Private blockchain-envisioned multi-authority CP-ABE-based user access control scheme in IIoT

被引:49
|
作者
Banerjee, Soumya [1 ]
Bera, Basudeb [2 ]
Das, Ashok Kumar [2 ]
Chattopadhyay, Samiran [1 ]
Khan, Muhammad Khurram [3 ]
Rodrigues, Joel J. P. C. [4 ,5 ]
机构
[1] Jadavpur Univ, Dept Informat Technol, Kolkata 700098, India
[2] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, India
[3] King Saud Univ, Coll Comp & Informat Sci, Ctr Excellence Informat Assurance, Riyadh 11653, Saudi Arabia
[4] Fed Univ Piaui UFPI, BR-64049550 Teresina, PI, Brazil
[5] Inst Telecomunicacoes, P-6201001 Covilha, Portugal
关键词
Industrial Internet of Things (IIoT); Access control; Attribute-based encryption; Blockchain; Security; ATTRIBUTE-BASED ENCRYPTION; CONSTANT-SIZE CIPHERTEXTS; KEY AGREEMENT PROTOCOL; IOT-ENABLED INTERNET; AUTHENTICATION SCHEME; DESIGN; MANAGEMENT;
D O I
10.1016/j.comcom.2021.01.023
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recent advances in Low Power Wide Area Network (LPWAN) are expected to augment the already prodigious proliferation of Industrial Internet of Things (IIoT). However, this unrepresented growth is tinged by the uncertainty of possible challenges in security and privacy. In this work, we propose a novel blockchain-envisioned fine grained user access control scheme for data security and scalability in IIoT environment. The proposed scheme supports multiple attribute authorities and also a constant size key and ciphertext. The data gathered by the IoT smart devices are encrypted using the cipher-policy attribute based encryption (CP-ABE) and sent to their nearby gateway nodes. Later, the gateway nodes form the transactions from the encrypted data from the smart devices which are used to form partial blocks. The partial blocks are then forwarded to the cloud server(s) in the peer-to-peer (P2P) network to convert them into full blocks, which are verified, mined and added into the blockchain using the voting-based practical Byzantine fault tolerance (PBFT) consensus algorithm. The proposed scheme also allows a user to access the secure data stored in the blocks into the blockchain using the CP-ABE mechanism. The security analysis demonstrates the robustness of the proposed scheme against various attacks, and the comparative study with related relevant schemes also highlights the advantage of the proposed scheme over existing approaches. Finally, a blockchain implementation of the presented scheme summarizes the computational costs for a varied number of transactions per block, and also for a varied number of blocks mined in the blockchain.
引用
收藏
页码:99 / 113
页数:15
相关论文
共 50 条
  • [41] An Improved Multi-Authority Attribute Access Control Scheme Base on Blockchain and Elliptic Curve for Efficient and Secure Data Sharing
    Xie, Ben
    Zhou, Yu-Ping
    Yi, Xin-Yu
    Wang, Chen-Ye
    ELECTRONICS, 2023, 12 (07)
  • [42] Revocable blockchain-aided multi-authority access control scheme with key escrow-free for EHR sharing
    Yang, Xiaohui
    Duan, Xiaolong
    JOURNAL OF SUPERCOMPUTING, 2025, 81 (04):
  • [43] A Lightweight Pairing-Free Multi-Authority CP-ABE scheme for Cloud-Edge-Assisted IoT
    Guo, Chong
    Peng, Tianqi
    Zhang, Jiangjiang
    Yang, Yuxin
    Luo, Yihang
    Zhu, Guangzhuo
    2024 9TH INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION SYSTEMS, ICCCS 2024, 2024, : 991 - 996
  • [44] Blockchain-based multi-authority revocable data sharing scheme in smart grid
    Yang, Xiao-Dong
    Liao, Ze-Fan
    Shu, Bin
    Chen, Ai-Jia
    MATHEMATICAL BIOSCIENCES AND ENGINEERING, 2023, 20 (07) : 11957 - 11977
  • [45] Blockchain-Envisioned Provably Secure Multivariate Identity-Based Multi-Signature Scheme for Internet of Vehicles Environment
    Srivastava, Vikas
    Debnath, Sumit Kumar
    Bera, Basudeb
    Das, Ashok Kumar
    Park, Youngho
    Lorenz, Pascal
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2022, 71 (09) : 9853 - 9867
  • [46] Redactable consortium blockchain with access control: Leveraging chameleon hash and multi-authority attribute-based encryption
    Dong, Yueyan
    Li, Yifang
    Cheng, Ye
    Yu, Dongxiao
    HIGH-CONFIDENCE COMPUTING, 2024, 4 (01):
  • [47] Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage
    Zhong, Hong
    Zhu, Wenlong
    Xu, Yan
    Cui, Jie
    SOFT COMPUTING, 2018, 22 (01) : 243 - 251
  • [48] Multi-Authority Attribute-Based Encryption Access Control Scheme in Wireless Body Area Network
    Xiao, Min
    Hu, Xiaoyong
    2018 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS ENGINEERING (ICISE), 2018, : 39 - 45
  • [49] Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage
    Hong Zhong
    Wenlong Zhu
    Yan Xu
    Jie Cui
    Soft Computing, 2018, 22 : 243 - 251
  • [50] Attribute-Based Data Access Control for Multi-Authority System
    Salehi, Ahmad S.
    Rudolph, Carsten
    Grobler, Marthie
    2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 1834 - 1841