A Unified Attribute-Based Encryption Data Sharing Scheme Matching Industrial Internet Framework

被引:0
|
作者
Wang, Zihao [1 ,2 ]
Fu, Yusun [3 ,4 ]
机构
[1] Shanghai Jiao Tong Univ, Ningbo Artificial Intelligence Inst, Ningbo 315000, Peoples R China
[2] Shanghai Jiao Tong Univ, Sch Elect Informat & Elect Engn, Shanghai 200240, Peoples R China
[3] Shanghai Jiao Tong Univ, Sch Elect Informat & Elect Engn, Key Lab Syst Control & Informat Proc, Minist Educ China, Shanghai 200240, Peoples R China
[4] Shanghai Jiao Tong Univ, Sch Elect Informat & Elect Engn, Key Lab Syst Control & Informat Proc, Shanghai Engn Res Ctr Intelligent Control & Manag, Shanghai 200240, Peoples R China
来源
IEEE INTERNET OF THINGS JOURNAL | 2024年 / 11卷 / 05期
关键词
Encryption; Cloud computing; Blockchains; Servers; Internet of Things; Monitoring; Costs; Attribute-based encryption; blockchain; data sharing; industrial Internet; outsourced computing; trust attribute; ARCHITECTURE; BLOCKCHAIN;
D O I
10.1109/JIOT.2023.3322469
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Industrial Internet is the combination of traditional industry and Internet technology to achieve intelligent, automated, information-based, and networked production modes. From the closed industrial environment to the open Internet network environment, data sharing in the industrial scenario is facing various risks brought by an open network. Ciphertext policy attribute-based encryption (CP-ABE) can guarantee industrial data confidentiality while achieving precise and flexible access control. However, the current CP-ABE schemes cannot fully meet the requirements of the Industrial Internet, due to inefficient algorithms, incomplete functionality, poor dynamic monitoring capability, and separation from the Industrial Internet framework. Therefore, this article proposes a unified CP-ABE data security sharing scheme matching the Industrial Internet framework. To decrease the local calculation cost of the industrial device, outsourced encryption is implemented by using multiple computing nodes to encrypt the subkeys, respectively. Online/offline encryption can be outsourced to computing nodes. Attribute revocation can efficiently update the revoked user's private key. Search-related costs are all constant. To enhance the dynamic monitoring, trust is set as an attribute and is updated adaptively in time through the attribute revocation algorithm. To further improve the security of data sharing, encapsulation is combined with on-chain ciphertext storage, which not only prevents symmetric ciphertext from being stolen and tampered with but also modifies the ciphertext component of the key ciphertext as needed. The scheme also realizes functions, including outsourced decryption and policy hiding. The scheme can resist the chosen plaintext and keyword attack, and ensure the forward and backward security of attribute revocation. By analysis and experiment, although our scheme achieves massive functions, it also has excellent algorithm efficiency.
引用
收藏
页码:9153 / 9170
页数:18
相关论文
共 50 条
  • [31] A Hierarchical Attribute-Based Encryption Scheme
    ZOU Xiubin
    Wuhan University Journal of Natural Sciences, 2013, 18 (03) : 259 - 264
  • [32] Attribute-based encryption scheme for secure data sharing in cloud with fine-grained revocation
    Islam, Md Azharul
    Madria, Sanjay
    SECURITY AND PRIVACY, 2024, 7 (01)
  • [33] Secure Reinsurance Data Sharing Scheme Based on Blockchain and Multi-level Attribute-Based Encryption
    Yue, Xiaolin
    Ma, Ziqiang
    Zhang, Juanyang
    Lan, Yajie
    Chen, Jiali
    WEB INFORMATION SYSTEMS AND APPLICATIONS, WISA 2024, 2024, 14883 : 428 - 435
  • [34] Attribute-Based Encryption Scheme Based on SIFF
    Zhao, Tianyu
    Wei, Lingbo
    Zhang, Chi
    2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2016,
  • [35] Secure cloud file sharing scheme using blockchain and attribute-based encryption
    Almasian, Mohammadpayam
    Shafieinejad, Alireza
    COMPUTER STANDARDS & INTERFACES, 2024, 87
  • [36] Electronic Health Record Sharing Scheme With Searchable Attribute-Based Encryption on Blockchain
    Niu, Shufen
    Chen, Lixia
    Wang, Jinfeng
    Yu, Fei
    IEEE ACCESS, 2020, 8 : 7195 - 7204
  • [37] A revocable attribute-based encryption EHR sharing scheme with multiple authorities in blockchain
    Xiaohui Yang
    Wenjie Li
    Kai Fan
    Peer-to-Peer Networking and Applications, 2023, 16 : 107 - 125
  • [38] A revocable attribute-based encryption EHR sharing scheme with multiple authorities in blockchain
    Yang, Xiaohui
    Li, Wenjie
    Fan, Kai
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2023, 16 (01) : 107 - 125
  • [39] Blockchain-Aided Hierarchical Attribute-Based Encryption for Data Sharing
    Ding, Jiaxu
    Yan, Biwei
    Wang, Guijuan
    Zhang, Li
    Han, Yubing
    Yu, Jiguo
    Yao, Yan
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS (WASA 2022), PT I, 2022, 13471 : 364 - 376
  • [40] APPLSS: Adaptive Privacy Preserved Location Sharing Scheme Based on Attribute-Based Encryption
    Yiliang Han
    Shuaishuai Zhu
    Yu Li
    Xi Lin
    中国通信, 2021, 18 (03) : 105 - 121