Privacy-Preserving Flexible Access Control for Encrypted Data in Internet of Things

被引:11
|
作者
Zhang, Leyou [1 ,2 ]
Wang, Jun [2 ]
Mu, Yi [3 ,4 ]
机构
[1] Xidian Univ, Sch Math & Stat, Xian 710071, Peoples R China
[2] Xidian Univ, Sch Cyber Engn, Xian 710071, Peoples R China
[3] Fujian Normal Univ, Sch Math & Informat, Fuzhou 350007, Peoples R China
[4] Fujian Normal Univ, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou 350007, Peoples R China
基金
中国国家自然科学基金;
关键词
Encryption; Privacy; Dictionaries; Resists; Data privacy; Internet of Things; Access control; Access policy guessing attack; adaptive security; attribute-based encryption (ABE); dictionary attack; hidden policy; ATTRIBUTE-BASED ENCRYPTION; IDENTITY-BASED ENCRYPTION; EFFICIENT; POLICY; SCHEME; SECURE;
D O I
10.1109/JIOT.2021.3071553
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Along with the development of edge computing and the cloud, the Internet of Things (IoT) is affecting and changing people's lives. Data sharing has played an important role in the IoT, but the leakage of private user information poses a new security threat to the users. Thus, flexible fine-grained access control for such shared data is proposed in this article as an effective and secure method of eliminating vulnerabilities. However, the disclosure of access policies will also expose users' private information. Recently, Yang et al. attempted to solve this problem and proposed a framework based on attribute-based encryption for shared data onto IEEE IoT-J(DOI: 10.1109/JIOT.2016.2571718). They hide the access policies by using a bloom filter (BF) and attempt to address privacy preservation in IoT. However, we demonstrate several security weaknesses of their framework and point out its vulnerability to dictionary attacks and access policy guessing attacks. Then, an improved IoT solution is proposed. Under this proposal, the attribute values are stored in BF while the attribute names are embedded in the access policy. The proposed scheme can resist dictionary attacks and access policy guessing attacks. In addition, it simultaneously realizes large attribute sets, an efficient decryption algorithm, and adaptive security. Security analysis and performance evaluations show that the presented scheme achieves higher security and implementation simplicity in the IoT than other currently available schemes.
引用
收藏
页码:14731 / 14745
页数:15
相关论文
共 50 条
  • [21] Privacy-Preserving Distributed Data Access Control for CloudIoT
    Nasiraee, Hassan
    Ashouri-Talouki, Maede
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (04) : 2476 - 2487
  • [22] Privacy-Preserving Distributed Attribute Computation for Usage Control in the Internet of Things
    Costantino, Gianpiero
    La Marra, Antonio
    Martinelli, Fabio
    Mori, Paolo
    Saracino, Andrea
    [J]. 2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 1844 - 1851
  • [23] Privacy-preserving conjunctive keyword search on encrypted data with enhanced fine-grained access control
    Qiang Cao
    Yanping Li
    Zhenqiang Wu
    Yinbin Miao
    Jianqing Liu
    [J]. World Wide Web, 2020, 23 : 959 - 989
  • [24] Privacy-preserving conjunctive keyword search on encrypted data with enhanced fine-grained access control
    Cao, Qiang
    Li, Yanping
    Wu, Zhenqiang
    Miao, Yinbin
    Liu, Jianqing
    [J]. WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2020, 23 (02): : 959 - 989
  • [25] Smart contract token-based privacy-preserving access control system for industrial Internet of Things
    Weizheng Wang
    Huakun Huang
    Zhimeng Yin
    Thippa Reddy Gadekallu
    Mamoun Alazab
    Chunhua Su
    [J]. Digital Communications and Networks, 2023, 9 (02) : 337 - 346
  • [26] Smart contract token-based privacy-preserving access control system for industrial Internet of Things
    Wang, Weizheng
    Huang, Huakun
    Yin, Zhimeng
    Gadekallu, Thippa Reddy
    Alazab, Mamoun
    Su, Chunhua
    [J]. DIGITAL COMMUNICATIONS AND NETWORKS, 2023, 9 (02) : 337 - 346
  • [27] On perspective of security and privacy-preserving solutions in the internet of things
    Malina, Lukas
    Hajny, Jan
    Fujdiak, Radek
    Hosek, Jiri
    [J]. COMPUTER NETWORKS, 2016, 102 : 83 - 95
  • [28] Privacy-Preserving Similarity Joins Over Encrypted Data
    Yuan, Xingliang
    Wang, Xinyu
    Wang, Cong
    Yu, Chenyun
    Nutanong, Sarana
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (11) : 2763 - 2775
  • [29] Authenticated and Privacy-Preserving Consent Management in the Internet of Things
    Laurent, Maryline
    Leneutre, Jean
    Chabridon, Sophie
    Laaouane, Imane
    [J]. 10TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT 2019) / THE 2ND INTERNATIONAL CONFERENCE ON EMERGING DATA AND INDUSTRY 4.0 (EDI40 2019) / AFFILIATED WORKSHOPS, 2019, 151 : 256 - 263
  • [30] An Approach to Privacy-Preserving Distributed Intelligence for the Internet of Things
    Alsboui, Tariq
    Al-Aqrabi, Hussain
    Hill, Richard
    Iram, Shamaila
    [J]. PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, BIG DATA AND SECURITY (IOTBDS), 2022, : 174 - 182