An Anonymous and Outsourcing-Supported Multiauthority Access Control Scheme With Revocation for Edge-Enabled IIoT System

被引:7
|
作者
Cui, Jie [1 ,2 ]
Bian, Fengyu [1 ,2 ]
Zhong, Hong [1 ,2 ]
Zhang, Qingyang [1 ,2 ]
Xu, Sheng [1 ,2 ]
Gu, Chengjie [3 ]
Liu, Lu [4 ]
机构
[1] Anhui Univ, Anhui Engn Lab IoT Secur Technol, Sch Comp Sci & Technol, Hefei 230039, Peoples R China
[2] Anhui Univ, Inst Phys Sci & Informat Technol, Hefei 230039, Peoples R China
[3] Secur Res Inst, New H3C Grp, Hefei 230088, Peoples R China
[4] Univ Leicester, Sch Informat, Leicester LE1 7RH, Leics, England
来源
IEEE SYSTEMS JOURNAL | 2022年 / 16卷 / 04期
关键词
Industrial Internet of Things; Encryption; Privacy; Security; Access control; Hospitals; Servers; Attribute-based encryption (ABE); edge computing; Industrial Internet of Things (IIoT); multiauthority; ATTRIBUTE-BASED ENCRYPTION; EFFICIENT; SECURE; INTERNET;
D O I
10.1109/JSYST.2022.3189219
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the application of the Internet of Things and intelligent technologies in industrial systems, the manufacturing efficiency and product quality have been improved, leading to the development of the Industrial Internet of Things (IIoT). Uploading private data to the cloud may lead to data leakage without security protection. Thus, attribute-based encryption (ABE) is widely used to ensure data security and implement data access control, and some multiauthority ABE schemes are proposed to meet the requirement of attributes from different authorities, such as factory and government, which is more suitable for the IIoT system. However, the current multiauthority ABE schemes are with privacy leakage problems on attributes and low-efficiency issues. To address these problems, we propose a multiauthority ABE scheme, which protects users' privacy by anonymizing attributes in authentication, reduces the computing burden of IIoT devices by adapting online/offline technique and outsourcing decryption to edge devices, and realizes effective attribute revocation. A formal security proof is presented that our scheme is replayable chosen ciphertext attack secure. Finally, we implement the proposed scheme, and experimental results show that our scheme is more efficient than the existing schemes.
引用
收藏
页码:6569 / 6580
页数:12
相关论文
共 15 条
  • [1] An efficient and outsourcing-supported attribute-based access control scheme for edge-enabled smart healthcare
    Zhong, Hong
    Zhou, Yiyuan
    Zhang, Qingyang
    Xu, Yan
    Cui, Jie
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2021, 115 : 486 - 496
  • [2] Anonymous Message Authentication Scheme for Semitrusted Edge-Enabled IIoT
    Cui, Jie
    Wang, Fengqun
    Zhang, Qingyang
    Xu, Yan
    Zhong, Hong
    IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2021, 68 (12) : 12921 - 12929
  • [3] Revocable certificate-based broadcast signcryption scheme for edge-enabled IIoT
    Gao, Yan
    Deng, Lunzhi
    Liu, Huan
    Li, Binhan
    Wang, Na
    INFORMATION SCIENCES, 2025, 690
  • [4] Outsourcing multiauthority access control revocation and computations over medical data to mobile cloud
    Koe, Arthur S. Voundi
    Chen, Qi
    Tang, Juan
    Ai, Shan
    Yan, Hongyang
    Zhang, Shiwen
    Wong, Duncan S.
    INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2022, 37 (11) : 9774 - 9797
  • [5] An Efficient Access Control Scheme With Outsourcing and Attribute Revocation for Fog-Enabled E-Health
    Zhao, Jing
    Zeng, Peng
    Choo, Kim-Kwang Raymond
    IEEE ACCESS, 2021, 9 : 13789 - 13799
  • [6] Trust-AoI-Aware Codesign of Scheduling and Control for Edge-Enabled IIoT Systems
    Wang, Xiaolin
    Zhang, Jinglong
    Chen, Cailian
    He, Jianping
    Ma, Yehan
    Guan, Xinping
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2024, 20 (02) : 2833 - 2842
  • [7] Blockchain and Onion-Routing-Based Secure Message Exchange System for Edge-Enabled IIoT
    Gupta, Rajesh
    Jadav, Nilesh Kumar
    Mankodiya, Harsh
    Alshehri, Mohammad Dahman
    Tanwar, Sudeep
    Sharma, Ravi
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2023, 19 (02) : 1965 - 1976
  • [8] TRAC: Traceable and Revocable Access Control Scheme for mHealth in 5G-Enabled IIoT
    Li, Qi
    Xia, Bin
    Huang, Haiping
    Zhang, Yinghui
    Zhang, Tao
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (05) : 3437 - 3448
  • [9] A secure and efficient access control scheme with attribute revocation and merging capabilities for fog-enabled IoT?
    Sarma, Richa
    Barbhuiya, Ferdous Ahmed
    COMPUTERS & ELECTRICAL ENGINEERING, 2022, 104
  • [10] An Identity Preserving Access Control Scheme with Flexible System Privilege Revocation in Cloud Computing
    Ahuja, Rohit
    Mohanty, Sraban Kumar
    Sakurai, Kouichi
    2016 11TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS), 2016, : 39 - 47