A Multi-authority CP-ABE Scheme based on Cloud-Chain Fusion for SWIM

被引:0
|
作者
Wang, Qing [1 ]
Zhang, Lizhe [1 ]
Lu, Xin [1 ]
Wang, Kenian [1 ]
机构
[1] Civil Aviat Univ China, Coll Safety Sci & Engn, Tianjin, Peoples R China
关键词
SWIM; CP-ABE; multi-authority; cloud-chain fusion; verifiable; auditable; ACCESS-CONTROL;
D O I
10.1109/ISPA-BDCloud-SocialCom-SustainCom57177.2022.00034
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
SWIM (System Wide Information Management) has become the development direction of ATM (Air Traffic Management) system by providing interoperable services to promote the exchange and sharing of data among various stakeholders. The premise of data sharing is security, and the access control has become the key guarantee for the secure sharing and exchange. The CP-ABE scheme (Ciphertext Policy Attribute-Based Encryption) can realize one-to-many access control, which is suitable for the characteristics of SWIM environment. However, the combination of the existing CP-ABE access control and SWIM has following constraints. 1. The traditional single authority CP-ABE scheme requires unconditional trust in the authority center. Once the authority center is corrupted, the excessive authority of the center may lead to the complete destruction of system security. So, SWIM with a large user group and data volume requires multiple authorities CP-ABE when performing access control. 2. There is no unified management of users' data access records. Lack of supervision on user behavior make it impossible to effectively deter malicious users. 3. There are a certain proportion of lightweight data users in SWIM, such as aircraft, users with handheld devices, etc. And their computing capacity becomes the bottleneck of data sharing. Aiming at these issues above, this paper based on cloud-chain fusion basically proposes a multi-authority CP-ABE scheme, called the MOVATM scheme, which has three advantages. 1. Based on a multi-cloud and multi-authority CP-ABE, this solution conforms to the distributed nature of SWIM; 2. This scheme provides outsourced computing and verification functions for lightweight users; 3. Based on blockchain technology, a blockchain that is maintained by all stakeholders of SWIM is designed. It takes user's access records as transactions to ensure that access records are well documented and cannot be tampered with. Compared with other schemes, this scheme adds the functions of multi-authority, outsourcing, verifiability and auditability, but do not increase the decryption cost of users.
引用
收藏
页码:213 / 219
页数:7
相关论文
共 50 条
  • [1] Multi-Authority Scheme based CP-ABE with Attribute Revocation for Cloud Data Storage
    Ramesh, Dharavath
    Priya, Rashmi
    [J]. 2016 INTERNATIONAL CONFERENCE ON MICROELECTRONICS, COMPUTING AND COMMUNICATIONS (MICROCOM), 2016,
  • [2] A decentralized multi-authority CP-ABE scheme from LWE
    Yao, Yun-Fei
    Chen, Hui-Yan
    Gao, You
    Wang, Ke
    Yu, Hao-Yang
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2024, 82
  • [3] Practical revocable and multi-authority CP-ABE scheme from RLWE for Cloud Computing
    Yang, Yang
    Sun, Jianguo
    Liu, Zechao
    Qiao, YuQing
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 65
  • [4] A CP-ABE scheme based on multi-authority in hybrid clouds for mobile devices
    Xie, Mande
    Ruan, Yingying
    Hong, Haibo
    Shao, Jun
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2021, 121 : 114 - 122
  • [5] Efficient Multi-Authority CP-ABE IoT Data Sharing Scheme with Hidden Policies
    Zhang X.
    Yao Y.
    Fu J.
    Xie H.
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2023, 60 (10): : 2193 - 2202
  • [6] Partially hidden policy multi-authority CP-ABE scheme with constant length ciphertext
    Liu, Yilong
    Xu, Shengwei
    Yue, Ziyan
    [J]. Tongxin Xuebao/Journal on Communications, 45 (08): : 20 - 36
  • [7] Multi-Authority Revocable Access Control Method Based on CP-ABE in NDN
    Wu, Zhijun
    Zhang, Yun
    Xu, Enzhong
    [J]. FUTURE INTERNET, 2020, 12 (01):
  • [8] Research on Multi-Authority CP-ABE Access Control Model in Multicloud
    Shengli Zhou
    Guangxuan Chen
    Guangjie Huang
    Jin Shi
    Ting Kong
    [J]. China Communications, 2020, 17 (08) : 220 - 233
  • [9] Multi-Authority-Based File Hierarchy Hidden CP-ABE Scheme for Cloud Security
    G. K. Sandhia
    S. V. Kasmir Raja
    K. R. Jansi
    [J]. Service Oriented Computing and Applications, 2018, 12 (3-4) : 295 - 303
  • [10] Efficient Compressed Ciphertext Length Scheme Using Multi-Authority CP-ABE for Hierarchical Attributes
    Zhang, Zhiyong
    Li, Cheng
    Gupta, Brij B.
    Niu, Danmei
    [J]. IEEE ACCESS, 2018, 6 : 38273 - 38284