Lightweight Revocable Hierarchical Attribute-Based Encryption for Internet of Things

被引:31
|
作者
Ali, Mohammad [1 ]
Sadeghi, Mohammad-Reza [1 ]
Liu, Ximeng [2 ,3 ]
机构
[1] Amirkabir Univ Technol, Dept Math & Comp Sci, Tehran 158754413, Iran
[2] Guangdong Prov Key Lab Data Secur & Privacy Prote, Guangzhou 510632, Peoples R China
[3] Xidian Univ, Shaanxi Key Lab Network & Syst Secur, Xian 710071, Peoples R China
基金
中国国家自然科学基金;
关键词
Internet of Things; cloud computing; fine-grained access control; attribute-based encryption; light weight computation; SCHEDULING ALGORITHMS; DATA ACCESS; CP-ABE; SCHEME; SECURE; REVOCATION;
D O I
10.1109/ACCESS.2020.2969957
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) is an emerging technology that can benefit from cloud infrastructure. In a cloud-based IoT network, a variety of data is collected by smart devices and transmitted to a cloud server. However, since the data may contain sensitive information about individuals, providing confidentiality and access control is essential to protect the users' privacy. Attribute-based encryption (ABE) is a promising tool to provide these requirements. However, most of ABE schemes neither provide efficient encryption and decryption mechanisms nor offer flexible and efficient key delegation and user revocation approaches. In this paper, to address these issues, we propose a lightweight revocable hierarchical ABE (LW-RHABE) scheme. In our scheme, computation overhead on the user side is very efficient, and most of the computational operations are performed by the cloud server. Also, using the hierarchical model, our scheme offers flexible and scalable key delegation and user revocation mechanisms. Indeed, in our scheme, key delegation and user revocation associated with each attribute can be handled by several key authorities. We provide the security definition for LW-RHABE, and we prove its security in the standard model and under the hardness assumption of the decisional bilinear Diffie-Hellman (DBDH) problem.
引用
收藏
页码:23951 / 23964
页数:14
相关论文
共 50 条
  • [31] Efficient Revocable Attribute-Based Encryption With Verifiable Data Integrity
    Chen, Shaobo
    Li, Jiguo
    Zhang, Yichen
    Han, Jinguang
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (06) : 10441 - 10451
  • [32] Generic Constructions for Fully Secure Revocable Attribute-Based Encryption
    Yamada, Kotoko
    Attrapadung, Nuttapong
    Emura, Keita
    Hanaoka, Goichiro
    Tanaka, Keisuke
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2018, E101A (09): : 1456 - 1472
  • [33] Generic Constructions for Fully Secure Revocable Attribute-Based Encryption
    Yamada, Kotoko
    Attrapadung, Nuttapong
    Emura, Keita
    Hanaoka, Goichiro
    Tanaka, Keisuke
    COMPUTER SECURITY - ESORICS 2017, PT II, 2017, 10493 : 532 - 551
  • [34] Blockchain-Assisted Hierarchical Attribute-Based Encryption Scheme for Secure Information Sharing in Industrial Internet of Things
    Sasikumar, A.
    Ravi, Logesh
    Devarajan, Malathi
    Selvalakshmi, A.
    Almaktoom, Abdulaziz Turki
    Almazyad, Abdulaziz S.
    Xiong, Guojiang
    Mohamed, Ali Wagdy
    IEEE ACCESS, 2024, 12 : 12586 - 12601
  • [35] Applying Attribute-based Encryption on Publish Subscribe Messaging Patterns for the Internet of Things
    Thatmann, Dirk
    Zickau, Sebastian
    Foerster, Alexander
    Kuepper, Axel
    2015 IEEE INTERNATIONAL CONFERENCE ON DATA SCIENCE AND DATA INTENSIVE SYSTEMS, 2015, : 556 - 563
  • [36] Developing a Secure Architecture for Internet of Medical Things Using Attribute-Based Encryption
    Ghanbarafjeh, Milad
    Barati, Masoud
    Rana, Omer
    Ranjan, Rajiv
    2022 IEEE/ACM 15TH INTERNATIONAL CONFERENCE ON UTILITY AND CLOUD COMPUTING, UCC, 2022, : 157 - 162
  • [37] Revocable Attribute-based Encryption with Escrow-free in Cloud Storage
    Zhao Zhiyuan
    Zhu Zhiqiang
    Wang Jianhua
    Sun Lei
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2018, 40 (01) : 1 - 10
  • [38] Attribute Revocable Attribute-Based Encryption for Decentralized Disruption-Tolerant Military Networks
    Nomura, Kenta
    Mohri, Masami
    Ii, Yoshiaki Si Iiraisi
    Morii, Masakatu
    PROCEEDINGS OF 2015 THIRD INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING (CANDAR), 2015, : 491 - 494
  • [39] A Traceable and Revocable Multiauthority Attribute-Based Encryption Scheme with Fast Access
    Zhang, Kai
    Li, Yanping
    Song, Yun
    Lu, Laifeng
    Zhang, Tao
    Jiang, Qi
    SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [40] Decentralized, Revocable and Verifiable Attribute-Based Encryption in Hybrid Cloud System
    Ping Yu
    Qiaoyan Wen
    Wei Ni
    Wenmin Li
    Caijun Sun
    Hua Zhang
    Zhengping Jin
    Wireless Personal Communications, 2019, 106 : 719 - 738