Efficient Attribute-Based Encryption with Privacy-Preserving Key Generation and Its Application in Industrial Cloud

被引:21
|
作者
Song, Yujiao [1 ]
Wang, Hao [1 ,2 ]
Wei, Xiaochao [1 ]
Wu, Lei [1 ,3 ]
机构
[1] Shandong Normal Univ, Sch Informat Sci & Engn, Jinan, Shandong, Peoples R China
[2] Univ Wollongong, Sch Comp & Informat Technol, Wollongong, NSW, Australia
[3] Shandong Prov Key Lab Software Engn, Jinan, Shandong, Peoples R China
基金
中国国家自然科学基金;
关键词
OBLIVIOUS TRANSFER;
D O I
10.1155/2019/3249726
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the rapid development of new technologies such as cloud computing, Internet of Things (IoT), and mobile Internet, the data volumes are exploding. Particularly, in the industrial field, a large amount of data is generated every day. How to manage and use industrial Big Data primely is a thorny challenge for every industrial enterprise manager. As an emerging form of service, cloud computing technology provides a good solution. It receives more and more attention and support due to its flexible configuration, on-demand purchase, and easy maintenance. Using cloud technology, enterprises get rid of the heavy data management work and concentrate on their main business. Although cloud technology has many advantages, there are still many problems in terms of security and privacy. To protect the confidentiality of the data, the mainstream solution is encrypting data before uploading. In order to achieve flexible access control to encrypted data, attribute-based encryption (ABE) is an outstanding candidate. At present, more and more applications are using ABE to ensure data security. However, the privacy protection issues during the key generation phase are not considered in the current ABE systems. That is to say, the key generation center (KGC) knows both of attributes and corresponding keys of each user. This problem is especially serious in the industrial big data scenario, because it will cause great damage to the business secrets of industrial enterprises. In this paper, we design a new ABE scheme that protects user's privacy during key issuing. In our new scheme, we separate the functionality of attribute auditing and key generating to ensure that the KGC cannot know user's attributes and that the attribute auditing center (AAC) cannot obtain the user's secret key. This is ideal for many privacy-sensitive scenarios, such as industrial big data scenario.
引用
收藏
页数:9
相关论文
共 50 条
  • [1] An Efficient Privacy-Preserving Attribute-Based Encryption with Hidden Policy for Cloud Storage
    Huang, Chanying
    Wei, Songjie
    Fu, Anmin
    [J]. JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2019, 28 (11)
  • [2] Efficient and privacy-preserving traceable attribute-based encryption in blockchain
    Axin Wu
    Yinghui Zhang
    Xiaokun Zheng
    Rui Guo
    Qinglan Zhao
    Dong Zheng
    [J]. Annals of Telecommunications, 2019, 74 : 401 - 411
  • [3] Efficient and privacy-preserving traceable attribute-based encryption in blockchain
    Wu, Axin
    Zhang, Yinghui
    Zheng, Xiaokun
    Guo, Rui
    Zhao, Qinglan
    Zheng, Dong
    [J]. ANNALS OF TELECOMMUNICATIONS, 2019, 74 (7-8) : 401 - 411
  • [4] Attribute-Based encryption mechanism with Privacy-Preserving approach in cloud computing
    Yogesh Deshmukh J.
    Yadav S.K.
    Bhandari G.M.
    [J]. Materials Today: Proceedings, 2023, 80 : 1786 - 1791
  • [5] Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption
    Han, Jinguang
    Susilo, Willy
    Mu, Yi
    Yan, Jun
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2012, 23 (11) : 2150 - 2162
  • [6] A Novel Privacy-Preserving Decentralized Ciphertext-Policy Attribute-Based Encryption with Anonymous Key Generation
    Yin, Hongjian
    Zhang, Leyou
    Mu, Yi
    [J]. CLOUD COMPUTING AND SECURITY, PT III, 2018, 11065 : 435 - 446
  • [7] Novel Secure Privacy-Preserving Decentralized Attribute-Based Encryption
    Liang, Pengfei
    Zhang, Leyou
    Shang, Yujie
    [J]. FRONTIERS IN CYBER SECURITY, 2018, 879 : 66 - 80
  • [8] Privacy-Preserving Digital Rights Management based on Attribute-based Encryption
    Petrlic, Ronald
    Sorge, Christoph
    [J]. 2014 6TH INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS), 2014,
  • [9] Efficient, Verifiable and Privacy Preserving Decentralized Attribute-Based Encryption for Mobile Cloud Computing
    Lyu, Maoxu
    Li, Xuejun
    Li, Hui
    [J]. 2017 IEEE SECOND INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC), 2017, : 195 - 204
  • [10] A Privacy-Preserving Attribute-Based Authentication Scheme for Cloud Computing
    Huang, Chanying
    Wei, Songjie
    Yan, Kedong
    Zhang, Gongxuan
    Fu, Anmin
    [J]. 2018 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA ASC), 2018, : 260 - 265