Private blockchain-envisioned multi-authority CP-ABE-based user access control scheme in IIoT

被引:49
|
作者
Banerjee, Soumya [1 ]
Bera, Basudeb [2 ]
Das, Ashok Kumar [2 ]
Chattopadhyay, Samiran [1 ]
Khan, Muhammad Khurram [3 ]
Rodrigues, Joel J. P. C. [4 ,5 ]
机构
[1] Jadavpur Univ, Dept Informat Technol, Kolkata 700098, India
[2] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, India
[3] King Saud Univ, Coll Comp & Informat Sci, Ctr Excellence Informat Assurance, Riyadh 11653, Saudi Arabia
[4] Fed Univ Piaui UFPI, BR-64049550 Teresina, PI, Brazil
[5] Inst Telecomunicacoes, P-6201001 Covilha, Portugal
关键词
Industrial Internet of Things (IIoT); Access control; Attribute-based encryption; Blockchain; Security; ATTRIBUTE-BASED ENCRYPTION; CONSTANT-SIZE CIPHERTEXTS; KEY AGREEMENT PROTOCOL; IOT-ENABLED INTERNET; AUTHENTICATION SCHEME; DESIGN; MANAGEMENT;
D O I
10.1016/j.comcom.2021.01.023
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recent advances in Low Power Wide Area Network (LPWAN) are expected to augment the already prodigious proliferation of Industrial Internet of Things (IIoT). However, this unrepresented growth is tinged by the uncertainty of possible challenges in security and privacy. In this work, we propose a novel blockchain-envisioned fine grained user access control scheme for data security and scalability in IIoT environment. The proposed scheme supports multiple attribute authorities and also a constant size key and ciphertext. The data gathered by the IoT smart devices are encrypted using the cipher-policy attribute based encryption (CP-ABE) and sent to their nearby gateway nodes. Later, the gateway nodes form the transactions from the encrypted data from the smart devices which are used to form partial blocks. The partial blocks are then forwarded to the cloud server(s) in the peer-to-peer (P2P) network to convert them into full blocks, which are verified, mined and added into the blockchain using the voting-based practical Byzantine fault tolerance (PBFT) consensus algorithm. The proposed scheme also allows a user to access the secure data stored in the blocks into the blockchain using the CP-ABE mechanism. The security analysis demonstrates the robustness of the proposed scheme against various attacks, and the comparative study with related relevant schemes also highlights the advantage of the proposed scheme over existing approaches. Finally, a blockchain implementation of the presented scheme summarizes the computational costs for a varied number of transactions per block, and also for a varied number of blocks mined in the blockchain.
引用
收藏
页码:99 / 113
页数:15
相关论文
共 50 条
  • [21] Practical revocable and multi-authority CP-ABE scheme from RLWE for Cloud Computing
    Yang, Yang
    Sun, Jianguo
    Liu, Zechao
    Qiao, YuQing
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 65
  • [22] Partially hidden policy multi-authority CP-ABE scheme with constant length ciphertext
    Liu, Yilong
    Xu, Shengwei
    Yue, Ziyan
    Tongxin Xuebao/Journal on Communications, 45 (08): : 20 - 36
  • [23] Practical traceable multi-authority CP-ABE with outsourcing decryption and access policy updation
    Sethi, Kamalakanta
    Pradhan, Ankit
    Bera, Padmalochan
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 51
  • [24] A privacy preserving CP-ABE-based access control on data sharing in VANETs
    Guo, Nan
    Hu, Jing
    Deng, Xinyang
    INTERNATIONAL JOURNAL OF WEB AND GRID SERVICES, 2023, 19 (02) : 211 - 232
  • [25] PMTER-ABE: a practical multi-authority CP-ABE with traceability, revocation and outsourcing decryption for secure access control in cloud systems
    Sethi, Kamalakanta
    Pradhan, Ankit
    Bera, Padmalochan
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2021, 24 (02): : 1525 - 1550
  • [26] PMTER-ABE: a practical multi-authority CP-ABE with traceability, revocation and outsourcing decryption for secure access control in cloud systems
    Kamalakanta Sethi
    Ankit Pradhan
    Padmalochan Bera
    Cluster Computing, 2021, 24 : 1525 - 1550
  • [27] Efficient Compressed Ciphertext Length Scheme Using Multi-Authority CP-ABE for Hierarchical Attributes
    Zhang, Zhiyong
    Li, Cheng
    Gupta, Brij B.
    Niu, Danmei
    IEEE ACCESS, 2018, 6 : 38273 - 38284
  • [28] Multi-Authority Attribute-Based Encryption Scheme With Access Delegation for Cross Blockchain Data Sharing
    Duan, Pengfei
    Ma, Zhaofeng
    Gao, Hongmin
    Tian, Tian
    Zhang, Yuqing
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2025, 20 : 323 - 337
  • [29] Blockchain Based Multi-Authority Fine-Grained Access Control System With Flexible Revocation
    Xiao, Meiyan
    Huang, Qiong
    Miao, Ying
    Li, Shunpeng
    Susilo, Willy
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (06) : 3143 - 3155
  • [30] Multiauthority CP-ABE-based Access Control Model for IoT-enabled Healthcare Infrastructure
    Das, Sangjukta
    Namasudra, Suyel
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2023, 19 (01) : 821 - 829