Efficient Fine-Grained Data Sharing Based on Proxy Re-Encryption in IIoT

被引:2
|
作者
Zhang, Qingyang [1 ]
Fu, Yujie [1 ]
Cui, Jie [1 ]
He, Debiao [2 ,3 ]
Zhong, Hong [1 ]
机构
[1] Anhui Univ, Inst Phys Sci & Informat Technol, Sch Comp Sci & Technol, Anhui Engn Lab IoT Secur Technol,Key Lab Intellige, Hefei 230039, Peoples R China
[2] Wuhan Univ, Sch Cyber Sci & Engn, Wuhan 430072, Peoples R China
[3] MatrixElements Technol, Shanghai Key Lab Privacy Preserving Computat, Shanghai 201204, Peoples R China
基金
中国国家自然科学基金;
关键词
Industrial Internet of Things; Encryption; Cryptography; Costs; Servers; Access control; Computational efficiency; data sharing; attribute-based encryption; proxy re-encryption; access control; ACCESS-CONTROL; SCHEME; SECURE; INTERNET;
D O I
10.1109/TDSC.2024.3386690
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of the industrial Internet of Things (IIoT), the amount of data generated by industrial manufacturing equipment will increase. To reduce the cost of data management while achieving secure data sharing, data owners generally upload the resulting ciphertexts to a cloud server after encrypting their data. Attribute-based encryption (ABE) is a valuable technology that implements fine-grained access control over shared information; however, its computational complexity is not suitable for resource-constrained IIoT devices, making it difficult to apply directly to an IIoT environment. To address this problem, we design a fine-grained data sharing scheme based on proxy re-encryption in IIoT. In the proposed scheme, data files are encrypted through an identity-based encryption and a data owner can authorize a semi-trusted proxy server to transform the ciphertext into an ABE ciphertext. This realizes fine-grained access control and decreases a data owner's computational cost in data sharing. In addition, the computational burden is outsourced to a cloud server, and users only need to perform simple computing operations. A formal security proof indicates the proposed scheme's selective chosen-plaintext attack security. Theoretical and experimental analyses illustrate that our construction is more efficient than previous schemes.
引用
收藏
页码:5797 / 5809
页数:13
相关论文
共 50 条
  • [1] Cloud based data sharing with fine-grained proxy re-encryption
    Yang, Yanjiang
    Zhu, Haiyan
    Lu, Haibing
    Weng, Jian
    Zhang, Youcheng
    Choo, Kim-Kwang Raymond
    PERVASIVE AND MOBILE COMPUTING, 2016, 28 : 122 - 134
  • [2] Fine-Grained Conditional Proxy Re-Encryption and Application
    Yang, Yanjiang
    Lu, Haibing
    Weng, Jian
    Zhang, Youcheng
    Sakurai, Kouichi
    PROVABLE SECURITY, PROVSEC 2014, 2014, 8782 : 206 - 222
  • [3] Hierarchical Conditional Proxy Re-Encryption: A New Insight of Fine-Grained Secure Data Sharing
    He, Kai
    Liu, Xueqiao
    Yuan, Huaqiang
    Wei, Wenhong
    Liang, Kaitai
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2017, 2017, 10701 : 118 - 135
  • [4] Multi-hop Fine-Grained Proxy Re-encryption
    Zhou, Yunxiao
    Liu, Shengli
    Han, Shuai
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2024, 14604 LNCS : 161 - 192
  • [5] Multi-hop Fine-Grained Proxy Re-encryption
    Zhou, Yunxiao
    Liu, Shengli
    Han, Shuai
    PUBLIC-KEY CRYPTOGRAPHY, PT IV, PKC 2024, 2024, 14604 : 161 - 192
  • [6] A Fine-Grained Attribute Based Data Retrieval with Proxy Re-Encryption Scheme for Data Outsourcing Systems
    Hong, Hanshu
    Liu, Ximeng
    Sun, Zhixin
    MOBILE NETWORKS & APPLICATIONS, 2021, 26 (06): : 2509 - 2514
  • [7] A Fine-Grained Attribute Based Data Retrieval with Proxy Re-Encryption Scheme for Data Outsourcing Systems
    Hanshu Hong
    Ximeng Liu
    Zhixin Sun
    Mobile Networks and Applications, 2021, 26 : 2509 - 2514
  • [8] Fine-grained and heterogeneous proxy re-encryption for secure cloud storage
    Xu, Peng
    Chen, Hongwu
    Zou, Deqing
    Jin, Hai
    CHINESE SCIENCE BULLETIN, 2014, 59 (32): : 4201 - 4209
  • [9] Fine-Grained Proxy Re-encryption: Definitions and Constructions from LWE
    Zhou, Yunxiao
    Liu, Shengli
    Han, Shuai
    Zhang, Haibin
    ADVANCES IN CRYPTOLOGY, ASIACRYPT 2023, PART VI, 2023, 14443 : 199 - 231
  • [10] Fine-Grained Access Control Scheme Based on Improved Proxy Re-Encryption in Cloud
    Xu, Zhenwu
    Shen, Jinan
    Liang, Fang
    Chen, Yingjie
    JOURNAL OF ADVANCED COMPUTATIONAL INTELLIGENCE AND INTELLIGENT INFORMATICS, 2021, 25 (02) : 170 - 176