dAPRE:Efficient and Reliable Attribute-Based Proxy Re-Encryption Using DAG for Data Sharing in IoT

被引:1
作者
Li, Xiaoxiao [1 ]
Xie, Yong [1 ,2 ]
Wang, Hui [1 ]
Su, Xing [1 ]
Li, Haifeng [3 ]
机构
[1] Qinghai Univ, Dept Informat Technol, Xining 810016, Peoples R China
[2] Qinghai Prov Key Lab Big Data Finance & Artificial, Xining 810016, Peoples R China
[3] Qinghai Univ Sci & Technol, Sch Comp & Informat Sci, Xining 810016, Peoples R China
基金
中国国家自然科学基金;
关键词
Security; Encryption; Public key; Internet of Things; Cloud computing; Privacy; Information technology; data sharing; attribute-based encryption; proxy re-encryption; directed acyclic graph; PRIVACY; SCHEME; SECURE;
D O I
10.1109/TCE.2023.3346028
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The explosive growth of the Internet of Things (IoT) data and its analytical applications can bring convenience to better intelligent life, efficient work and other aspects. However, the secure sharing of IoT data is the biggest obstacle to this convenience. Numerous schemes have been developed to address the security challenges associated with IoT data sharing recently, but the existing schemes still face the challenge of how to achieve effective fine-grained access control and low overhead in IoT data security sharing. To tackle this challenge, we propose an efficient and reliable attribute-based proxy re-encryption scheme using Directed Acyclic Graph (DAG), namely dAPRE. In the phase of encryption, re-encryption and delegator decryption, dAPRE remains constant computation overhead with the increasing number of attributes. At the same time, dAPRE's attribute-based verifiable ciphertext access mechanism and DAG-based key recovery algorithm realize ciphertext integrity check and ensure key security. Furthermore, dAPRE has been evaluated through both theoretical analysis and practical experiments, demonstrating its efficiency and practicality.
引用
收藏
页码:584 / 596
页数:13
相关论文
共 45 条
[1]  
Ateniese G., 2006, ACM Transactions on Information and Systems Security, V9, P1, DOI 10.1145/1127345.1127346
[2]  
Ateniese G., 2005, P 12 ACM C COMP COMM, P310, DOI DOI 10.1145/1102120.1102161
[3]  
Beimel A., 1996, SECURE SCHEMES SECRE
[4]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[5]  
Blaze M, 1998, LECT NOTES COMPUT SC, V1403, P127, DOI 10.1007/BFb0054122
[6]  
Bonch D., 2001, POC 21 ANN INT CRYPT, P213
[7]   A Blockchain-Based Proxy Re-Encryption With Equality Test for Vehicular Communication Systems [J].
Chen, Biwen ;
He, Debiao ;
Kumar, Neeraj ;
Wang, Huaqun ;
Choo, Kim-Kwang Raymond .
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2021, 8 (03) :2048-2059
[8]   Double Rainbows: A Promising Distributed Data Sharing in Augmented Intelligence of Things [J].
Chen, Long ;
Xue, Lingyan ;
Huang, Haiping ;
Wang, Wenming ;
Cao, Mengxun ;
Xiao, Fu .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2023, 19 (01) :653-661
[9]   Identity-Based Encryption Transformation for Flexible Sharing of Encrypted Data in Public Cloud [J].
Deng, Hua ;
Qin, Zheng ;
Wu, Qianhong ;
Guan, Zhenyu ;
Deng, Robert H. ;
Wang, Yujue ;
Zhou, Yunya .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 :3168-3180
[10]   Flexible attribute-based proxy re-encryption for efficient data sharing [J].
Deng, Hua ;
Qin, Zheng ;
Wu, Qianhong ;
Guan, Zhenyu ;
Zhou, Yunya .
INFORMATION SCIENCES, 2020, 511 :94-113