Efficient Data Sharing Scheme With Fine-Grained Access Control and Integrity Auditing in Terminal-Edge-Cloud Network

被引:1
作者
Yao, Yufeng [1 ,2 ]
Chang, Jinyong [1 ,2 ,3 ]
Zhang, Anling [4 ]
机构
[1] Xian Univ Architecture & Technol, Sch Informat & Control Engn, Xian 710064, Shaanxi, Peoples R China
[2] Xian Univ Architecture & Technol, Inst Interdisciplinary & Innovate Res, Xian 710064, Shaanxi, Peoples R China
[3] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710055, Peoples R China
[4] Changzhi Univ, Dept Math, Changzhi 046011, Shanxi, Peoples R China
来源
IEEE INTERNET OF THINGS JOURNAL | 2024年 / 11卷 / 16期
关键词
Cloud computing; Servers; Access control; Smart devices; Protocols; Internet of Things; Cryptography; Attributed-based encryption; cloud storage; edge computing; integrity auditing; privacy preserving;
D O I
10.1109/JIOT.2024.3393639
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, terminal-edge-cloud framework is very popular since it combines the storage ability of cloud servers with the advantages of timely response of edge nodes. How to realize the secure and fast data transmission from the terminal device to the edge node under the premise of weak computational ability and limited storage space for terminal devices, how to ensure that the original data can be securely obtained by authorized users, and how to efficiently audit the integrity of data in the cloud storage are still challenging issues. Although Zhang et al. designed a data sharing scheme, which is based on blockchain and hybrid encryption model, and simultaneously considers these issues, the security and performance of this scheme can be greatly improved. The reason lies in that the storage of symmetric key on blockchain will result in its potential leakage once one entity among the Chain becomes dishonest. Therefore, this article proposes a new data sharing protocol. In our protocol, lightweight symmetric encryption is first used to securely transmit data between terminal devices and edge nodes. Second, the edge node uses ciphertext-policy attribute-based encryption technology to encrypt the original data collected by the terminal device. Only authorized users who meet the access policy can correctly recover the data, thus ensuring the fine-grained access control. In addition, in the integrity audit process of stored data, authentication based on homomorphic signatures is adopted to achieve efficient auditing based on third-party auditors. Finally, simulation of the entire data sharing system reveals that our proposed protocol is relatively efficient and competitive in future Internet of Things applications.
引用
收藏
页码:26944 / 26954
页数:11
相关论文
共 28 条
  • [1] [Anonymous], 2016, The gnu multiple precision arithmetic library
  • [2] Ciphertext-policy attribute-based encryption
    Bethencourt, John
    Sahai, Amit
    Waters, Brent
    [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +
  • [3] Efficient Revocable Attribute-Based Encryption With Verifiable Data Integrity
    Chen, Shaobo
    Li, Jiguo
    Zhang, Yichen
    Han, Jinguang
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (06) : 10441 - 10451
  • [4] A survey on blockchain for big data: Approaches, opportunities, and future directions
    Deepa, N.
    Pham, Quoc-Viet
    Nguyen, Dinh C.
    Bhattacharya, Sweta
    Prabadevi, B.
    Fang, Fang
    Pathirana, Pubudu N.
    Gadekallu, Thippa Reddy
    Maddikunta, Praveen Kumar Reddy
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2022, 131 : 209 - 226
  • [5] Enabling Secure and Efficient Decentralized Storage Auditing With Blockchain
    Du, Yuefeng
    Duan, Huayi
    Zhou, Anxin
    Wang, Cong
    Au, Man Ho
    Wang, Qian
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (05) : 3038 - 3054
  • [6] Secure and Lightweight Blockchain-Enabled Access Control for Fog-Assisted IoT Cloud Based Electronic Medical Records Sharing
    Fugkeaw, Somchart
    Wirz, Leon
    Hak, Lyhour
    [J]. IEEE ACCESS, 2023, 11 : 62998 - 63012
  • [7] Revocable Attribute-Based Encryption With Data Integrity in Clouds
    Ge, Chunpeng
    Susilo, Willy
    Baek, Joonsang
    Liu, Zhe
    Xia, Jinyue
    Fang, Liming
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (05) : 2864 - 2872
  • [8] Goswami P., 2023, IEEE Access, V11
  • [9] Goyal V., 2006, P 13 ACM C COMP COMM, P898
  • [10] Juels A, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P584