CP-ABE based Access Control with Policy Updating and Fast Decryption for Intelligent Manufacturing

被引:1
|
作者
Li, Long [1 ]
Gu, Tianlong [2 ]
Chang, Liang [2 ]
Li, Jingjing [3 ]
Qian, Junyan [2 ]
机构
[1] Guilin Univ Elect Technol, Sch Electromech Engn, Guilin, Peoples R China
[2] Guilin Univ Elect Technol, Guangxi Key Lab Trusted Software, Guilin, Peoples R China
[3] Guilin Univ Elect Technol, Sch Informat & Commun, Guilin, Peoples R China
来源
JOURNAL OF INTERNET TECHNOLOGY | 2018年 / 19卷 / 03期
基金
中国国家自然科学基金;
关键词
Intelligent manufacturing; CP-ABE based access control; Binary decision diagram; Access policy updating; Fast decryption; CONTROL SYSTEM; ENCRYPTION;
D O I
10.3966/160792642018051903018
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In view of the information security problems existed in intelligent manufacturing system, a system model and its corresponding CP-ABE based access control framework are presented. Moreover, a MA-CP-ABE based on Ordered Binary Decision Diagram (OBDD) is proposed to solve the common drawbacks of CP-ABE schemes, such as limited expression ability of access structure, inefficient sub algorithms, poor system reliability caused by single authority, and lack of policy updating mechanism. The proposed scheme has several remarkable characteristic. Firstly, an OBDD-based access structure is proposed to realize the efficient representation of access policies. Secondly, the sub-algorithms such as key generation algorithm and decryption algorithm have good performance. In particular, the complexity of decryption algorithm is constant, not limited to any variable in the system, which result in fast decryption. Thirdly, the reliability and stability are enhanced by the set-up of multiple attribute authorities. Fourthly, the access policy updating mechanism has better feasibility, because the adoption of proxy ciphertext updating and lazy key generation. Theoretical analysis further proofs the above superiorities of the new scheme. In addition, the new scheme is able to resist collusion attack and provide forward security and CPA security.
引用
收藏
页码:825 / 836
页数:12
相关论文
共 50 条
  • [41] Research on Multi-Authority CP-ABE Access Control Model in Multicloud
    Shengli Zhou
    Guangxuan Chen
    Guangjie Huang
    Jin Shi
    Ting Kong
    中国通信, 2020, 17 (08) : 220 - 233
  • [42] Expressive CP-ABE with Partially Hidden Access Structures
    Lai, Junzuo
    Deng, Robert H.
    Li, Yingjiu
    7TH ACM SYMPOSIUM ON INFORMATION, COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS 2012), 2012,
  • [43] An Encryption and Decryption Outsourcing CP-ABE scheme Supporting Efficient Ciphertext Evolution
    Yan, Xincheng
    Chen, Yue
    Zhai, Yuchang
    Ba, Yang
    Li, XueWei
    Jia, Hongyong
    2020 4TH INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, SECURITY AND PRIVACY (ICCSP 2020), 2020, : 116 - 125
  • [44] The CP-ABE with Full Verifiability Outsourced Decryption and White-Box Traceability
    Li Cong
    Yang Xiaoyuan
    Liu Yazhou
    Wang Xu'an
    CLOUD COMPUTING AND SECURITY, PT III, 2018, 11065 : 707 - 719
  • [45] Requester-Centric CP-ABE Combining Removing Escrow and Outsourcing Decryption
    Yao, Wang
    Wu, Faguo
    Zhang, Xiao
    CYBERSPACE SAFETY AND SECURITY, PT II, 2019, 11983 : 192 - 204
  • [46] Research on Multi-Authority CP-ABE Access Control Model in Multicloud
    Zhou, Shengli
    Chen, Guangxuan
    Huang, Guangjie
    Shi, Jin
    Kong, Ting
    CHINA COMMUNICATIONS, 2020, 17 (08) : 220 - 233
  • [47] Efficient revocable CP-ABE for big data access control in cloud computing
    Premkamal P.K.
    Pasupuleti S.K.
    Alphonse P.J.A.
    International Journal of Security and Networks, 2019, 14 (03) : 119 - 132
  • [48] Attributes Union in CP-ABE Algorithm for Large Universe Cryptographic Access Control
    Cheng, Yong
    Ren, Jiangchun
    Wang, Zhiying
    Mei, Songzhu
    Zhou, Jie
    SECOND INTERNATIONAL CONFERENCE ON CLOUD AND GREEN COMPUTING / SECOND INTERNATIONAL CONFERENCE ON SOCIAL COMPUTING AND ITS APPLICATIONS (CGC/SCA 2012), 2012, : 180 - 186
  • [49] Cryptanalysis of a CP-ABE scheme with policy in normal forms
    Tan, Syh-Yuan
    Yap, Wun-She
    INFORMATION PROCESSING LETTERS, 2016, 116 (07) : 492 - 495
  • [50] A Blockchain-Based CP-ABE Scheme with Partially Hidden Access Structures
    Ba Y.
    Hu X.
    Chen Y.
    Hao Z.
    Li X.
    Yan X.
    Security and Communication Networks, 2021, 2021