A License Management and Fine-Grained Verifiable Data Access Control System for Online Catering
To address the law enforcement challenges arising from the rapid expansion of the online catering industry, China's market regulatory authorities are pursuing countermeasures through legislative efforts and innovative regulatory models. At present, administrative law enforcement for online cate...
Saved in:
Published in | IEEE transactions on computational social systems Vol. 10; no. 6; pp. 1 - 16 |
---|---|
Main Authors | , , , , , , |
Format | Journal Article |
Language | English |
Published |
Piscataway
IEEE
01.12.2023
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | To address the law enforcement challenges arising from the rapid expansion of the online catering industry, China's market regulatory authorities are pursuing countermeasures through legislative efforts and innovative regulatory models. At present, administrative law enforcement for online catering faces difficulties in license management and ensuring the authenticity and security of data. Specifically, there is a prevalence of fraudulent licenses in the industry, and the market supervision department struggles to verify the authenticity of the data gathered during investigations and evidence collection. The tamper-proof and transparent features of blockchain technology cannot be directly applied to the online catering domain. Consequently, to attain trusted license management and secure data-sharing measures, further system design is necessary. To achieve trusted license management, we employ blockchain technology for managing qualification certificates and delineate the format for valid certificates and the application process. The secure data-sharing protocol is divided into two stages. In the first stage, we ensure data authenticity before uploading it to the blockchain through a consensus process involving platforms, users, and merchants. In the second stage, we implement fine-grained access control based on the on-chain data from the previous stage, utilizing conditional proxy reencryption and ultimately employing the data digest on the blockchain for verification. The experiment thoroughly validates the system's functionality, which is traceable, transparent, and scalable. Moreover, the minimal delay introduced by ensuring data authenticity is virtually negligible. The system's additional storage overhead does not surpass 10%, remaining within acceptable limits. |
---|---|
ISSN: | 2329-924X 2373-7476 |
DOI: | 10.1109/TCSS.2023.3294797 |