A Policy-Hiding Attribute-Based Access Control Scheme in Decentralized Trust Management

被引:4
|
作者
Ruan, Conghao [1 ]
Hu, Chunqiang [1 ]
Zhao, Ruifeng [2 ]
Liu, Zewei [1 ]
Huang, Hongyu [3 ]
Yu, Jiguo [4 ]
机构
[1] Chongqing Univ, Sch Big Data & Software Engn, Chongqing 400044, Peoples R China
[2] Guangdong Power Grid Co Ltd, Elect Power Dispatching & Control Ctr, Guangzhou 510699, Peoples R China
[3] Chongqing Univ, Coll Comp Sci, Chongqing 400044, Peoples R China
[4] Qilu Univ Technol, Big Data Inst, Jinan 250353, Peoples R China
基金
中国国家自然科学基金;
关键词
Access control; decentralized trust management; Internet of Medical Things (IoMT); privacy protection; DUAL SYSTEM ENCRYPTION; PRIVACY; INTERNET; THINGS; HIBE;
D O I
10.1109/JIOT.2023.3280751
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Medical Things (IoMT) technologies significantly improve the quality of health care, especially at the time when COVID-19 is becoming a worldwide pandemic. Due to the complexity of devices and user nodes in the IoMT system, there should be some ways to ensure the security and quality of the service or information. Decentralized trust management techniques are efficient means of promoting application security and reliability in these cases. However, the majority of currently utilized access control schemes cannot be applied in decentralized trust management systems or perform poorly owing to the numerous restrictions of decentralized systems. In this article, we present a policy-hiding and multiauthority key generation CP-ABE scheme (PM-CPABE) for decentralized trust management systems, which could provide fine-grained access control capabilities. Meanwhile, the proposed scheme does not require any fully trusted entity, thus it can be well adapted to decentralized trust management systems. The scheme also implements policy hiding to protect user privacy. In addition, it supports large universe and outsourced decryption. The security analyses and performance comparisons give evidence of our scheme is secure and efficient.
引用
收藏
页码:17656 / 17665
页数:10
相关论文
共 50 条
  • [41] A Traceable and Revocable Attribute-based Encryption Scheme Based on Policy Hiding in Smart Healthcare Scenarios
    Zhao, Yang
    Liu, Zhaozhong
    An, Jingmin
    Zhu, Guobin
    Kumari, Saru
    [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2022, 2022, 13620 : 624 - 639
  • [42] Using attribute-based access control to enable attribute-based messaging
    Bobba, Rakesh
    Fatemieh, Omid
    Khan, Fariba
    Gunter, Carl A.
    Khurana, Himanshu
    [J]. 22ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2006, : 403 - +
  • [43] A traceable and revocable decentralized attribute-based encryption scheme with fully hidden access policy for cloud-based smart healthcare
    Dai, Yue
    Xue, Lulu
    Yang, Bo
    Wang, Tao
    Zhang, Kejia
    [J]. Computer Standards and Interfaces, 2025, 92
  • [44] An Automatic Attribute-Based Access Control Policy Extraction From Access Logs
    Karimi, Leila
    Aldairi, Maryam
    Joshi, James
    Abdelhakim, Mai
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (04) : 2304 - 2317
  • [45] Anonymous decentralized attribute-based access control for cloud-assisted IoT
    Nasiraee, Hassan
    Ashouri-Talouki, Maede
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 110 : 45 - 56
  • [46] Efficient Decentralized Attribute-based Access Control for Cloud Storage with User Revocation
    Chen, Jianwei
    Ma, Huadong
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2014, : 3782 - 3787
  • [47] Attribute-based access control scheme for the perceptive layer of the internet of things
    Ren, Fang
    Ma, Jianfeng
    Hao, Xuanwen
    [J]. Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2012, 39 (02): : 66 - 72
  • [48] Attribute-based access control scheme for data sharing on hyperledger fabric
    Zhao, Xiaojie
    Wang, Shangping
    Zhang, Yaling
    Wang, Yu
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 67
  • [49] Accountable specific attribute-based encryption scheme for cloud access control
    Nayudu, P. Prathap
    Sekhar, Krovi Raja
    [J]. INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2022,
  • [50] A Revocable and Fair Outsourcing Attribute-Based Access Control Scheme in Metaverse
    Ruan, Conghao
    Hu, Chunqiang
    Li, Xingwang
    Deng, Shaojiang
    Liu, Zewei
    Yu, Jiguo
    [J]. IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2024, 70 (01) : 3781 - 3791