mandatory access control of the SE Android kernel layer, the type enforcement mechanism of the middleware layer is designed, and the type enforcement mechanism is extended in the middleware layer. With context-aware dynamic policy switching, a fine-grained access control system covering Android dual software layers is constructed.
However, most existing access control policies are formulated for individual entities and fail to account for the heterogeneous requirements of different data owners in multi-owner scenarios. For example, Ghafoorian et al. [17] proposed a new RBAC model based on trust and reputation in their research, which aims to effectively solve the security threats related to the trust-based RBAC model and provide scalability within a reasonable execution time. By analyzing the distributed data distribution service (DDS) security model and determining the integration point of attribute-based access control (ABAC), Kim et al. [18] proposed a new method to improve the authorization of the DDS security model by using ABAC. The ABAC entity is merged into the security model, which can control the access in DDS more flexibly according to the entity attributes and behaviors. Wei et al. [19] proposed an open, trusted, and decentralized access control mechanism based on ABE to address the challenge of privilege management in software-defined networks. The mechanism supports effective authorization of applications in heterogeneous and untrusted domains and records all interactions between applications and resources for further billing, analysis, and auditing. Ding et al. [3] used sharding technology to distribute the attribute management and access control processes on multiple shards based on the access control system of the sharded blockchain, which greatly improved system efficiency and security. However, the access policies of the above schemes are formulated by a single party, and how to protect the rights of all parties participating in access control in the case of multi-party cooperation is not considered.
Aiming at the access control problem under multi-party collaboration, P. Ilia et al. [20] designed a collaborative multi-party access control model based on the social relationship of users, allowing all relevant users to participate in the formulation of access control policies and setting trusted friends to be responsible for the implementation of policies. S.V. et al. [21] proposed an improved multi-party access control mechanism, which can include user groups or multiple users participating in the formulation of sharing policies, in which access rights can also be granted to multiple users. The hybrid filtering mechanism only recommends the corresponding content of the sharing policy to the user, thereby enhancing the security of the data. Miao et al. [22] designed a keyword search scheme based on CP-ABE technology, in which data is jointly managed by multiple data owners, and a user can only retrieve data by obtaining the authorization key of all data owners. In order to ensure the sustainability of multi-user-centric access control in the cloud environment, Davy et al. [23] proposed a policy-based multi-party access control solution, which delegates access control decisions to multiple stakeholders in cloud and edge microservices to ensure dynamic fine-grained access control. Hongxin et al. [24] proposed a method to identify privacy conflicts in multi-user data sharing so that multiple owners of data can trade off between privacy protection and data sharing by quantifying the degree of sharing, so as to support data owners’ privacy control in online social networks (OSNs). The aforementioned schemes address specific problems but suffer from limited generalizability and rely on centralized architectures, making them unsuitable for distributed collaboration environments.
Blockchain has the characteristics of decentralization, transparency, and non-tampering. Integrating blockchain with access control reduces reliance on third-party authorities and ensures the immutability of access policies and logs [25]. In addition, smart contracts can be used to realize the automatic and strict implementation of access control policies in the chain [26]. At present, researchers have proposed to use blockchain to implement access control [27,28,29] to ensure data security sharing in cloud computing, big data, and other scenarios. For example, Liu et al. [30] proposed a privacy protection scheme based on CP-ABE. The scheme stores ciphertext in the cloud, indexes on the consortium chain, and keyword searches on the chain to ensure the accuracy of the search results. Pournaghi et al. [31] focused on the privacy and security issues of electronic medical record (EMR) data and proposed a secure on-chain medical data sharing solution with the help of private blockchain and attribute-based encryption to ensure the privacy protection of patient data and support fine-grained access control. In addition, there is also some work on smart contracts in the blockchain to achieve the correct automatic execution of access control policies in the chain. Chen et al. [32] proposed an EMR system based on consortium blockchain and proxy re-encryption. By connecting electronic devices to the blockchain network, the security of data access is ensured by the automatic execution of blockchain codes. Although the above scheme makes good use of the characteristics of blockchain decentralization to make up for the centralization problem, it does not consider the access control problem under multi-party cooperation.
To this end, our paper proposes a fine-grained autonomous access control scheme based on blockchain for the autonomous access control requirements of each collaborator for the contributed data and other resources in a distributed environment or multi-party collaboration. The scheme fully guarantees the autonomous access control power of each owner and realizes attribute-based fine-grained access control in combination with smart contracts, which solves the problems of poor consistency of authority management, lack of fine-grained control, and low security in traditional autonomous access control methods.

3. Scheme Model

The proposed scheme consists of three components: users, data providers, and the blockchain. The data resource provider is both the data owner and the blockchain node. Based on their respective data contributions, data owners are categorized into one policy leader and multiple policy followers. The followers who agree to deploy and execute the access control policy are designated as executors.
The scheme includes three stages, access control policy formulation, policy deployment voting, and policy execution and joint authorization, as shown in Figure 1. In the stage of access control policy formulation, the access control policy is proposed by each data owner, and the leader constructs a multi-owner and multi-attribute policy matrix for policy fusion calculation to obtain a unified access control policy. During the deployment phase, each data owner evaluates the proposed policy based on a calculated benefit function and participates in a collective voting process. If the vote exceeds the 4 / 5 threshold, the access control policy is approved; otherwise the access control policy is abandoned and re-formulated from the first stage. The adopted access control policy will be written as a smart contract and deployed on the master node of the follower data that agrees to the policy. These followers are called executors. The leader then generates the access key K of the shared data and encrypts the shared data under the chain. K is used to generate individual key shares K i , which are then distributed to each follower. In the access control policy execution and joint authorization phase, the attribute-based access control smart contract is used to ensure fine-grained access, and the threshold password is used to achieve strict and secure access control. After each executor executes the smart contract, it sends its own key share to the user, which indicates the recognition of the access. After collecting the key share that exceeds the threshold, the user can restore the access control key so as to obtain data access authority and realize the joint authorization of each data owner for resource access. In the stage of access control execution, the leader, as the leader of access control policy formulation and the generator of the access control key, does not participate in access control execution and final decision-making. All key operations during the access process are recorded on the blockchain. Owing to the transparent nature of blockchain, any malicious behavior or key leakage by the leader can be easily traced and attributed. In summary, our scheme realizes decentralized, fine-grained, and autonomous access control through active participation of all data contributors.

3.1. Fine-Grained and Autonomous Access Control Policy Formulation Under Multi-Owner Data

During the policy formulation stage, each data owner defines their access control policy based on their individual requirements and preferences. On this basis, the preliminary integration of the policy is carried out, and the conflicting policy items are deleted. Based on the Stackelberg game, the conflict resolution is completed, and the fine-grained autonomous access control policy that takes into account all the owner’s power is generated. To ensure clarity during the mathematical description, we first summarize the key symbols used throughout this section in Table 1.

3.1.1. Access Policy Preliminary Fusion Method

The set of n data owners is denoted as O n = { O 1 , O 2 , , O n } . Each data owner O i first formulates a data access policy based on their individual preferences. These policies are then pairwise merged using a preliminary fusion algorithm.
First, for the n contributors of a piece of data, we divide the access control policy into m attributes, and each owner formulates an access control policy. For example, the data owner O i formulates an access policy s t r a i = { a t t i 1 , a t t i 2 , , a t t i m } , where i ( 1 , n ) and if a t t i m is null, it means it has a null value. Finally, the access control policy set S T R A = { s t r a 1 , s t r a 2 , , s t r a n } T is formed, and its matrix representation is shown in Table 2.
The value set A t t i 1 of the j th attribute can be expressed as A t t j = ( a t t 1 j , a t t 2 j , , a t t n j ) T , and all the attribute values in the pair are judged as follows:
  • If a t t i j = a t t i + 1 j , then retain a t t i j , a t t i + 1 j = 0 ;
  • If a t t i j a t t i + 1 j , then a t t i + 1 j = 0 .
Perform the above operation for each column in the above access policy set matrix until the column vector fusion of all attributes is completed. Collate conflict policies to form a conflict policy set C o n f = ( b 1 , b 2 , , b r ) , and execute the policy generation algorithm, where b i is the i th policy and r is the number of policies that still have conflicts.

3.1.2. Policy Generation for Fine-Grained and Self-Governed Access Control Under Multi-Owner Data

In the scheme proposed in this paper, the policy leader and the policy follower are the two entities participating in the game. The policy conflict game models a sequential strategic interaction, where both the policy leader and followers iteratively adjust their preferences based on mutual influence and expected payoffs. In the process of the game, both sides show rational behavior, which is described by the income function, and the optimal policy is determined by multiple rounds of the game.
As shown in Table 3, x l e ( b j ) , x f e ( b j ) are the initial preference values of the policy leader and the policy follower set for the conflict policy b i , respectively, where the preference values can be divided into high, medium, and low according to their values. Using the preference value matrix, policy leaders and followers engage in conflict resolution games to determine mutually acceptable policies; p l e ( b j ) , p f e ( b j ) are the preference values of policy leaders and policy followers for modifying the conflict policy after considering each other’s decision-making. x i ( b j ) p i ( b j ) is the direct benefit of the choice of conflict policy; 1 2 ( p i ( b j ) ) 2 + α i j p i ( b j ) x j ( b j ) refers to the income generated by the choice made by the game party under the influence of other game parties in the process of Stackelberg’s strategic game. α i j is the influence coefficient of user i by j. In this scheme, the influence coefficient is determined by the data share of the game party.
Let M i denote the amount of information contributed by data owner O i , which is used to compute the influence coefficients α i j in the income functions. First, we determine the roles of leader and follower in the conflict policy fusion process based on the value of M i for each owner. Then, the influence coefficient between data owners is calculated based on their respective shares of information, as shown in Equation (1). Specifically, the influence coefficient α i j , indicating the influence of owner O j on owner O i , is computed as follows:
α i j = M i i = 1 h M i
The value of α i j falls within the range [0,1].
For the conflict resolution set C o n f = ( b 1 , b 2 , , b r ) , the policy leader and follower initially determine their preference values for the conflicting policies. Then, for each conflicting attribute l ( 1 , , r ) , a conflict matrix b l = ( b 1 l b r l ) T is constructed. Let A t t m l denote the lth conflict attribute and let x t ( b i l ) represent data owner O i ’s preference evaluation score for attribute b i , where t n . Then, the income function of the policy leader for the conflicting attribute b i can be expressed as follows:
p a y l e = x l e ( b i ) p l e ( b i ) 1 2 ( p l e ( b i ) ) 2 + f 1 α l e f e p l e ( b i ) p f e ( b i )
The policy follower set fe adjusts its own preference scores for the conflicting policy b i based on the leader’s willingness value p l e ( b i ) . The income function for the follower with respect to the conflicting attribute b i can be expressed as follows:
p a y f e = x f e ( b i ) p f e ( b i ) 1 2 ( p f e ( b i ) ) 2 + α f e l e p f e ( b i ) p l e ( b i )
The objective of both the policy leader and the policy follower in the conflict resolution game is to maximize their respective income functions. This requires computing the partial derivative of the follower’s income function with respect to its preference score and setting the derivative to zero. By solving this condition, the optimal preference score of the follower—under the influence of the leader—can be derived. This yields the follower’s best reaction function, which determines the preference score selected at the equilibrium of the game. The detailed derivation is shown in Equations (4)–(6).
The derivation of the objective function of the policy follower can be obtained:
p a y f e p f e ( b i ) = x f e ( b i ) p f e ( b i ) + α f e l e p l e ( b i )
Let it be equal to 0:
p f e ( b i ) = x f e ( b i ) + α f e l e p l e ( b i )
This represents the follower’s reaction function, indicating the condition under which the follower’s income is maximized. After substituting the follower’s reaction function into the leader’s preference payoff function, it can be seen that for the conflict attribute b i , the leader’s partial praise at the maximum preference payoff is
p l ( b i ) = x l e ( b i ) + f e l e α f e l e x j ( b i ) ( 1 2 ( f e l e α l e f e ) α f e l e )
For the conflict policy of a certain attribute, the leader and the follower play a game until the policy corresponding to the maximum value of each owner’s preference score is the same, and the game ends and the conflict resolution is completed.

3.1.3. Case Analysis of Policy Fusion

In the field of scientific research data sharing, the application example of a multi-owner data self-sovereign access control scheme (MMD-SSAC) involves the sharing of team research results. It is assumed that three different research teams (Team 1, Team 2, and Team 3) participate in a project together, and they jointly generate an important scientific research data set. The policies include profession, professional title, and time, which are represented by A, B, and C, respectively. A = { A 1 ; A 2 ; A 3 } , where A1 = bioinformatics, A2 = biomedical engineering, and A3 = pharmaceutical chemistry; B = { B 1 ; B 2 ; B 3 } , where B1 = postgraduate, B2 = doctoral, and B3 = professor; and C = { C 1 ; C 2 } , where C1 = before 12:00 and C2 = before 14:00. In order to protect research results and ensure data security, each research team has developed attribute-based access policies for this data:
  • Team 1: For graduate students of A1, access is granted at C1 on weekdays. Only researchers who meet the professional background of A1 and are graduate students can view and use data during this period.
  • Team 2: Only those who meet (A2, B2, C1) can obtain and analyze this data.
  • Team 3: For researchers majoring in medicinal chemistry, the policy is more stringent, allowing only people who meet B3 and C2 to access data.
Therefore, the access control policy sets generated by Team 1, Team 2, and Team 3 are straA = { A 1 , B 1 & B 2 , C 1 } , straB = { A 2 , B 2 , C 1 } , and straC = { A 3 , B 3 , C 2 } , respectively.
First, the access control policy sets of Team 1, Team 2, and Team 3 are preliminarily fused. For attribute A, since A 1 A 2 A 3 , these three policy values conflict and are thus placed into the conflict set A t t 1 , denoted as Att 1 = { A 1 , A 2 , A 3 } . For attribute B, since B 2 B , but B 2 B 3 , B2 and B3 are added to the conflict set Att 2 = { 0 , B 2 , B 3 } . For attribute C, since C 1 = C 1 , but C 2 C 1 , the attribute values are not considered conflicting. Thus, Att 3 = { 0 , 0 , 0 } , and C2 is placed into the policy set s t r a T = { 0 , 0 , C 2 } .
From the above, Att 1 = { C 1 , C 2 , C 3 } , Att 2 = { 0 , B 2 , B 3 } , and Att 3 = { 0 , 0 , 0 } form a policy fusion set to perform the following policy conflict resolution algorithm.
We calculate the contributions of Team 1, Team 2, and Team 3 by Formula (1), which are 0.6 , 0.3 , and 0.1 , respectively. Therefore, Team 1 is the policy leader, and Team 2 and Team 3 are the policy followers. That is, the reaction of the policy followers Team 2 and Team 3 to the policy leader Team 1 is α 12 = 0.3 and α 13 = 0.1 . The impact of policy leader Team 1 on policy followers Team 2 and Team 3 is α 21 = α 31 = 0.6 .
For the conflict set Att 1 = { A 1 , A 2 , A 3 } of attribute A, the preference scores of Team 1, Team 2, and Team 3 are set and represented as a matrix X 1 = 0.9 0.2 0.1 0.5 0.7 0.3 0.5 0 0.7 . That is X1 (A1) = 0.9, X1 (A2) = 0.2, X1 (A3) = 0.1; x2 (A1) = 0.5, X2 (A2) = 0.7, X2 (A3) = 0.3; x3 (A1) = 0.5, X3 (A2) = 0, and X3 (A3) = 0.7.
According to the initial preference score, the leader first adjusts their own preference score and considers the preference score of the follower under their influence in the process of adjustment. After the leader adjusts their preference score, the policy follower adjusts their preference score according to the reaction function.
According to Chapter 3, when the leader’s strategic preference for b i is divided into Equation (6), the leader’s preference gain is the largest:
P1 (A1) = 2.11, P1 (A2) = 0.79, and P1 (A3) = 0.50. Then according to the leader’s preference score, substituted into the reaction function Equation (5), we can get
P2 (A1) = 1.76, P2 (A2) = 1.17, P2 (A3) = 0.60.
P3 (A1) = 1.76, P3 (A2) = 0.47, P3 (A3) = 1.00.
At this time, under the influence of the leader, the follower makes a preference score that maximizes their preference income function according to the reaction function. Comparing the preference scores of all the owners of the policy, the maximum value is A1. Similarly, the conflict set of attribute B is calculated, and finally the value of attribute B is B2.

3.2. Access Control Policy Deployment Voting Phase

After the access control policy is formulated, the policy is sent to all followers for review. In this process, the follower will evaluate the received policy through a pre-set feedback scheme based on the revenue and give feedback on whether to agree or not. If the policy does not reach 4 / 5 in the consent feedback, the leader needs to re-formulate the policy. If the policy proposed several times in a row fails to meet the standard, the resource contribution is followed, and the owner with the second resource contribution is selected to replace the current leader role, and the policy formulation process is re-established. The follower voting feedback calculation method is as follows, in which the variable parameters for calculating the income are shown in Table 4.
Assume that the policy follower agrees to policy Pd with a probability of S fe and rejects policy Pd with a probability of 1 S fe . The policy leader guarantees the safety of the policy with a probability of S le and fails to guarantee safety with a probability of 1 S le . When the follower agrees to Pd, they can obtain the corresponding revenue from the compliant policy, denoted as λ θ a . However, since agreeing to Pd ultimately involves sharing desensitized private data, there is a risk of privacy leakage. Meanwhile, data hiding also incurs a cost. Therefore, the final revenue is R + λ θ a C . Similarly, the leader receives a corresponding reward s θ b for ensuring the safety of the policy. If the follower refuses Pd while the leader chooses to leak the data, then both parties receive a one-time payoff of R. The payoff matrix is shown in Table 5.
Calculate the payoff function when the policy follower agrees with the policy Pd:
E 1 ( s f e ) = s l e ( R + λ θ a C ) + ( 1 s l e ) ( R + λ θ a C ) = R + λ θ a C
Calculate the payoff function when the policy follower rejects the policy Pd:
E 2 ( s f e ) = s l e ( R P ) + ( 1 s l e ) R = R s l e P
Calculate the average revenue function:
E ( s f e ) ¯ = s f e E 1 ( s f e ) + ( 1 s f e ) E 2 ( s f e )
Then the replication dynamic equation is
F ( s f e ) = s f e ( E 1 ( s f e ) E ( s f e ) ¯ ) = s f e ( 1 s f e ) ( λ θ a C + s l e P )
So, let λ θ a C + s l e P = 0 ; then s l e = C λ θ a P .
When the probability that the policy leader guarantees data security is greater than or equal to C λ θ a P , the policy follower will agree to the policy. If the follower’s consent feedback to the policy reaches 4 / 5 , the policy is formulated, and the follower of the policy is agreed as the execution node in the fabric to deploy the attribute-based smart contract. It is important to note that when an access control policy reaches the consensus threshold in the voting process, it is applied only to the portion of data contributed by the data owners who approved the policy. For those who voted against it, their data continue to be governed by their original access control rules. This mechanism facilitates collaborative data sharing while fully preserving each data owner’s control over their own data, thereby enhancing the system’s flexibility and inclusiveness. To provide a clearer description of the policy formulation and fallback process, we formalize the procedure as Algorithm 1. This algorithm illustrates how data owners collaboratively formulate access control policies and iteratively adjust the proposals in case consensus is not reached.
Algorithm 1 Policy formulation mechanism
Require: Data owner set O = { o 1 , o 2 , , o n } sorted by contribution weight; consensus threshold θ ; maximum retries per leader N max_retries
Ensure: Final policy P * or Failure
1:
Initialize PotentialLeaders  O
2:
while PotentialLeaders is not empty do
3:
     L  PotentialLeaders.pop_front()
4:
    for  i 1 to N max_retries  do
5:
        Each owner proposes a policy: { P 1 , , P n }
6:
         P draft FusePolicies ( L , { P 1 , , P n } )
7:
        Broadcast P draft to all owners
8:
        Collect votes { v 1 , , v n }
9:
        if  ApprovalRatio ( { v i } ) θ  then
10:
           return  P draft
11:
        end if
12:
    end for
13:
end while
14:
return Failure

3.3. Access Control Policy Execution and Joint Authorization Phase

We designed a blockchain-based data access joint authorization process. This process combines threshold cryptography technology to ensure that multiple data owners can jointly exercise access control power during the transfer and sharing of common data when the user U requests to access the data, so as to realize the access control of each data owner’s self-sovereignty, avoid the centralized control of data flow by a single subject, and ensure the decentralization and credibility of data sharing. The specific process is shown in Figure 2.

3.3.1. Distributed Joint Authorization Method Based on Threshold Cryptography

  • In the access control policy voting phase, the agreed policy follower becomes the executor of the smart contract execution node, and the attribute-based access control smart contract is deployed to reach a consensus.
  • The leader generates a symmetric key K to encrypt the shared data. Using the Shamir secret sharing scheme, the key is divided into h secret shares, with a threshold t 2 3 h (where h is the number of nodes that agree to execute the access control policy). These key shares k i are then distributed to the execution nodes (i.e., the data owners). Additionally, the leader’s behavior of distributing the key shares is recorded on the blockchain. In the event of key leakage, it is possible to trace whether the leaked key originated from the leader.
    The specific key distribution process is as shown in Algorithm 2. For the key K, take any random number a 1 , , a t 1 , and let a 0 = key ; construct l ( x ) = a 0 + a 1 x + + a k 1 x t 1 .
    Algorithm 2 Creatpolynom ( t , k e y )
        Input: Security threshold t, k e y
        Output: t–degree polynomial f ( x )
    1:
    f ( x ) a 0
    2:
    for  i = 1 to t 1  do
    3:
         a i getRandomNonZero ( )
    4:
        if  i = t 1  and  a i = 0  then
    5:
            repeat
    6:
                a i getRandomNonZero ( )
    7:
            until  a i 0
    8:
        end if
    9:
         f ( x ) f ( x ) + a i x i
    10:
    end for
    11:
    return  f ( x )
  • When user U sends an access request to the blockchain, the request is sent to all the data owners acting as the execution node. The execution node pre-executes the attribute-based access control policy smart contract. If the smart contract pre-runs to Yes, it will decide whether to return its key share during the execution phase. If it agrees to share the key share, the encrypted content of the key share is returned to the visitor U with its own private key signature. Otherwise it does not give its own key share. When U collects the key share after more than or equal to t (the threshold execution node signature), it can use the key reconstruction Algorithm 3 to restore the encryption key and obtain and decrypt the data. So far, the joint authorization of distributed autonomous access control has been completed. The key reconstruction process is shown in Algorithm 3.
    Algorithm 3 Reconstitution of key ( x i , f ( x i ) )
    Input:  x i , f ( x i ) ( 1 i t )
    Output: key
    1:
    S 0
    2:
    for  1 i t  do
    3:
         l i ( x ) 1
    4:
        for  1 j t  do
    5:
            if  j i  then
    6:
                l i ( x ) l i ( x ) · ( 0 x j ) ( x i x j )
    7:
            end if
    8:
        end for
    9:
         S S + f i ( x ) · l i ( x )
    10:
    end for
    11:
    return S

3.3.2. Attribute-Based Access Control Smart Contract

According to the algorithm in Section 3.3.1 above, three smart contracts, PIP, PAP, and PDP, are formulated. PIP, as an attribute data source, is responsible for collecting and managing the attribute information of the access control policy. PAP is the policy definition and publishing center, and encodes the policy as an executable contract rule. PDP is the implementation decision engine. When PDP accepts the access request, it integrates the attributes provided by PIP and the policy defined by PAP for dynamic evaluation, so as to realize decentralized and tamper-resistant access control, as shown in Figure 3.
In the pre-audit phase, the policy follower who agrees with the policy becomes the execution node follower, and the ABAC policy contract that takes into account all the ideas is deployed. The specific workflow is as follows: First, when U initiates the original access request, the execution node on the blockchain will perform a legitimacy test after receiving the transaction proposal, and then the node will call the smart contract to simulate the execution of the transaction. In this paper, we use smart contracts to reflect the functions of PEP, PIP, PAP, and PDP. Among them, the policy administration point (PAP) is responsible for formulating the policy set, and the policy enforcement point (PEP) is responsible for receiving the user’s authorization request for data. According to the decision results of policy decision point (PDP) feedback, the corresponding operation is performed. The policy information point (PIP) is responsible for obtaining relevant attribute information such as subject, resource, and environment, while PDP is responsible for access control decisions based on the policy in PAP and the relevant attribute information provided by PIP. The algorithm flow of this smart contract is described in detail below.
After receiving, the PEP node will send the attribute information query request attrRequest to PIP. PIP needs to collect and sort out the subject, resource, operation, and environment attribute information attrSet required by attrRequest and then return it to the PEP node. The specific contract is as shown in Algorithm 4.
Algorithm 4 PIP—policy information point
Input: attrRequest
Output: attrSet
1:
AttrsRead(attrRequest)
2:
for block = 1 to blockchains.length do
3:
    for j = 1 to block.attr_datablocks.length do
4:
        if Attrs ∈ (AttrValueAttrRelation) then
5:
           attrSet = AttrValue
6:
        end if
7:
    end for
8:
end for
9:
return attrSet
After obtaining the relevant attribute information, PEP needs to perform preliminary processing of the access request and access control policy. Firstly, the request is converted into AAR according to the attribute information attrSet returned by PIP. Then, PEP traverses the access policy transaction block, finds the policy related to the resource, and adds it to the policy matching set PolicyMatchSet; finally, the policy matching set PolicyMatchSet is returned to the policy decision point contract PDP for the next policy decision. The specific contract is as shown in Algorithm 5.
Algorithm 5 PAP policy matching set extraction
Input: NAR, attrSet
Output: PolicyMatchSet
1:
AARNAR, attrSet{}
2:
( A s , A o , A r ) ParseRequest(AAR)
3:
PM
4:
for block = 1 to blockchains.length do
5:
    for all policy_data in block do
6:
        if policy_data.Type = ’policy’ and  ( A s , A o , A r ) = ExtractPolicy ( policy _ data )  then
7:
           PM.add(policy_data)
8:
        end if
9:
    end for
10:
end for
11:
return PolicyMatchSet
The PDP contract is based on the policy matching set PolicyMatchSet provided by the PAP node and examines the policy rules one by one to ensure that the access request fully meets all relevant policy constraints. When the access request does not conform to any policy rule, the access right will be denied; conversely, if the request satisfies all policy rules, the access is authorized. The specific contract is shown in Algorithm 6.
Algorithm 6 PDP—policy decision point
Input: AAR, PolicyMatchSet
Output: PERMIT or DENY
1:
Decision“Access Denied”
2:
for policy in RelevantPolicy do
3:
    for rule in policy.rules do
4:
        if not (AAR conforms to rule) then
5:
           return DENY
6:
        end if
7:
    end for
8:
end for
9:
return PERMIT

4. Experimental Analysis

4.1. Experimental Deployment Environment

In this paper, all experiments were conducted on a server equipped with an Intel(R) Core(TM) i7-8750H CPU @ 2.20 GHz and 16 GB of memory, running the Ubuntu 20.04 LTS operating system.The implementation and validation of this scheme are based on the Hyperledger Fabric v2.4 LTS framework. We used Docker to containerize the fabric network to simulate a distributed consortium of multiple data owners. The network’s smart contracts were written in Go. Performance evaluation was conducted using a test client developed in the Eclipse IDE with Java and multithreading, which was responsible for simulating concurrent user requests and collecting performance data.
The experiments focus on the multi-owner data access control scenario, with an emphasis on evaluating the performance of the proposed MMD-SSAC scheme in terms of access control latency and smart contract execution efficiency. To comprehensively validate the effectiveness and advantages of the scheme, SATI [33] (Sidechain-based Access control and Trust mechanism for IoT networks) is selected as the distributed baseline, while a traditional centralized ABAC is introduced as the centralized comparison baseline. SATI adopts a sidechain architecture combined with trust-based decision-making, implementing decentralized and fine-grained access control by deploying ABAC smart contracts on Hyperledger Fabric, and supports dynamic policy adjustments based on node trustworthiness, making it suitable for secure access control in multi-entity collaborative environments. In contrast, the traditional centralized ABAC stores and matches policies at a single central node, handling all access requests in a unified manner and representing a typical centralized access control model. Our scheme implements multi-owner joint policy formulation, voting, and threshold encryption-based joint authorization on the blockchain. All three schemes are executed under identical hardware and network conditions, with the number of access control attributes kept constant to ensure fairness in performance comparisons.

4.2. Access Control Performance Testing

In blockchain-based access control, operational cost is a critical metric. It should be noted that Hyperledger Fabric, as a permissioned blockchain, does not rely on a “gas” mechanism for transaction processing. Consequently, we evaluate its performance overhead by measuring the transaction latency of core operations. Table 6 summarizes the average latency for three key on-chain operations in our scheme—policy deployment, policy voting, and joint authorization—thereby providing a baseline for the subsequent performance analysis.
In the access control performance test, the data access request sent by the user is analyzed in depth after the multi-owner data policy setting is completed. In order to explore the relationship between the number of user access requests and transaction delay, 300, 600, and 1000 access control requests are taken from the access requests to form three sets of test set samples. Since the ABAC algorithm used in this study is not improved, it is mainly used to solve the access control problem in multi-party collaborative data flow. Therefore, the number of attributes is fixed in the experiment to facilitate model verification and result comparison. Therefore, transaction delay is measured while keeping the number of attributes and policies constant. As shown in Figure 4, under different group sizes (three, five, and seven nodes) and varying request loads, our scheme consistently maintained a lower transaction latency, with the rate of increase being significantly smaller than that of SATI and centralized ABAC as the request volume grew. Under the three-node configuration, our scheme achieved the lowest latency due to minimal communication and coordination overhead. When the network scale expanded to five and seven nodes, although the complexity of collaboration increased, the multi-owner policy effectively curbed latency growth, demonstrating good scalability. In contrast, SATI exhibited noticeably higher latency across all three configurations, while the centralized ABAC showed the highest latency, with a pronounced upward trend as the request volume increased, indicating its susceptibility to processing bottlenecks under high concurrency. Overall, within the range of 300–1000 requests, our scheme reduced average latency by approximately 15% compared to SATI and by more than 25% compared to centralized ABAC.
In order to explore the relationship between the number of access requests and system throughput, the experimental design uses three cases in which the number of packet nodes is three, five, and seven, respectively, and five experimental groups are set up for each case for testing. Each round of the experiment conducted 50 access requests, and the experiment was repeated for 20 rounds to ensure that the data is reliable and statistically significant. As shown in Figure 5, the proposed scheme achieved significantly higher TPS than both SATI and centralized ABAC under all group size configurations. The centralized ABAC, constrained by the processing capacity of a single point, consistently exhibited low TPS and was unable to scale effectively under high concurrency. SATI demonstrated relatively stable performance under moderate loads; however, its overall TPS remained lower than that of the proposed scheme. Under the seven-node configuration, the proposed scheme improved TPS by approximately 26% compared to SATI and by more than 40% compared to centralized ABAC. In the three-node configuration, due to the optimized matching strategy, the maximum improvement over SATI reached approximately 28%.

4.3. Smart Contract Algorithm Performance Evaluation

To evaluate the performance differences between our scheme and existing solutions under practical operating conditions—particularly in terms of smart contract execution efficiency—we designed an experiment focusing on how transaction latency changes with increasing network scale and access request frequency. As shown in Figure 6, we grouped the network into configurations of 20, 30, and 40 nodes, and measured the smart contract execution latency under each setting. The results indicate that while latency naturally increases as the number of nodes grows from 20 to 40 and as the system handles more access requests per second, the latency growth in our proposed scheme remains significantly smaller than that of the baseline. This improvement is primarily attributed to our streamlined contract design, which avoids the overhead caused by the traditional attribute-based access control model used in FIoT [34]. In FIoT, policy retrieval and attribute verification require multiple queries across the blockchain network to collect the attributes of the target device and perform one-by-one matching with the requester’s attributes. This process involves frequent cross-node communication and results in higher latency. In contrast, our approach integrates attribute matching directly within the smart contract logic by iterating over the access control table during each execution round. This design eliminates unnecessary inter-node communication overhead. At a peak load of 600 requests per second, the latency of our scheme is nearly 58 ms lower than that of FIoT. Overall, our scheme demonstrates a steady and predictable increase in latency as the request rate rises, whereas the FIoT solution exhibits accelerated latency growth and stronger fluctuations beyond 600 requests per second. These results indicate that the optimized smart contract logic in our scheme delivers better performance and stability under high-load conditions.

4.4. Policy Fusion Analysis

Since the number of policy merges is a key factor affecting the running time of smart contracts, the experiment also tests the performance of the policy merge algorithm. We use the number of policy merges as a variable for testing. In order to test the performance of the policy fusion algorithm, this experiment takes 5–50 different policies from the policy set to form 10 sets of test set samples to test the running time of the smart contract. As shown in Figure 7, with the increase in the number of policy integrations, the running time of the policy integration contract shows an increasing trend, and with the increase in the number of policies, the growth in integration time is gradually obvious. This is due to the large number of integration bases, and the results grow proportionally as well.

4.5. Convergence Performance Analysis of Game Theory Strategy Fusion Mechanism

In the policy integration phase, the dynamic adjustment of access control preferences among multiple data owners constitutes a typical game-theoretic interaction. This paper constructs an integration model based on the Stackelberg game framework, where a leader–follower mechanism is employed to guide participants toward gradual convergence and achieve a unified policy. To systematically evaluate the computational efficiency and convergence behavior of this mechanism in multi-party environments, as well as to quantify the influence of key parameters on its performance, we conducted a large-scale simulation experiment focusing on two core variables: the number of participants and the number of conflicting policies. The results, as illustrated in Figure 8, show the trend of average convergence rounds as the number of conflicts increases from 10 to 100 under three different participant configurations (5, 10, and 15 owners). The results indicate that the proposed mechanism consistently converges across all configurations and exhibits clear regularity and interpretability. Specifically, the number of participants emerges as the dominant factor affecting convergence speed; as the number of collaborative nodes increases, the required convergence rounds grow accordingly, reflecting the rising coordination cost in larger-scale cooperative settings. For example, at 60 conflicts, the average number of convergence rounds is approximately 39 for 5 participants, around 55 for 10 participants, and about 75 for 15 participants, indicating increased negotiation complexity under high collaboration density. Additionally, all three curves demonstrate an approximately linear and monotonic growth pattern, suggesting a stable and predictable relationship between the number of conflicts and convergence rounds across different participant scales. For instance, in the case of five participants, increasing the number of conflicts from 10 to 100 leads to a rise in convergence rounds from approximately 27 to 50, with an average increment of about 2.5 rounds per 10 additional conflicts, demonstrating the mechanism’s sensitivity and controllability with respect to policy complexity.

5. Conclusions

Our paper proposes a decentralized autonomous access control scheme based on blockchain technology, effectively combining the strengths of attribute-based and discretionary access control models. This scheme robustly safeguards the rights and interests of multiple data owners involved in multi-source data sharing, while achieving consensus on access control policies to ensure fine-grained data security. To address policy conflicts among multiple resource owners, a method for formulating access control policies that balance conflicting attributes using revenue functions is introduced. Additionally, a Stackelberg game-based consensus voting method is proposed to resolve issues related to poor consistency in multi-party collaborative policy implementation. Finally, this study enhances the security of discretionary access control by integrating attribute-based fine-grained control, blockchain-enabled traceability of key operations, and threshold cryptography-based key authorization. The experimental evaluation confirms the scheme’s feasibility and highlights its superior effectiveness and performance in distributed collaborative environments.

Author Contributions

Conceptualization and design: H.P., K.L., and Y.Z. (Yaoyao Zhang); Methodology: K.L. and Y.Z. (Yaoyao Zhang); Software: Y.Z. (Yuyang Zhan); Validation: B.Z. and Y.Z. (Yuyang Zhan); Formal Analysis: K.L. and Y.Z. (Yaoyao Zhang); Investigation: Y.X., Y.Z. (Yuyang Zhan), and G.Z.; Resources: H.P. and X.S.; Data Curation: B.Z.; Writing—Original Draft Preparation: K.L., B.Z., and Y.Z. (Yaoyao Zhang); Writing—Review and Editing: H.P., Y.X. and X.S.; Visualization: B.Z., Y.Z. (Yuyang Zhan), Y.Z. (Yaoyao Zhang), and G.Z. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded in part by the National Key Research and Development Project of China under Grant No. 2023YFB2704601, the Key Research Project for Higher Education of Henan Province under Grant No. 24A520059, the Strength Enhancement Plan for Advantageous Disciplines of Zhongyuan University of Technology under Grant No. GG202425, the Graduate Education Innovation and Training Demonstration Base Construction Project of Zhongyuan University of Technology under Grant No. JD202305, and the Scientific and Technological Research Project in Henan Province under Grant No. 242100101136.

Data Availability Statement

Data are contained within the article.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Peng, S.; Wang, G.; Xie, D. Social Influence Analysis in Social Networking Big Data: Opportunities and Challenges. IEEE Netw. 2017, 31, 11–17. [Google Scholar] [CrossRef]
  2. Bello-Orgaz, G.; Jung, J.J.; Camacho, D. Social big data: Recent achievements and new challenges. Inf. Fusion 2016, 28, 45–59. [Google Scholar] [CrossRef] [PubMed]
  3. Ding, Y.; Wu, Z.; Miao, Y.; Ding, M. SharAcc: Enhancing scalability and security in Attribute-Based Access Control with sharding-based blockchain and full decentralization. Comput. Netw. 2025, 257, 110992. [Google Scholar] [CrossRef]
  4. Yin, H.; Zhu, Y.; Deng, H.; Ou, L.; Qin, Z.; Li, K. Privacy-Preservation Enhanced and Efficient Attribute-Based Access Control for Smart Health in Cloud-Assisted Internet of Things. IEEE Internet Things J. 2024, 12, 894–903. [Google Scholar] [CrossRef]
  5. Wang, X.; Dou, X.; Yang, Q.; Wang, W. Dynamic fine-grained access control for smart contracts based on improved attribute-based signature. J. Supercomput. 2025, 81, 44. [Google Scholar]
  6. Rossi, M.; Facchinetti, D.; Bacis, E.; Rosa, M.; Paraboschi, S. SEApp: Bringing Mandatory Access Control to Android Apps. In Proceedings of the 30th USENIX Security Symposium (USENIX Security 21), Virtual, 11–13 August 2021; pp. 3613–3630. [Google Scholar]
  7. Li, N.; Tripunitara, M.V. On safety in discretionary access control. In Proceedings of the 2005 IEEE Symposium on Security and Privacy (S&P’05), Oakland, CA, USA, 8–11 May 2005; pp. 96–109. [Google Scholar]
  8. Yang, B.; Hu, H. Resiliency Analysis of Role-Based Access Control via Constraint Enforcement and Mathematical Programming. IEEE Trans. Syst. Man Cybern. Syst. 2024, 547, 4089–4100. [Google Scholar] [CrossRef]
  9. Hu, Q.; Correia, M.; Jiang, T. An efficient blockchain for decentralized ABAC policy decision point. Future Gener. Comput. Syst. 2025, 166, 107732. [Google Scholar] [CrossRef]
  10. Jiang, R.; Liu, R.; Zhang, T.; Ding, W.; Tian, S. An electronic medical record access control model based on intuitionistic fuzzy trust. Inf. Sci. 2024, 658, 120054. [Google Scholar] [CrossRef]
  11. Jiang, R.; Han, S.; Yu, Y.; Ding, W. An access control model for medical big data based on clustering and risk. Inf. Sci. 2023, 621, 691–707. [Google Scholar] [CrossRef]
  12. Atlam, H.F.; Walters, R.J.; Wills, G.B.; Daniel, J. Fuzzy Logic with Expert Judgment to Implement an Adaptive Risk-Based Access Control Model for IoT. Mob. Netw. Appl. 2021, 26, 2545–2557. [Google Scholar] [CrossRef]
  13. Bugiel, S.; Heuser, S.; Sadeghi, A.-R. Flexible and fine-grained mandatory access control on android for diverse security and privacy policies. In Proceedings of the 22nd USENIX Security Symposium (USENIX Security 13), Washington, DC, USA, 14–16 August 2013; pp. 131–146. [Google Scholar]
  14. Ray, I.; Kumar, M. Towards a location-based mandatory access control model. Comput. Secur. 2006, 25, 36–44. [Google Scholar] [CrossRef]
  15. JMcCune, o.M.; Jaeger, T.; Berger, S.; Caceres, R.; Sailer, R. Shamon: A system for distributed mandatory access control. In Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC’06), Miami Beach, FL, USA, 11–15 December 2006; pp. 43–52. [Google Scholar]
  16. Lampson, B.W. Protection. ACM SIGOPS Oper. Syst. Rev. 1974, 8, 18–24. [Google Scholar] [CrossRef]
  17. Ghafoorian, M.; Abbasinezhad-Mood, D.; Shakeri, H. A Thorough Trust and Reputation Based RBAC Model for Secure Data Storage in the Cloud. IEEE Trans. Parallel Distrib. Syst. 2019, 30, 778–788. [Google Scholar] [CrossRef]
  18. Kim, H.; Kim, D.-K.; Alaerjan, A. ABAC-Based Security Model for DDS. IEEE Trans. Dependable Secure Comput. 2022, 19, 3113–3124. [Google Scholar] [CrossRef]
  19. Ren, W.; Sun, Y.; Luo, H.; Guizani, M. SILedger: A Blockchain and ABE-based Access Control for Applications in SDN-IoT Networks. IEEE Trans. Netw. Serv. Manag. 2021, 18, 4406–4419. [Google Scholar] [CrossRef]
  20. Ilia, P.; Carminati, B.; Ferrari, E.; Fragopoulou, P.; Ioannidis, S. SAMPAC: Socially-aware collaborative multi-party access control. In Proceedings of the 7th ACM Conference on Data and Application Security and Privacy, Scottsdale, AZ, USA, 22–24 March 2017; pp. 71–82. [Google Scholar]
  21. More, S.V.; Chatterjee, M. Improved Multiparty Access Control Mechanism for OSN. In Proceedings of the 2017 International Conference on Computing, Communication, Control and Automation (ICCUBEA), Pune, India, 17–18 August 2017; pp. 1–6. [Google Scholar]
  22. Miao, Y.; Liu, X.; Choo, K.R.; Deng, R.H.; Li, J.; Li, H. Privacy-preserving attribute-based keyword search in shared multi-owner setting. IEEE Trans. Dependable Secur. Comput. 2019, 18, 1080–1094. [Google Scholar] [CrossRef]
  23. Preuveneers, D.; Joosen, W. Towards Multi-party Policy-based Access Control in Federations of Cloud and Edge Microservices. In Proceedings of the 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), Stockholm, Sweden, 17–19 June 2019; pp. 29–38. [Google Scholar]
  24. Hu, H.; Ahn, G.-J.; Jorgensen, J. Detecting and resolving privacy conflicts for collaborative data sharing in online social networks. In Proceedings of the 26th Annual Computer Security Applications Conference, Austin, TX, USA, 6–10 December 2011; pp. 135–144. [Google Scholar]
  25. Kaur, M.; Garg, P. A Review of Authentication Techniques used for Security in Cloud Computing. In Proceedings of the 2022 Seventh International Conference on Parallel, Distributed and Grid Computing (PDGC), Solan, India, 15–17 December 2022; pp. 187–191. [Google Scholar]
  26. Saha, R.; Kumar, G.; Conti, M.; Devgun, T.; Kim, T.; Alazab, M. DHACS: Smart Contract-Based Decentralized Hybrid Access Control for Industrial Internet-of-Things. IEEE Trans. Ind. Inf. 2022, 18, 3452–3461. [Google Scholar] [CrossRef]
  27. Berdik, D.; Otoum, S.; Schmidt, N.; Porter, D.; Jararweh, Y. A survey on blockchain for information systems management and security. Inf. Process. Manag. 2021, 58, 102397. [Google Scholar] [CrossRef]
  28. Liu, M.-D.; Chen, Z.-N.; Shi, Y.-J.; Tang, L.-T.; Cao, D. Reseach progress of blockchain in data security. Chin. J. Comput. 2021, 44, 1–27. [Google Scholar]
  29. Yuan, Y.; Wang, F.-Y. Editable blockchain: Models, techniques and methods. Acta Autom. Sin. 2020, 46, 831–846. [Google Scholar]
  30. Liu, J.; Li, X.; Ye, L.; Zhang, H.; Du, X.; Guizani, M. BPDS: A Blockchain based Privacy-Preserving Data Sharing for Electronic Medical Records. In Proceedings of the 2018 IEEE Global Communications Conference (GLOBECOM), Abu Dhabi, United Arab Emirates, 9–13 December 2018; pp. 1–6. [Google Scholar]
  31. Pournaghi, S.M.; Bayat, M.; Farjami, Y. MedSBA: A novel and secure scheme to share medical data based on blockchain technology and attribute-based encryption. J. Ambient Intell. Humaniz. Comput. 2020, 11, 4613–4641. [Google Scholar] [CrossRef]
  32. Chen, W.; Zhu, S.; Li, J.; Wu, J.; Chen, C.-L.; Deng, Y.-Y. Authorized Shared Electronic Medical Record System with Proxy Re-Encryption and Blockchain Technology. Sensors 2021, 21, 7765. [Google Scholar] [CrossRef]
  33. Pathak, A.; Al-Anbagi, I.; Hamilton, H.J. SATI: Sidechain-Based Access Control & Trust Mechanism for IoT Networks. IEEE Trans. Netw. Serv. Manag. 2024, 21, 5888–5903. [Google Scholar]
  34. Liu, H.; Han, D.; Li, D. Fabric-iot: A Blockchain-Based Access Control System in IoT. IEEE Access 2020, 8, 18207–18218. [Google Scholar] [CrossRef]
Figure 1. Scheme flow.
Figure 1. Scheme flow.
Mathematics 13 02712 g001
Figure 2. Access control policy execution and joint authorization flowchart.
Figure 2. Access control policy execution and joint authorization flowchart.
Mathematics 13 02712 g002
Figure 3. Flowchart of attribute-based access control.
Figure 3. Flowchart of attribute-based access control.
Mathematics 13 02712 g003
Figure 4. Analysis of access request delay.
Figure 4. Analysis of access request delay.
Mathematics 13 02712 g004
Figure 5. Throughput comparison.
Figure 5. Throughput comparison.
Mathematics 13 02712 g005
Figure 6. Smart contract latency analysis.
Figure 6. Smart contract latency analysis.
Mathematics 13 02712 g006
Figure 7. Policy fusion time.
Figure 7. Policy fusion time.
Mathematics 13 02712 g007
Figure 8. Convergence performance analysis of game theory strategy fusion mechanism.
Figure 8. Convergence performance analysis of game theory strategy fusion mechanism.
Mathematics 13 02712 g008
Table 1. Table of notations used in policy formulation.
Table 1. Table of notations used in policy formulation.
SymbolDescription
O Set of all data owners { O 1 , O 2 , , O n }
M i Proportion of data resources owned by data owner i
stra i Strategy vector proposed by data owner i
att i j jth attribute value proposed by data owner i
STRAMulti-owner data access attribute policy matrix
b j Conflicting strategy option
ConfSet of conflicting strategy options
α i j Influence coefficient of owner i on strategy option b j
x i ( b j ) Initial preference score of owner i for conflicting strategy b j
p j Final preference score for strategy b j after mutual influence fusion
pay i Payoff or income of owner i for the selected strategy
Table 2. Multi-owner data access attribute policy matrix diagram.
Table 2. Multi-owner data access attribute policy matrix diagram.
Attribute1m
Owner Revision.
O 1 a t t 1 1 a t t 1 m
O n a t t n 1 a t t n m
Table 3. Schematic diagram of conflict policy preference value.
Table 3. Schematic diagram of conflict policy preference value.
Policy Policy b 1 b r
Owner Conflict
O 1 x 1 ( b 1 ) x 1 ( b r )
O n x n ( b 1 ) x n ( b r )
Table 4. Parameter variable.
Table 4. Parameter variable.
ParameterDescription
RReward for On-chain Submission
CCost of Privacy/Exposure Ratio
θ i Reward for Compliance
PPenalty for Breach
tIncentive Coefficient for Ensuring Information Security
λ Risk Coefficient of Key Sharing
Table 5. Profit matrix.
Table 5. Profit matrix.
LeaderSecureLeak
Follower
Agree ( R + λ θ i , R + t θ i ) ( R + λ θ i , R P )
Reject ( R P , R + t θ i ) ( R , R )
Table 6. Average latency of smart contract.
Table 6. Average latency of smart contract.
Smart ContractDescriptionAvg. Latency (ms)
Policy DeploymentTo store a new access policy on chain for the first time.∼85 ms
Policy VotingTo submit a vote (agree/disagree) for a proposed policy.∼55 ms
Joint AuthorizationTo execute the ABAC smart contract for a user’s access request.∼580 ms
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Li, K.; Pan, H.; Zhang, Y.; Zhang, B.; Xing, Y.; Zhan, Y.; Zhao, G.; Si, X. A Blockchain-Enabled Decentralized Autonomous Access Control Scheme for Data Sharing. Mathematics 2025, 13, 2712. https://doi.org/10.3390/math13172712

AMA Style

Li K, Pan H, Zhang Y, Zhang B, Xing Y, Zhan Y, Zhao G, Si X. A Blockchain-Enabled Decentralized Autonomous Access Control Scheme for Data Sharing. Mathematics. 2025; 13(17):2712. https://doi.org/10.3390/math13172712

Chicago/Turabian Style

Li, Kunyang, Heng Pan, Yaoyao Zhang, Bowei Zhang, Ying Xing, Yuyang Zhan, Gaoxu Zhao, and Xueming Si. 2025. "A Blockchain-Enabled Decentralized Autonomous Access Control Scheme for Data Sharing" Mathematics 13, no. 17: 2712. https://doi.org/10.3390/math13172712

APA Style

Li, K., Pan, H., Zhang, Y., Zhang, B., Xing, Y., Zhan, Y., Zhao, G., & Si, X. (2025). A Blockchain-Enabled Decentralized Autonomous Access Control Scheme for Data Sharing. Mathematics, 13(17), 2712. https://doi.org/10.3390/math13172712

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop