A Unified Attribute-Based Encryption Data Sharing Scheme Matching Industrial Internet Framework

被引:0
|
作者
Wang, Zihao [1 ,2 ]
Fu, Yusun [3 ,4 ]
机构
[1] Shanghai Jiao Tong Univ, Ningbo Artificial Intelligence Inst, Ningbo 315000, Peoples R China
[2] Shanghai Jiao Tong Univ, Sch Elect Informat & Elect Engn, Shanghai 200240, Peoples R China
[3] Shanghai Jiao Tong Univ, Sch Elect Informat & Elect Engn, Key Lab Syst Control & Informat Proc, Minist Educ China, Shanghai 200240, Peoples R China
[4] Shanghai Jiao Tong Univ, Sch Elect Informat & Elect Engn, Key Lab Syst Control & Informat Proc, Shanghai Engn Res Ctr Intelligent Control & Manag, Shanghai 200240, Peoples R China
来源
IEEE INTERNET OF THINGS JOURNAL | 2024年 / 11卷 / 05期
关键词
Encryption; Cloud computing; Blockchains; Servers; Internet of Things; Monitoring; Costs; Attribute-based encryption; blockchain; data sharing; industrial Internet; outsourced computing; trust attribute; ARCHITECTURE; BLOCKCHAIN;
D O I
10.1109/JIOT.2023.3322469
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Industrial Internet is the combination of traditional industry and Internet technology to achieve intelligent, automated, information-based, and networked production modes. From the closed industrial environment to the open Internet network environment, data sharing in the industrial scenario is facing various risks brought by an open network. Ciphertext policy attribute-based encryption (CP-ABE) can guarantee industrial data confidentiality while achieving precise and flexible access control. However, the current CP-ABE schemes cannot fully meet the requirements of the Industrial Internet, due to inefficient algorithms, incomplete functionality, poor dynamic monitoring capability, and separation from the Industrial Internet framework. Therefore, this article proposes a unified CP-ABE data security sharing scheme matching the Industrial Internet framework. To decrease the local calculation cost of the industrial device, outsourced encryption is implemented by using multiple computing nodes to encrypt the subkeys, respectively. Online/offline encryption can be outsourced to computing nodes. Attribute revocation can efficiently update the revoked user's private key. Search-related costs are all constant. To enhance the dynamic monitoring, trust is set as an attribute and is updated adaptively in time through the attribute revocation algorithm. To further improve the security of data sharing, encapsulation is combined with on-chain ciphertext storage, which not only prevents symmetric ciphertext from being stolen and tampered with but also modifies the ciphertext component of the key ciphertext as needed. The scheme also realizes functions, including outsourced decryption and policy hiding. The scheme can resist the chosen plaintext and keyword attack, and ensure the forward and backward security of attribute revocation. By analysis and experiment, although our scheme achieves massive functions, it also has excellent algorithm efficiency.
引用
收藏
页码:9153 / 9170
页数:18
相关论文
共 50 条
  • [1] Unified Attribute-Based Encryption Scheme for Industrial Internet of Things
    Li, Wei
    Si, Jing
    Xing, Jianhua
    Zhang, Yongjing
    Liu, Deli
    Sui, Zhiyuan
    2021 IEEE 5TH INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, SECURITY AND PRIVACY (ICCSP), 2021, : 12 - 16
  • [2] A Data Sharing Scheme Based on Blockchain System and Attribute-Based Encryption
    Zhang, Xiaodong
    Chen, Taowei
    Feng, Yan
    Yu, Yimin
    2021 THE 3RD INTERNATIONAL CONFERENCE ON BLOCKCHAIN TECHNOLOGY, ICBCT 2021, 2021, : 195 - 202
  • [3] Power data sharing scheme based on blockchain and attribute-based encryption
    Yang X.
    Liao Z.
    Liu L.
    Wang C.
    Dianli Xitong Baohu yu Kongzhi/Power System Protection and Control, 2023, 51 (13): : 169 - 176
  • [4] Decentralized Attribute-Based Encryption and Data Sharing Scheme in Cloud Storage
    Li, Xiehua
    Wang, Yanlong
    Xu, Ming
    Cui, Yaping
    CHINA COMMUNICATIONS, 2018, 15 (02) : 138 - 152
  • [5] Decentralized Attribute-Based Encryption and Data Sharing Scheme in Cloud Storage
    Xiehua Li
    Yanlong Wang
    Ming Xu
    Yaping Cui
    中国通信, 2018, 15 (02) : 138 - 152
  • [6] Privilege separation of data sharing scheme using attribute-based encryption
    Zhu, Hui
    Lei, Wan
    Huang, Rong
    Li, Hui
    Liu, Xi-Meng
    Tongxin Xuebao/Journal on Communications, 2014, 35 : 53 - 62
  • [7] An SDKEY Data Protection and Sharing Scheme with Attribute-based Encryption for Smartphone
    Li, Lun
    Li, Meihong
    Liu, Jiqiang
    Zhao, Jia
    2016 4TH INTERNATIONAL CONFERENCE ON ENTERPRISE SYSTEMS (ES) PROCEEDINGS, 2016, : 104 - 109
  • [8] Blockchain-Assisted Hierarchical Attribute-Based Encryption Scheme for Secure Information Sharing in Industrial Internet of Things
    Sasikumar, A.
    Ravi, Logesh
    Devarajan, Malathi
    Selvalakshmi, A.
    Almaktoom, Abdulaziz Turki
    Almazyad, Abdulaziz S.
    Xiong, Guojiang
    Mohamed, Ali Wagdy
    IEEE ACCESS, 2024, 12 : 12586 - 12601
  • [9] A lightweight attribute-based encryption scheme for the Internet of Things
    Yao, Xuanxia
    Chen, Zhi
    Tian, Ye
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2015, 49 : 104 - 112
  • [10] A Blockchain-Based Anonymous Attribute-Based Searchable Encryption Scheme for Data Sharing
    Zhang, Kai
    Zhang, Yan
    Li, Yanping
    Liu, Ximeng
    Lu, Laifeng
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (01) : 1685 - 1697