FOC-PH-CP-ABE: An Efficient CP-ABE Scheme With Fully Outsourced Computation and Policy Hidden in the Industrial Internet of Things

被引:0
|
作者
Luo, Wei [1 ]
Lv, Ziyi [1 ]
Yang, Laipu [1 ]
Han, Gang [1 ]
Zhang, Xiaoli [1 ]
机构
[1] Xian Univ Posts & Telecommun, Sch Cyberspace Secur, Xian 710121, Peoples R China
基金
中国国家自然科学基金;
关键词
Ciphertext-policy attribute-based encryption (CP-ABE); data sharing; industrial Internet of Things (IIoT); outsourced computation; policy hiding; ATTRIBUTE-BASED ENCRYPTION; ACCESS-CONTROL; SECURITY; PRIVACY;
D O I
10.1109/JSEN.2024.3432276
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The industrial Internet of Things (IIoT) generates a large amount of private data, which can be used to improve production efficiency and optimize production management decisions. However, the openness of the network and the limited resources of sensor devices pose security threats to industrial privacy data, such as illegal access and leakage. Attribute-based encryption (ABE) is a promising solution for solving the problem of private data sharing. Nevertheless, many time-consuming operations, such as bilinear pairing, security of access policies, and attribute revocation issues, pose challenges for ABE in practical applications. To address the above issues, we propose an efficient policy hiding ciphertext-policy ABE (CP-ABE) scheme based on a multivalued attribute access structure with wildcards. It introduces fog computing to achieve fully outsourced computation, reducing the computational overhead of resource constrained terminals. Meanwhile, attribute revocation and user revocation mechanisms were designed to achieve flexible and fine-grained access control. Based on the idea of reduction, we have demonstrated that our scheme is secure under the assumption of the decision q-bilinear Diffie-Hellman exponent. In addition, our scheme has both backward and forward securities. Finally, we compared and analyzed the proposed scheme with the existing schemes in terms of functionality and performance. Theoretical analysis and experimental simulation results show that our scheme has relatively complete functions and has certain advantages in communication costs and computational overhead.
引用
收藏
页码:28971 / 28981
页数:11
相关论文
共 50 条
  • [1] CP-ABE with outsourced decryption and directionally hidden policy
    Wang, Zhiwei
    Liu, Wenyang
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (14) : 2387 - 2396
  • [2] POSTER: ODABE: Outsourced Decentralized CP-ABE in Internet of Things
    Kamel, Mohammed B. M.
    Ligeti, Peter
    Reich, Christoph
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, ACNS 2022, 2022, 13285 : 611 - 615
  • [3] CP-ABE scheme supporting partially hidden access policy
    Liu, Xia
    Wang, Xinzu
    Zhang, Tao
    Chen, Yingge
    Wang, Rong
    Feng, Chaosheng
    Qin, Zhiguang
    Tongxin Xuebao/Journal on Communications, 2024, 45 (10): : 180 - 190
  • [4] Effective CP-ABE with Hidden Access Policy
    Wang Y.
    Fan K.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2019, 56 (10): : 2151 - 2159
  • [5] CP-ABE with Hidden Policy from Waters Efficient Construction
    Wang, Zhiwei
    He, Mingjun
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2016,
  • [6] An Expressive Hidden Access Policy CP-ABE
    Khan, Fawad
    Li, Hui
    Zhang, Liangxuan
    Shen, Jian
    2017 IEEE SECOND INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC), 2017, : 178 - 186
  • [7] OE-CP-ABE: Over-Encryption Based CP-ABE Scheme for Efficient Policy Updating
    Hao, Jialu
    Liu, Jian
    Rong, Hong
    Wang, Huimei
    Xian, Ming
    NETWORK AND SYSTEM SECURITY, 2017, 10394 : 499 - 509
  • [8] A CP-ABE Scheme Supporting Attribute Revocation and Policy Hiding in Outsourced Environment
    Wang, Wei
    Zhang, Guidong
    Shen, Yongjun
    PROCEEDINGS OF 2018 IEEE 9TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS), 2018, : 96 - 99
  • [9] Cryptanalysis of a CP-ABE scheme with policy in normal forms
    Tan, Syh-Yuan
    Yap, Wun-She
    INFORMATION PROCESSING LETTERS, 2016, 116 (07) : 492 - 495
  • [10] An Efficient and Privacy Preserving CP-ABE Scheme for Internet-Based Collaboration
    Wang, Jinmiao
    Lang, Bo
    COLLABORATIVE COMPUTING: NETWORKING, APPLICATIONS AND WORKSHARING, COLLABORATECOM 2017, 2018, 252 : 493 - 507