Accountable and Revocable Large Universe Decentralized Multi-Authority Attribute-Based Encryption for Cloud-Aided IoT

被引:11
|
作者
Huang, Kaiqing [1 ,2 ]
机构
[1] Dongguan Polytech, Modern Ind Innovat Practice Ctr, Dongguan 523808, Peoples R China
[2] South China Normal Univ, Sch Math Sci, Guangzhou 510631, Peoples R China
关键词
Encryption; Access control; Internet of Things; Outsourcing; Licenses; Cloud computing; Technological innovation; Decentralized; multi-authority attribute-based encryption; accountability; user-attribute revocation; outsourcing decryption; collusion attack; DATA ACCESS-CONTROL; TRACEABLE CP-ABE; EFFICIENT; INTERNET; STORAGE; THINGS; REVOCATION;
D O I
10.1109/ACCESS.2021.3110824
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The data collected, stored, shared, and accessed across different platforms in the dynamic IoT is mostly confidential and privacy-sensitive. Data security and access control issues urgently need to be addressed. Multi-authority attribute-based encryption (MA-ABE) is seen as a potential solution for addressing data access control security concerns in the dynamic IoT since it allows for dynamic access control over encrypted data. However, the existing key abuse problem is severely destroying the security access control of MA-ABE. The existing accountable attribute-based encryption schemes only support small attributes (users) universe and single authority. Moreover, they do not support revocation. Some schemes are inefficient since they are constructed in the composite order bilinear group. In this article, the author proposes the first accountable and revocable large universe decentralized multi-authority attribute-based encryption scheme with outsourcing decryption based on prime order bilinear groups. The proposed scheme allows for the dynamic capacity expansion of attributes, users, and authorities. An audit mechanism is given to judge if the suspicious key was leaked by a malicious user or by authorities and to determine the identity of the leaker. The malicious user who divulges key can be punished by user-attribute revocation. The revocation mechanism is resistant to collusion attacks undertaken by revoked users and non-revoked users. Meanwhile, it satisfies the requirements of forward and backward security. The proposed scheme is static security in the random oracle model under the q-DPBDHE2 assumption. To save resources, the outsourced decryption module is optional for users with restricted resources. According to the results of the performance analysis, it is suited for large-scale cross-domain cooperation in the dynamic cloud-aided IoT.
引用
收藏
页码:123786 / 123804
页数:19
相关论文
共 50 条
  • [1] Revocable Large Universe Decentralized Multi-Authority Attribute-Based Encryption Without Key Abuse for Cloud-Aided IoT
    Huang, Kaiqing
    IEEE ACCESS, 2021, 9 : 151713 - 151728
  • [2] Secure Efficient Revocable Large Universe Multi-Authority Attribute-Based Encryption for Cloud-Aided IoT
    Huang, Kaiqing
    IEEE ACCESS, 2021, 9 : 53576 - 53588
  • [3] Efficient Revocable Multi-Authority Attribute-Based Encryption for Cloud Storage
    Ming, Yang
    He, Baokang
    Wang, Chenhao
    IEEE ACCESS, 2021, 9 : 42593 - 42603
  • [4] Attribute Revocable Multi-Authority Attribute-Based Encryption with Forward Secrecy for Cloud Storage
    Nomura, Kenta
    Mohri, Masami
    Shiraishi, Yoshiaki
    Morii, Masakatu
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2017, E100D (10) : 2420 - 2431
  • [5] A revocable multi-authority attribute-based encryption scheme for fog-enabled IoT
    Penuelas-Angulo, Alejandro
    Feregrino-Uribe, Claudia
    Morales-Sandoval, Miguel
    JOURNAL OF SYSTEMS ARCHITECTURE, 2024, 155
  • [6] A survey on multi-authority and decentralized attribute-based encryption
    Prince Silas Kwesi Oberko
    Victor-Hillary Kofi Setornyo Obeng
    Hu Xiong
    Journal of Ambient Intelligence and Humanized Computing, 2022, 13 : 515 - 533
  • [7] A survey on multi-authority and decentralized attribute-based encryption
    Oberko, Prince Silas Kwesi
    Obeng, Victor-Hillary Kofi Setornyo
    Xiong, Hu
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2022, 13 (01) : 515 - 533
  • [8] Decentralized Multi-Authority Attribute-based Searchable Encryption Scheme
    Ren, Juan
    Zhang, Leyou
    Wang, Baocang
    International Journal of Network Security, 2021, 23 (02) : 332 - 342
  • [9] A revocable and outsourced multi-authority attribute-based encryption scheme in fog computing
    Tu, Shanshan
    Waqas, Muhammad
    Huang, Fengming
    Abbas, Ghulam
    Abbas, Ziaul Haq
    COMPUTER NETWORKS, 2021, 195
  • [10] Traceable and revocable multi-authority attribute-based keyword search for cloud storage
    Varri, Uma Sankararao
    Pasupuleti, Syam Kumar
    Kadambari, K., V
    JOURNAL OF SYSTEMS ARCHITECTURE, 2022, 132