Data Access Control Scheme Based on Blockchain and Outsourced Verifiable Attribute-Based Encryption in Edge Computing

被引:0
|
作者
Ma, Chao [1 ]
Jin, Xiaojun [2 ]
Luo, Song [1 ]
Wei, Yifei [2 ]
Wang, Xiaojun [3 ]
机构
[1] China Acad Informat & Commun Technol, Beijing 100045, Peoples R China
[2] Univ Posts & Telecommun, Beijing 100876, Peoples R China
[3] Dublin City Univ, Dublin, Dublin, Ireland
关键词
Blockchain; CP-ABE; Edge Computing; Date Sharing; Attribute Revocation;
D O I
10.3837/tiis.2023.07.011
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The arrival of the Internet of Things and 5G technology enables users to rely on edge computing platforms to process massive data. Data sharing based on edge computing refines the efficiency of data collection and analysis, saves the communication cost of data transmission back and forth, but also causes the privacy leakage of a lot of user data. Based on attribute-based encryption and blockchain technology, we design a fine-grained access control scheme for data in edge computing, which has the characteristics of verifiability, support for outsourcing decryption and user attribute revocation. User attributes are authorized by multi-attribute authorization, and the calculation of outsourcing decryption in attribute encryption is completed by edge server, which reduces the computing cost of end users. Meanwhile, We implemented the user's attribute revocation process through the dual encryption process of attribute authority and blockchain. Compared with other schemes, our scheme can manage users' attributes more flexibly. Blockchain technology also ensures the verifiability in the process of outsourcing decryption, which reduces the space occupied by ciphertext compared with other schemes. Meanwhile, the user attribute revocation scheme realizes the dynamic management of user attribute and protects the privacy of user attribute.
引用
收藏
页码:1935 / 1950
页数:16
相关论文
共 50 条
  • [1] Verifiable and Exculpable Outsourced Attribute-Based Encryption for Access Control in Cloud Computing
    Ma, Hui
    Zhang, Rui
    Wan, Zhiguo
    Lu, Yao
    Lin, Suqing
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2017, 14 (06) : 679 - 692
  • [2] Comments on "Verifiable and Exculpable Outsourced Attribute-Based Encryption for Access Control in Cloud Computing"
    Xiong, Hu
    Sun, Jianfei
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2017, 14 (04) : 461 - 462
  • [3] Blockchain-based efficient verifiable outsourced attribute-based encryption in cloud
    Hou, Zesen
    Ning, Jianting
    Huang, Xinyi
    Xu, Shengmin
    Zhang, Leo Yu
    [J]. COMPUTER STANDARDS & INTERFACES, 2024, 90
  • [4] Attribute-Based Encryption With Verifiable Outsourced Decryption
    Lai, Junzuo
    Deng, Robert H.
    Guan, Chaowen
    Weng, Jian
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (08) : 1343 - 1354
  • [5] Cloud Storage Data Access Control Scheme Based on Blockchain and Attribute-Based Encryption
    Yang, Xiaodong
    Chen, Aijia
    Wang, Zhisong
    Li, Shudong
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [6] Verifiable outsourced attribute-based signature scheme
    Yanli Ren
    Tiejin Jiang
    [J]. Multimedia Tools and Applications, 2018, 77 : 18105 - 18115
  • [7] Verifiable outsourced attribute-based signature scheme
    Ren, Yanli
    Jiang, Tiejin
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (14) : 18105 - 18115
  • [8] Attribute-based encryption with outsourced decryption in blockchain
    Hui Zheng
    Jun Shao
    Guiyi Wei
    [J]. Peer-to-Peer Networking and Applications, 2020, 13 : 1643 - 1655
  • [9] Auditable σ-Time Outsourced Attribute-Based Encryption for Access Control in Cloud Computing
    Ning, Jianting
    Cao, Zhenfu
    Dong, Xiaolei
    Liang, Kaitai
    Ma, Hui
    Wei, Lifei
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (01) : 94 - 105
  • [10] Attribute-Based Encryption with Publicly Verifiable Outsourced Decryption
    Zheng, Hui
    Shao, Jun
    Wei, Guiyi
    Hue, Li
    Pan, Bianjing
    Liu, Kai
    Mao, Xiaohang
    [J]. NETWORK AND SYSTEM SECURITY, NSS 2019, 2019, 11928 : 552 - 566