A Policy-Hiding Attribute-Based Access Control Scheme in Decentralized Trust Management

被引:4
|
作者
Ruan, Conghao [1 ]
Hu, Chunqiang [1 ]
Zhao, Ruifeng [2 ]
Liu, Zewei [1 ]
Huang, Hongyu [3 ]
Yu, Jiguo [4 ]
机构
[1] Chongqing Univ, Sch Big Data & Software Engn, Chongqing 400044, Peoples R China
[2] Guangdong Power Grid Co Ltd, Elect Power Dispatching & Control Ctr, Guangzhou 510699, Peoples R China
[3] Chongqing Univ, Coll Comp Sci, Chongqing 400044, Peoples R China
[4] Qilu Univ Technol, Big Data Inst, Jinan 250353, Peoples R China
基金
中国国家自然科学基金;
关键词
Access control; decentralized trust management; Internet of Medical Things (IoMT); privacy protection; DUAL SYSTEM ENCRYPTION; PRIVACY; INTERNET; THINGS; HIBE;
D O I
10.1109/JIOT.2023.3280751
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Medical Things (IoMT) technologies significantly improve the quality of health care, especially at the time when COVID-19 is becoming a worldwide pandemic. Due to the complexity of devices and user nodes in the IoMT system, there should be some ways to ensure the security and quality of the service or information. Decentralized trust management techniques are efficient means of promoting application security and reliability in these cases. However, the majority of currently utilized access control schemes cannot be applied in decentralized trust management systems or perform poorly owing to the numerous restrictions of decentralized systems. In this article, we present a policy-hiding and multiauthority key generation CP-ABE scheme (PM-CPABE) for decentralized trust management systems, which could provide fine-grained access control capabilities. Meanwhile, the proposed scheme does not require any fully trusted entity, thus it can be well adapted to decentralized trust management systems. The scheme also implements policy hiding to protect user privacy. In addition, it supports large universe and outsourced decryption. The security analyses and performance comparisons give evidence of our scheme is secure and efficient.
引用
收藏
页码:17656 / 17665
页数:10
相关论文
共 50 条
  • [1] Ciphertext Policy-Hiding Attribute-Based Encryption
    Yadav, Umesh Chandra
    Ali, Syed Taqi
    [J]. 2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2015, : 2067 - 2071
  • [2] Security and Privacy in Smart Health: Efficient Policy-Hiding Attribute-Based Access Control
    Zhang, Yinghui
    Zheng, Dong
    Deng, Robert H.
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (03): : 2130 - 2145
  • [3] Privacy Protection of Task in Crowdsourcing: Policy-Hiding and Attribute Updating Attribute-Based Access Control Based on Blockchain
    Yang, Kunwei
    Yang, Bo
    Zhou, Yanwei
    Wang, Tao
    Gong, Linming
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [4] Blockchain-Enabled decentralized Attribute-Based access control with policy hiding for smart healthcare
    Zhang, Yinghui
    Wei, Xuanni
    Cao, Jin
    Ning, Jianting
    Ying, Zuobin
    Zheng, Dong
    [J]. JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (10) : 8350 - 8361
  • [5] Immediate attribute revocation in decentralized attribute-based access control
    Imine, Youcef
    Lounis, Ahmed
    Bouabdallah, Abdelmadjid
    [J]. 2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 33 - 40
  • [6] Role and attribute-based access control scheme for decentralized medicine supply chain
    Hathaliya, Jigna J.
    Tanwar, Sudeep
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2024, 85
  • [7] Access Control in Decentralized Online Social Networks: Applying a Policy-Hiding Cryptographic Scheme and Evaluating Its Performance
    Bodriagov, Oleksandr
    Kreitz, Gunnar
    Buchegger, Sonja
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS (PERCOM WORKSHOPS), 2014, : 622 - 628
  • [8] Attribute-Based Access Control for the Swarm With Distributed Policy Management
    Fedrecheski, Geovane
    Costa De Biase, Laisa Caroline
    Calcina-Ccori, Pablo C.
    Zuffo, Marcelo Knorich
    [J]. IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2019, 65 (01) : 90 - 98
  • [9] Ciphertext-policy attribute-based encryption supporting policy-hiding and cloud auditing in smart health
    Wang, Huiyong
    Liang, Jialing
    Ding, Yong
    Tang, Shijie
    Wang, Yujue
    [J]. COMPUTER STANDARDS & INTERFACES, 2023, 84
  • [10] Privacy-Preserving Attribute-Based Access Control Scheme With Intrusion Detection and Policy Hiding for Data Sharing in VANET
    Wang, Zhihua
    Wang, Jiarui
    Liu, Yu
    Yang, Xiaolong
    Qi, Fazhi
    Song, Wei
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (13): : 23348 - 23369