FOC-PH-CP-ABE: An Efficient CP-ABE Scheme With Fully Outsourced Computation and Policy Hidden in the Industrial Internet of Things

被引:0
|
作者
Luo, Wei [1 ]
Lv, Ziyi [1 ]
Yang, Laipu [1 ]
Han, Gang [1 ]
Zhang, Xiaoli [1 ]
机构
[1] Xian Univ Posts & Telecommun, Sch Cyberspace Secur, Xian 710121, Peoples R China
基金
中国国家自然科学基金;
关键词
Ciphertext-policy attribute-based encryption (CP-ABE); data sharing; industrial Internet of Things (IIoT); outsourced computation; policy hiding; ATTRIBUTE-BASED ENCRYPTION; ACCESS-CONTROL; SECURITY; PRIVACY;
D O I
10.1109/JSEN.2024.3432276
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The industrial Internet of Things (IIoT) generates a large amount of private data, which can be used to improve production efficiency and optimize production management decisions. However, the openness of the network and the limited resources of sensor devices pose security threats to industrial privacy data, such as illegal access and leakage. Attribute-based encryption (ABE) is a promising solution for solving the problem of private data sharing. Nevertheless, many time-consuming operations, such as bilinear pairing, security of access policies, and attribute revocation issues, pose challenges for ABE in practical applications. To address the above issues, we propose an efficient policy hiding ciphertext-policy ABE (CP-ABE) scheme based on a multivalued attribute access structure with wildcards. It introduces fog computing to achieve fully outsourced computation, reducing the computational overhead of resource constrained terminals. Meanwhile, attribute revocation and user revocation mechanisms were designed to achieve flexible and fine-grained access control. Based on the idea of reduction, we have demonstrated that our scheme is secure under the assumption of the decision q-bilinear Diffie-Hellman exponent. In addition, our scheme has both backward and forward securities. Finally, we compared and analyzed the proposed scheme with the existing schemes in terms of functionality and performance. Theoretical analysis and experimental simulation results show that our scheme has relatively complete functions and has certain advantages in communication costs and computational overhead.
引用
收藏
页码:28971 / 28981
页数:11
相关论文
共 50 条
  • [21] Escrow and Pairing Free CP-ABE Scheme with Forward and Backward Secrecy for Healthcare Internet of Things
    Bhaskar, Sourabh
    Parmar, Keyur
    Jinwala, Devesh C.
    INFORMATION SYSTEMS SECURITY, ICISS 2023, 2023, 14424 : 306 - 316
  • [22] A Novel Approach for Searchable CP-ABE with Hidden Ciphertext-Policy
    Padhya, Mukti
    Jinwala, Devesh
    INFORMATION SYSTEMS SECURITY (ICISS 2014), 2014, 8880 : 167 - 184
  • [23] PHAS-HEKR-CP-ABE: partially policy-hidden CP-ABE with highly efficient key revocation in cloud data sharing system
    Zhang, Wei
    Zhang, Zhishuo
    Xiong, Hu
    Qin, Zhiguang
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2022, 13 (01) : 613 - 627
  • [24] PHAS-HEKR-CP-ABE: partially policy-hidden CP-ABE with highly efficient key revocation in cloud data sharing system
    Wei Zhang
    Zhishuo Zhang
    Hu Xiong
    Zhiguang Qin
    Journal of Ambient Intelligence and Humanized Computing, 2022, 13 : 613 - 627
  • [25] Efficient Multi-Authority CP-ABE IoT Data Sharing Scheme with Hidden Policies
    Zhang X.
    Yao Y.
    Fu J.
    Xie H.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2023, 60 (10): : 2193 - 2202
  • [26] Partially hidden policy multi-authority CP-ABE scheme with constant length ciphertext
    Liu, Yilong
    Xu, Shengwei
    Yue, Ziyan
    Tongxin Xuebao/Journal on Communications, 45 (08): : 20 - 36
  • [27] A Blockchain Copyright Protection Scheme Based on CP-ABE Scheme with Policy Update
    Jiang, Jian
    Gao, Yulong
    Gong, Yufei
    Jiang, Zhengtao
    SENSORS, 2024, 24 (14)
  • [28] An Efficient ECC-Based CP-ABE Scheme for Power IoT
    Cheng, Rui
    Wu, Kehe
    Su, Yuling
    Li, Wei
    Cui, Wenchao
    Tong, Jie
    PROCESSES, 2021, 9 (07)
  • [29] A Blockchain-Based CP-ABE Scheme with Partially Hidden Access Structures
    Ba Y.
    Hu X.
    Chen Y.
    Hao Z.
    Li X.
    Yan X.
    Security and Communication Networks, 2021, 2021
  • [30] Batch-Based CP-ABE with Attribute Revocation Mechanism for the Internet of Things
    Touati, Lyes
    Challal, Yacine
    2015 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2015, : 1044 - 1049