FOC-PH-CP-ABE: An Efficient CP-ABE Scheme With Fully Outsourced Computation and Policy Hidden in the Industrial Internet of Things

被引:0
|
作者
Luo, Wei [1 ]
Lv, Ziyi [1 ]
Yang, Laipu [1 ]
Han, Gang [1 ]
Zhang, Xiaoli [1 ]
机构
[1] Xian Univ Posts & Telecommun, Sch Cyberspace Secur, Xian 710121, Peoples R China
基金
中国国家自然科学基金;
关键词
Ciphertext-policy attribute-based encryption (CP-ABE); data sharing; industrial Internet of Things (IIoT); outsourced computation; policy hiding; ATTRIBUTE-BASED ENCRYPTION; ACCESS-CONTROL; SECURITY; PRIVACY;
D O I
10.1109/JSEN.2024.3432276
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The industrial Internet of Things (IIoT) generates a large amount of private data, which can be used to improve production efficiency and optimize production management decisions. However, the openness of the network and the limited resources of sensor devices pose security threats to industrial privacy data, such as illegal access and leakage. Attribute-based encryption (ABE) is a promising solution for solving the problem of private data sharing. Nevertheless, many time-consuming operations, such as bilinear pairing, security of access policies, and attribute revocation issues, pose challenges for ABE in practical applications. To address the above issues, we propose an efficient policy hiding ciphertext-policy ABE (CP-ABE) scheme based on a multivalued attribute access structure with wildcards. It introduces fog computing to achieve fully outsourced computation, reducing the computational overhead of resource constrained terminals. Meanwhile, attribute revocation and user revocation mechanisms were designed to achieve flexible and fine-grained access control. Based on the idea of reduction, we have demonstrated that our scheme is secure under the assumption of the decision q-bilinear Diffie-Hellman exponent. In addition, our scheme has both backward and forward securities. Finally, we compared and analyzed the proposed scheme with the existing schemes in terms of functionality and performance. Theoretical analysis and experimental simulation results show that our scheme has relatively complete functions and has certain advantages in communication costs and computational overhead.
引用
收藏
页码:28971 / 28981
页数:11
相关论文
共 50 条
  • [31] PUL-ABE: An Efficient and Quantum-Resistant CP-ABE With Policy Update in Cloud Storage
    Yang, Mengxue
    Wang, Huaqun
    Wan, Zhiguo
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2024, 17 (03) : 1126 - 1139
  • [32] Fully secure non-monotonic access structure CP-ABE scheme
    Yang, Dan
    Wang, Baocang
    Ban, Xuehua
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2018, 12 (03): : 1315 - 1329
  • [33] CP-ABE Access Control Scheme for Sensitive Data Set Constraint with Hidden Access Policy and Constraint Policy
    Helil, Nurmamat
    Rahman, Kaysar
    SECURITY AND COMMUNICATION NETWORKS, 2017,
  • [34] An Encryption and Decryption Outsourcing CP-ABE scheme Supporting Efficient Ciphertext Evolution
    Yan, Xincheng
    Chen, Yue
    Zhai, Yuchang
    Ba, Yang
    Li, XueWei
    Jia, Hongyong
    2020 4TH INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, SECURITY AND PRIVACY (ICCSP 2020), 2020, : 116 - 125
  • [35] A Tree-based CP-ABE Scheme with Hidden Policy Supporting Secure Data Sharing in Cloud Computing
    Xu, Runhua
    Wang, Yang
    Lang, Bo
    2013 INTERNATIONAL CONFERENCE ON ADVANCED CLOUD AND BIG DATA (CBD), 2013, : 51 - 57
  • [36] Multi-Authority-Based File Hierarchy Hidden CP-ABE Scheme for Cloud Security
    G. K. Sandhia
    S. V. Kasmir Raja
    K. R. Jansi
    Service Oriented Computing and Applications, 2018, 12 (3-4) : 295 - 303
  • [37] Multi-Authority-Based File Hierarchy Hidden CP-ABE Scheme for Cloud Security
    Sandhia, G. K.
    Raja, S. V. Kasmir
    Jansi, K. R.
    SERVICE ORIENTED COMPUTING AND APPLICATIONS, 2018, 12 (3-4) : 295 - 303
  • [38] Blockchain based context-aware CP-ABE schema for Internet of Medical Things security
    Annane, Boubakeur
    Alti, Adel
    Lakehal, Abderrahim
    ARRAY, 2022, 14
  • [39] Efficient CP-ABE Scheme Resistant to Key Leakage for Secure Cloud-Fog Computing
    Cheng, Fengwei
    Ji, Sai
    Lai, Chin-Feng
    JOURNAL OF INTERNET TECHNOLOGY, 2022, 23 (07): : 1461 - 1471
  • [40] A Secure and Efficient Access-Control Scheme Based on Blockchain and CP-ABE for UAV Swarm
    Han, Pengbin
    Sui, Aina
    Wu, Jiang
    DRONES, 2025, 9 (02)