Multi-Authority Revocable Access Control Method Based on CP-ABE in NDN

被引:5
|
作者
Wu, Zhijun [1 ]
Zhang, Yun [1 ]
Xu, Enzhong [1 ]
机构
[1] Civil Aviat Univ China, Sch Elect Informat & Automat, Tianjin 300300, Peoples R China
来源
FUTURE INTERNET | 2020年 / 12卷 / 01期
基金
中国国家自然科学基金;
关键词
Information-Centric Network (ICN); Naming Data Network (NDN); access control; multiple Authorization; Ciphertext-Policy Attribute-Based Encryption (CP-ABE);
D O I
10.3390/fi12010015
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
For the future of the Internet, because information-centric network (ICN) have natural advantages in terms of content distribution, mobility, and security, it is regarded as a potential solution, or even the key, to solve many current problems. Named Data Network (NDN) is one of the research projects initiated by the United States for network architecture. NDN is a more popular project than ICN. The information cache in the NDN separates content from content publishers, but content security is threatened because of the lack of security controls. Therefore, a multi-authority revocable access control method based on CP-ABE needs to be proposed. This method constructs a proxy-assisted access control scheme, which can implement effective data access control in NDN networks, and the scheme has high security. Because of the partial decryption on the NDN node, the decryption burden of the consumer client in the solution is reduced, and effective user and attribute revocation is achieved, and forward security and backward security are ensured, and collusion attacks are prevented. Finally, through the other security and performance analysis of the scheme of this paper, it proves that the scheme is safe and efficient.
引用
收藏
页数:13
相关论文
共 50 条
  • [31] Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage
    Yang, Kan
    Jia, Xiaohua
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (07) : 1735 - 1744
  • [32] Research on the Update Method of CP-ABE Access Control Strategy Based on Smart Contract
    Hao, Yu
    Cui, Bo
    Li, Ru
    Song, Tingting
    Hou, Wenhan
    COLLABORATIVE COMPUTING: NETWORKING, APPLICATIONS AND WORKSHARING, COLLABORATECOM 2022, PT I, 2022, 460 : 494 - 513
  • [33] A Lightweight Pairing-Free Multi-Authority CP-ABE scheme for Cloud-Edge-Assisted IoT
    Guo, Chong
    Peng, Tianqi
    Zhang, Jiangjiang
    Yang, Yuxin
    Luo, Yihang
    Zhu, Guangzhuo
    2024 9TH INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION SYSTEMS, ICCCS 2024, 2024, : 991 - 996
  • [34] PCS-ABE (t, n): a secure threshold multi authority CP-ABE scheme based efficient access control systems for cloud environment
    Dharavath Ramesh
    Rahul Mishra
    Munesh Chandra Trivedi
    Journal of Ambient Intelligence and Humanized Computing, 2021, 12 : 9303 - 9322
  • [35] mRLWE-CP-ABE: A revocable CP-ABE for post-quantum cryptography
    Cianfriglia, Marco
    Onofri, Elia
    Pedicini, Marco
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2024, 18 (01)
  • [36] PCS-ABE (t, n): a secure threshold multi authority CP-ABE scheme based efficient access control systems for cloud environment
    Ramesh, Dharavath
    Mishra, Rahul
    Trivedi, Munesh Chandra
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 12 (10) : 9303 - 9322
  • [37] Research on Access Control Based on CP-ABE Algorithm and Cloud Computing
    Zhang Shaomin
    Ran Jun
    Wang Baoyi
    APPLIED SCIENCE, MATERIALS SCIENCE AND INFORMATION TECHNOLOGIES IN INDUSTRY, 2014, 513-517 : 2273 - 2276
  • [38] A multi Ability CP-ABE access control scheme for public cloud storage
    Deepthi, Kothapalli Chaitanya
    Ashok, Dasari
    Krishna, M.
    INTERNATIONAL CONFERENCE ON COMPUTER VISION AND MACHINE LEARNING, 2019, 1228
  • [39] A CP-ABE Based Design for Encrypted Data Access Control System
    Zhou, Yan-Ping
    Zhao, Yi-Ning
    Li, Tong-Liang
    INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND INFORMATION SECURITY (CNIS 2015), 2015, : 9 - 15
  • [40] Highly Efficient and Revocable CP-ABE with Outsourcing Decryption for IoT
    Abdollahi, Sina
    Mohajeri, Javad
    Salmasizadeh, Mahmoud
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2023, 15 (01): : 97 - 110