Privacy-Preserving Flexible Access Control for Encrypted Data in Internet of Things

被引:11
|
作者
Zhang, Leyou [1 ,2 ]
Wang, Jun [2 ]
Mu, Yi [3 ,4 ]
机构
[1] Xidian Univ, Sch Math & Stat, Xian 710071, Peoples R China
[2] Xidian Univ, Sch Cyber Engn, Xian 710071, Peoples R China
[3] Fujian Normal Univ, Sch Math & Informat, Fuzhou 350007, Peoples R China
[4] Fujian Normal Univ, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou 350007, Peoples R China
基金
中国国家自然科学基金;
关键词
Encryption; Privacy; Dictionaries; Resists; Data privacy; Internet of Things; Access control; Access policy guessing attack; adaptive security; attribute-based encryption (ABE); dictionary attack; hidden policy; ATTRIBUTE-BASED ENCRYPTION; IDENTITY-BASED ENCRYPTION; EFFICIENT; POLICY; SCHEME; SECURE;
D O I
10.1109/JIOT.2021.3071553
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Along with the development of edge computing and the cloud, the Internet of Things (IoT) is affecting and changing people's lives. Data sharing has played an important role in the IoT, but the leakage of private user information poses a new security threat to the users. Thus, flexible fine-grained access control for such shared data is proposed in this article as an effective and secure method of eliminating vulnerabilities. However, the disclosure of access policies will also expose users' private information. Recently, Yang et al. attempted to solve this problem and proposed a framework based on attribute-based encryption for shared data onto IEEE IoT-J(DOI: 10.1109/JIOT.2016.2571718). They hide the access policies by using a bloom filter (BF) and attempt to address privacy preservation in IoT. However, we demonstrate several security weaknesses of their framework and point out its vulnerability to dictionary attacks and access policy guessing attacks. Then, an improved IoT solution is proposed. Under this proposal, the attribute values are stored in BF while the attribute names are embedded in the access policy. The proposed scheme can resist dictionary attacks and access policy guessing attacks. In addition, it simultaneously realizes large attribute sets, an efficient decryption algorithm, and adaptive security. Security analysis and performance evaluations show that the presented scheme achieves higher security and implementation simplicity in the IoT than other currently available schemes.
引用
收藏
页码:14731 / 14745
页数:15
相关论文
共 50 条
  • [1] Privacy-Preserving Channel Access for Internet of Things
    Banerjee, Debasmit
    Dong, Bo
    Taghizadeh, Mahmoud
    Biswas, Subir
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2014, 1 (05): : 430 - 445
  • [2] Privacy-Preserving Data Processing with Flexible Access Control
    Ding, Wenxiu
    Yan, Zheng
    Deng, Robert H.
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (02) : 363 - 376
  • [3] Data privacy-preserving of consortium blockchain in the internet of things
    Beijing Key Laboratory of Communication and Systems, School of Electronic and Information Engineering, Beijing Jiaotong University, Haidian District, Beijing, China
    不详
    [J]. J. Comput, 2020, 3 (275-288): : 275 - 288
  • [4] Privacy-preserving internet of things data filtering scheme
    Zhou, Rang
    Zhang, Xiaosong
    Wang, Xiaofen
    Li, Dongfen
    Chen, Tao
    Zhang, Xiaojun
    [J]. Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2023, 50 (04): : 45 - 53
  • [5] Privacy-Preserving Data Analytics in Internet of Medical Things
    Mudassar, Bakhtawar
    Tahir, Shahzaib
    Khan, Fawad
    Shah, Syed Aziz
    Shah, Syed Ikram
    Abbasi, Qammer Hussain
    [J]. Future Internet, 2024, 16 (11):
  • [6] Blockchain-Enabled Privacy-Preserving Access Control for Data Publishing and Sharing in the Internet of Medical Things
    Wu, Guangjun
    Wang, Shupeng
    Ning, Zhaolong
    Li, Jun
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (11): : 8091 - 8104
  • [7] Efficient and Privacy-Preserving Access to Sensor Data for Internet of Things (IoT) based Services
    Appavoo, Paramasiven
    Chan, Mun Choon
    Bhojan, Anand
    Chang, Ee-Chien
    [J]. 2016 8TH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORKS (COMSNETS), 2016,
  • [8] Privacy-preserving queries on encrypted data
    Yang, Zhiqiang
    Zhong, Sheng
    Wright, Rebecca N.
    [J]. Computer Security - ESORICS 2006, Proceedings, 2006, 4189 : 479 - 495
  • [9] Privacy-Preserving Lightweight Data Monitoring in Internet of Things Environments
    Zhao, Meng
    Ding, Yong
    Wu, Qianhong
    Wang, Yujue
    Qin, Bo
    Fan, Kefeng
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2021, 116 (03) : 1765 - 1783
  • [10] Privacy-Preserving Lightweight Data Monitoring in Internet of Things Environments
    Meng Zhao
    Yong Ding
    Qianhong Wu
    Yujue Wang
    Bo Qin
    Kefeng Fan
    [J]. Wireless Personal Communications, 2021, 116 : 1765 - 1783