Attribute-Based Encryption Method for Data Privacy Security Protection

被引:0
作者
Li, Ziqian [1 ]
He, Yeshen [2 ]
Zhang, Yiying [1 ]
Li, Siwei [3 ]
Wang, Cong [1 ]
Zhang, Xiankun [1 ]
机构
[1] Tianjin Univ Sci & Technol, Artificial Intelligence Inst, Tianjin 300457, Peoples R China
[2] Shenzhen Guodian Technol Commun Co, Shenzhen 518000, Guangdong, Peoples R China
[3] Beijing Zhongdian Feihua Commun Co, Beijing 100070, Peoples R China
来源
ADVANCED INTELLIGENT COMPUTING TECHNOLOGY AND APPLICATIONS, PT IX, ICIC 2024 | 2024年 / 14870卷
关键词
Attribute-based encryption; Tactical hiding; Blockchain; Privacy protection; Cloud storage; BLOCKCHAIN; SCHEME;
D O I
10.1007/978-981-97-5606-3_39
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Storing power data in a cloud environment is an important step in the digital transformation of the power industry. Power data must be protected by a strict protection mechanism. Ensure that it is protected from any unauthorized access, tampering, or disclosure. However, the privacy security of the access policy cannot be guaranteed in the use of the ABE. It is also not possible to fully respond to changes in the user's attributes. In response to the above problems, this paper proposes a scheme combining blockchain technology and attribute-based encryption. By using the blockchain platform, it solves the problem of single point of failure caused by relying on a central entity in the traditional CP-ABE solution. The data information adopts CP-ABE encryption mode, stored the symmetric decryption key in the cloud server. Meanwhile, key information such as data summaries and file locations are stored on the blockchain to reduce the risk of data tampering with cloud servers. To further strengthen the storage security of data, access policies are converted into an access tree structure. And completely hide the policy in the redaction. This approach can effectively prevent unauthorized access. Experimental tests verify that the proposed method can better realize the privacy protection of power data in cloud storage.
引用
收藏
页码:458 / 467
页数:10
相关论文
共 17 条
[1]   Lattices-Inspired CP-ABE from LWE Scheme for Data Access and Sharing Based on Blockchain [J].
Chen, Taowei ;
Ren, Zhixin ;
Yu, Yimin ;
Zhu, Jie ;
Zhao, Jinyi .
APPLIED SCIENCES-BASEL, 2023, 13 (13)
[2]  
Cui G.H., 2023, Comput. Technol. Dev., V33, P66
[3]   Blockchain for power systems: Current trends and future applications [J].
Di Silvestre, Maria Luisa ;
Gallo, Pierluigi ;
Guerrero, Josep M. ;
Musca, Rossano ;
Sanseverino, Eleonora Riva ;
Sciume, Giuseppe ;
Vasquez, Juan C. ;
Zizzo, Gaetano .
RENEWABLE & SUSTAINABLE ENERGY REVIEWS, 2020, 119
[4]  
Gan T, 2023, Research on policy-hidden attribute-based encryption
[5]   Distributed finite-time attack detection and estimation of intelligent connected vehicle platoon [J].
Guo, Shenghui ;
Chen, Li ;
Huang, Darong ;
Song, Jiafeng .
JOURNAL OF CONTROL AND DECISION, 2024,
[6]   Encryption Scheme of Verifiable Search Based on Blockchain in Cloud Environment [J].
He, Buzhen ;
Feng, Tao .
CRYPTOGRAPHY, 2023, 7 (02)
[7]  
Li Z., 2023, Telecommun. Sci, V39, P116
[8]  
Qiu J.B., 2023, J. Sichuan Univ. (Nat. Sci. Edn.), P1
[9]   Secure decision tree classification with decentralized authorization and access control [J].
Wang, Chen ;
Xu, Jian ;
Tan, Shanru ;
Yin, Long .
COMPUTER STANDARDS & INTERFACES, 2024, 89
[10]  
Wang F., 2022, Comput. Simul, V39, P471