CP-ABE based Access Control with Policy Updating and Fast Decryption for Intelligent Manufacturing

被引:1
|
作者
Li, Long [1 ]
Gu, Tianlong [2 ]
Chang, Liang [2 ]
Li, Jingjing [3 ]
Qian, Junyan [2 ]
机构
[1] Guilin Univ Elect Technol, Sch Electromech Engn, Guilin, Peoples R China
[2] Guilin Univ Elect Technol, Guangxi Key Lab Trusted Software, Guilin, Peoples R China
[3] Guilin Univ Elect Technol, Sch Informat & Commun, Guilin, Peoples R China
来源
JOURNAL OF INTERNET TECHNOLOGY | 2018年 / 19卷 / 03期
基金
中国国家自然科学基金;
关键词
Intelligent manufacturing; CP-ABE based access control; Binary decision diagram; Access policy updating; Fast decryption; CONTROL SYSTEM; ENCRYPTION;
D O I
10.3966/160792642018051903018
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In view of the information security problems existed in intelligent manufacturing system, a system model and its corresponding CP-ABE based access control framework are presented. Moreover, a MA-CP-ABE based on Ordered Binary Decision Diagram (OBDD) is proposed to solve the common drawbacks of CP-ABE schemes, such as limited expression ability of access structure, inefficient sub algorithms, poor system reliability caused by single authority, and lack of policy updating mechanism. The proposed scheme has several remarkable characteristic. Firstly, an OBDD-based access structure is proposed to realize the efficient representation of access policies. Secondly, the sub-algorithms such as key generation algorithm and decryption algorithm have good performance. In particular, the complexity of decryption algorithm is constant, not limited to any variable in the system, which result in fast decryption. Thirdly, the reliability and stability are enhanced by the set-up of multiple attribute authorities. Fourthly, the access policy updating mechanism has better feasibility, because the adoption of proxy ciphertext updating and lazy key generation. Theoretical analysis further proofs the above superiorities of the new scheme. In addition, the new scheme is able to resist collusion attack and provide forward security and CPA security.
引用
收藏
页码:825 / 836
页数:12
相关论文
共 50 条
  • [31] Traceable CP-ABE: How to Trace Decryption Devices Found in the Wild
    Liu, Zhen
    Cao, Zhenfu
    Wong, Duncan S.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (01) : 55 - 68
  • [32] Implementation of Ciphertext Policy-Attribute Based Encryption (CP-ABE) for Fine Grained Access Control of University Data
    Porwal, Shardha
    Mittal, Sangeeta
    2017 TENTH INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING (IC3), 2017, : 25 - 31
  • [33] ABE based Access Control with Authenticated Dynamic Policy Updating in Clouds
    Zhang, Liang-Ao
    Sun, Xingming
    Xia, Zhihua
    Ji, Qiuju
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (08): : 95 - 110
  • [34] New Hidden Policy CP-ABE for Big Data Access Control with Privacy-preserving Policy in Cloud Computing
    Khuntia, Sucharita
    Kumar, P. Syam
    2018 9TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2018,
  • [35] A CP-ABE Access Control Scheme Based on Proxy Re-encryption in Cloud Storage
    Wang, Haiyong
    Peng, Yao
    CLOUD COMPUTING AND SECURITY, PT II, 2018, 11064 : 413 - 425
  • [36] A multi Ability CP-ABE access control scheme for public cloud storage
    Deepthi, Kothapalli Chaitanya
    Ashok, Dasari
    Krishna, M.
    INTERNATIONAL CONFERENCE ON COMPUTER VISION AND MACHINE LEARNING, 2019, 1228
  • [37] A Secure and Efficient Access-Control Scheme Based on Blockchain and CP-ABE for UAV Swarm
    Han, Pengbin
    Sui, Aina
    Wu, Jiang
    DRONES, 2025, 9 (02)
  • [38] CHTDS: A CP-ABE Access Control Scheme Based on Hash Table and Data Segmentation in NDN
    Wu, Zhijun
    Xu, Enzhong
    Liu, Liang
    Yue, Meng
    2019 18TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS/13TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (TRUSTCOM/BIGDATASE 2019), 2019, : 843 - 848
  • [39] A CP-ABE and IOTA-Based Lightweight Sensitive Data Access Control Scheme for IoT
    Yao, Xuanxia
    Zhou, Jinyuan
    Du, Xiaojiang
    Zhang, Shurong
    IEEE Internet of Things Journal, 2024, 11 (24) : 40831 - 40844
  • [40] Updating Policies in CP-ABE-Based Access Control: An Optimized and Secure Service
    Fugkeaw, Somchart
    Sato, Hiroyuki
    SERVICE-ORIENTED AND CLOUD COMPUTING, (ESOCC 2016), 2016, 9846 : 3 - 17