Private blockchain-envisioned multi-authority CP-ABE-based user access control scheme in IIoT

被引:43
|
作者
Banerjee, Soumya [1 ]
Bera, Basudeb [2 ]
Das, Ashok Kumar [2 ]
Chattopadhyay, Samiran [1 ]
Khan, Muhammad Khurram [3 ]
Rodrigues, Joel J. P. C. [4 ,5 ]
机构
[1] Jadavpur Univ, Dept Informat Technol, Kolkata 700098, India
[2] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, India
[3] King Saud Univ, Coll Comp & Informat Sci, Ctr Excellence Informat Assurance, Riyadh 11653, Saudi Arabia
[4] Fed Univ Piaui UFPI, BR-64049550 Teresina, PI, Brazil
[5] Inst Telecomunicacoes, P-6201001 Covilha, Portugal
关键词
Industrial Internet of Things (IIoT); Access control; Attribute-based encryption; Blockchain; Security; ATTRIBUTE-BASED ENCRYPTION; CONSTANT-SIZE CIPHERTEXTS; KEY AGREEMENT PROTOCOL; IOT-ENABLED INTERNET; AUTHENTICATION SCHEME; DESIGN; MANAGEMENT;
D O I
10.1016/j.comcom.2021.01.023
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recent advances in Low Power Wide Area Network (LPWAN) are expected to augment the already prodigious proliferation of Industrial Internet of Things (IIoT). However, this unrepresented growth is tinged by the uncertainty of possible challenges in security and privacy. In this work, we propose a novel blockchain-envisioned fine grained user access control scheme for data security and scalability in IIoT environment. The proposed scheme supports multiple attribute authorities and also a constant size key and ciphertext. The data gathered by the IoT smart devices are encrypted using the cipher-policy attribute based encryption (CP-ABE) and sent to their nearby gateway nodes. Later, the gateway nodes form the transactions from the encrypted data from the smart devices which are used to form partial blocks. The partial blocks are then forwarded to the cloud server(s) in the peer-to-peer (P2P) network to convert them into full blocks, which are verified, mined and added into the blockchain using the voting-based practical Byzantine fault tolerance (PBFT) consensus algorithm. The proposed scheme also allows a user to access the secure data stored in the blocks into the blockchain using the CP-ABE mechanism. The security analysis demonstrates the robustness of the proposed scheme against various attacks, and the comparative study with related relevant schemes also highlights the advantage of the proposed scheme over existing approaches. Finally, a blockchain implementation of the presented scheme summarizes the computational costs for a varied number of transactions per block, and also for a varied number of blocks mined in the blockchain.
引用
收藏
页码:99 / 113
页数:15
相关论文
共 50 条
  • [1] Multi -Authority CP-ABE-Based user access control scheme with constant -size key and ciphertext for IoT deployment
    Banerjee, Soumya
    Roy, Sandip
    Odelu, Vanga
    Das, Ashok Kumar
    Chattopadhyay, Samiran
    Rodrigues, Joel J. P. C.
    Park, Youngho
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 53 (53)
  • [2] Multi-Authority Revocable Access Control Method Based on CP-ABE in NDN
    Wu, Zhijun
    Zhang, Yun
    Xu, Enzhong
    [J]. FUTURE INTERNET, 2020, 12 (01):
  • [3] Research on Multi-Authority CP-ABE Access Control Model in Multicloud
    Shengli Zhou
    Guangxuan Chen
    Guangjie Huang
    Jin Shi
    Ting Kong
    [J]. China Communications, 2020, 17 (08) : 220 - 233
  • [4] Research on Multi-Authority CP-ABE Access Control Model in Multicloud
    Zhou, Shengli
    Chen, Guangxuan
    Huang, Guangjie
    Shi, Jin
    Kong, Ting
    [J]. CHINA COMMUNICATIONS, 2020, 17 (08) : 220 - 233
  • [5] Blockchain Access Control Scheme Based on Multi-authority Attribute-Based Encryption
    Li, Yang
    Qi, Baoyue
    Wang, Mengmeng
    Zhu, Jianming
    Wang, Xiuli
    [J]. DATA SCIENCE (ICPCSEE 2022), PT II, 2022, 1629 : 105 - 124
  • [6] Multi-authority ABE for access control in cloud storage
    Li, Xie-Hua
    Zhang, Meng-Meng
    Liu, Hong
    Wang, Yong-Jun
    [J]. Hunan Daxue Xuebao/Journal of Hunan University Natural Sciences, 2015, 42 (10): : 133 - 140
  • [7] Blockchain-based and multi-authority hierarchical access control data sharing scheme
    Du, Jianming
    Dong, Guofang
    Ning, Juangui
    Xu, Zhengnan
    Yang, Ruicheng
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2024, 119
  • [8] Redactable Transactions in Consortium Blockchain: Controlled by Multi-authority CP-ABE
    Zhang, Zongyang
    Li, Tong
    Wang, Zhuo
    Liu, Jianwei
    [J]. INFORMATION SECURITY AND PRIVACY, ACISP 2021, 2021, 13083 : 408 - 429
  • [9] A decentralized multi-authority CP-ABE scheme from LWE
    Yao, Yun-Fei
    Chen, Hui-Yan
    Gao, You
    Wang, Ke
    Yu, Hao-Yang
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2024, 82
  • [10] A CP-ABE scheme based on multi-authority in hybrid clouds for mobile devices
    Xie, Mande
    Ruan, Yingying
    Hong, Haibo
    Shao, Jun
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2021, 121 : 114 - 122