SEA-BREW: A scalable Attribute-Based Encryption revocable scheme for low-bitrate IoT wireless networks

被引:8
|
作者
La Manna, Michele [1 ,2 ]
Perazzo, Pericle [2 ]
Dini, Gianluca [2 ]
机构
[1] Univ Florence, Dept Informat Engn DINFO, Florence, Italy
[2] Univ Pisa, Dept Informat Engn DII, Florence, Italy
关键词
Industrial IoT; Attribute-Based Encryption; Wireless Sensors and Actuator Networks; CP-ABE; Key revocation; Broadcast; INTERNET; THINGS; PROTOCOLS; SECURITY;
D O I
10.1016/j.jisa.2020.102692
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attribute-Based Encryption (ABE) is an emerging cryptographic technique that allows one to embed a fine-grained access control mechanism into encrypted data. In this paper we propose a novel ABE scheme called SEA-BREW (Scalable and Efficient Abe with Broadcast REvocation for Wireless networks), which is suited for Internet of Things (IoT) and Industrial IoT (IIoT) applications. In contrast to state-of-the-art ABE schemes, ours is capable of securely performing key revocations with a single short broadcast message, instead of a number of unicast messages that is linear with the number of nodes. This is desirable for low-bitrate Wireless Sensor and Actuator Networks (WSANs) which often are the heart of (I)IoT systems. In SEA-BREW, sensors, actuators, and users can exchange encrypted data via a cloud server, or directly via wireless if they belong to the same WSAN. We formally prove that our scheme is secure also in case of an untrusted cloud server that colludes with a set of users, under the generic bilinear group model. We show by simulations that our scheme requires a constant computational overhead on the cloud server with respect to the complexity of the access control policies. This is in contrast to state-of-the-art solutions, which require instead a linear computational overhead.
引用
收藏
页数:14
相关论文
共 50 条
  • [1] Efficient revocable attribute-based encryption scheme
    Li X.
    Zhang D.
    Li H.
    [J]. Tongxin Xuebao/Journal on Communications, 2019, 40 (06): : 32 - 39
  • [2] Revocable Attribute-Based Encryption Scheme with Cryptographic Reverse Firewalls
    Zhao, Yang
    Ke, Xing-Yu
    Pang, Yu-Wei
    Xiong, Hu
    Zhu, Guo-Bin
    Yeh, Kuo-Hui
    [J]. BIG DATA TECHNOLOGIES AND APPLICATIONS, EAI INTERNATIONAL CONFERENCE, BDTA 2023, 2024, 555 : 79 - 94
  • [3] A revocable multi-authority attribute-based encryption scheme for fog-enabled IoT
    Penuelas-Angulo, Alejandro
    Feregrino-Uribe, Claudia
    Morales-Sandoval, Miguel
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2024, 155
  • [4] The Revocable Attribute based Encryption Scheme for Social Networks
    Han Yiliang
    Jiang Di
    Yang Xiaoyuan
    [J]. 2015 INTERNATIONAL SYMPOSIUM ON SECURITY AND PRIVACY IN SOCIAL NETWORKS AND BIG DATA (SOCIALSEC 2015), 2015, : 44 - 51
  • [5] A Traceable and Revocable Multiauthority Attribute-Based Encryption Scheme with Fast Access
    Zhang, Kai
    Li, Yanping
    Song, Yun
    Lu, Laifeng
    Zhang, Tao
    Jiang, Qi
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [6] Revocable Attribute-Based Encryption Scheme With Efficient Deduplication for Ehealth Systems
    Ma, Hua
    Xie, Ying
    Wang, Jianfeng
    Tian, Guohua
    Liu, Zhenhua
    [J]. IEEE ACCESS, 2019, 7 : 89205 - 89217
  • [7] Attribute Revocable Attribute-Based Encryption for Decentralized Disruption-Tolerant Military Networks
    Nomura, Kenta
    Mohri, Masami
    Ii, Yoshiaki Si Iiraisi
    Morii, Masakatu
    [J]. PROCEEDINGS OF 2015 THIRD INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING (CANDAR), 2015, : 491 - 494
  • [8] Efficiently Revocable and Searchable Attribute-Based Encryption Scheme for Mobile Cloud Storage
    Wang, Shangping
    Zhang, Duo
    Zhang, Yaling
    Liu, Lihua
    [J]. IEEE ACCESS, 2018, 6 : 30444 - 30457
  • [9] Ciphertext Outdate Attacks on the Revocable Attribute-Based Encryption Scheme With Time Encodings
    Lee, Kwangsu
    [J]. IEEE ACCESS, 2019, 7 : 165122 - 165126
  • [10] A revocable attribute-based encryption EHR sharing scheme with multiple authorities in blockchain
    Xiaohui Yang
    Wenjie Li
    Kai Fan
    [J]. Peer-to-Peer Networking and Applications, 2023, 16 : 107 - 125