Attribute-Based Encryption Method for Data Privacy Security Protection

被引:0
|
作者
Li, Ziqian [1 ]
He, Yeshen [2 ]
Zhang, Yiying [1 ]
Li, Siwei [3 ]
Wang, Cong [1 ]
Zhang, Xiankun [1 ]
机构
[1] Tianjin Univ Sci & Technol, Artificial Intelligence Inst, Tianjin 300457, Peoples R China
[2] Shenzhen Guodian Technol Commun Co, Shenzhen 518000, Guangdong, Peoples R China
[3] Beijing Zhongdian Feihua Commun Co, Beijing 100070, Peoples R China
关键词
Attribute-based encryption; Tactical hiding; Blockchain; Privacy protection; Cloud storage; BLOCKCHAIN; SCHEME;
D O I
10.1007/978-981-97-5606-3_39
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Storing power data in a cloud environment is an important step in the digital transformation of the power industry. Power data must be protected by a strict protection mechanism. Ensure that it is protected from any unauthorized access, tampering, or disclosure. However, the privacy security of the access policy cannot be guaranteed in the use of the ABE. It is also not possible to fully respond to changes in the user's attributes. In response to the above problems, this paper proposes a scheme combining blockchain technology and attribute-based encryption. By using the blockchain platform, it solves the problem of single point of failure caused by relying on a central entity in the traditional CP-ABE solution. The data information adopts CP-ABE encryption mode, stored the symmetric decryption key in the cloud server. Meanwhile, key information such as data summaries and file locations are stored on the blockchain to reduce the risk of data tampering with cloud servers. To further strengthen the storage security of data, access policies are converted into an access tree structure. And completely hide the policy in the redaction. This approach can effectively prevent unauthorized access. Experimental tests verify that the proposed method can better realize the privacy protection of power data in cloud storage.
引用
收藏
页码:458 / 467
页数:10
相关论文
共 50 条
  • [21] Attribute-based encryption
    Sahai, Amit
    Waters, Brent
    Lu, Steve
    [J]. Cryptology and Information Security Series, 2009, 2 : 156 - 168
  • [22] Attribute-Based Encryption for Named Data Networking
    Lenin, Aleksandr
    Laud, Peeter
    [J]. PROCEEDINGS OF THE 2021 8TH ACM CONFERENCE ON INFORMATION-CENTRIC NETWORKING (ICN '21), 2021, : 118 - 120
  • [23] A Privacy-Preserving Attribute-Based Encryption System for Data Sharing in Smart Cities
    Shen, Xieyang
    Huang, Chuanhe
    Wang, Danxin
    Shi, Jiaoli
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
  • [24] A privacy-preserving data sharing system with decentralized attribute-based encryption scheme
    Kang, Li
    Zhang, Leyou
    [J]. International Journal of Network Security, 2020, 22 (05): : 815 - 827
  • [25] Fractal Intelligent Privacy Protection in Online Social Network Using Attribute-Based Encryption Schemes
    Wei, Wei
    Liu, Shuai
    Li, Wenjia
    Du, Dingzhu
    [J]. IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2018, 5 (03): : 736 - 747
  • [26] A Privacy-Preserving Attribute-Based Encryption System for Data Sharing in Smart Cities
    Shen, Xieyang
    Huang, Chuanhe
    Wang, Danxin
    Shi, Jiaoli
    [J]. Wireless Communications and Mobile Computing, 2021, 2021
  • [27] A novel approach for privacy homomorphism using attribute-based encryption
    Doshi, Nishant
    Jinwala, Devesh C.
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (17) : 4451 - 4467
  • [28] Blockchain data sharing scheme based on localized difference privacy and attribute-based searchable encryption
    Feng T.
    Chen L.
    Fang J.
    Shi J.
    [J]. Tongxin Xuebao/Journal on Communications, 2023, 44 (05): : 224 - 233
  • [29] Privacy-Aware Attribute-Based Encryption with User Accountability
    Li, Jin
    Ren, Kui
    Zhu, Bo
    Wan, Zhiguo
    [J]. INFORMATION SECURITY, PROCEEDINGS, 2009, 5735 : 347 - +
  • [30] Fully Anonymous Attribute-Based Encryption with Privacy and Access Privilege
    Kartik
    Chandrasekhar, B. N.
    Lakshmi, H.
    [J]. 2016 INTERNATIONAL CONFERENCE ON COMPUTATION SYSTEM AND INFORMATION TECHNOLOGY FOR SUSTAINABLE SOLUTIONS (CSITSS), 2016, : 416 - 418