Efficient Fine-Grained Data Sharing Based on Proxy Re-Encryption in IIoT

被引:2
|
作者
Zhang, Qingyang [1 ]
Fu, Yujie [1 ]
Cui, Jie [1 ]
He, Debiao [2 ,3 ]
Zhong, Hong [1 ]
机构
[1] Anhui Univ, Inst Phys Sci & Informat Technol, Sch Comp Sci & Technol, Anhui Engn Lab IoT Secur Technol,Key Lab Intellige, Hefei 230039, Peoples R China
[2] Wuhan Univ, Sch Cyber Sci & Engn, Wuhan 430072, Peoples R China
[3] MatrixElements Technol, Shanghai Key Lab Privacy Preserving Computat, Shanghai 201204, Peoples R China
基金
中国国家自然科学基金;
关键词
Industrial Internet of Things; Encryption; Cryptography; Costs; Servers; Access control; Computational efficiency; data sharing; attribute-based encryption; proxy re-encryption; access control; ACCESS-CONTROL; SCHEME; SECURE; INTERNET;
D O I
10.1109/TDSC.2024.3386690
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of the industrial Internet of Things (IIoT), the amount of data generated by industrial manufacturing equipment will increase. To reduce the cost of data management while achieving secure data sharing, data owners generally upload the resulting ciphertexts to a cloud server after encrypting their data. Attribute-based encryption (ABE) is a valuable technology that implements fine-grained access control over shared information; however, its computational complexity is not suitable for resource-constrained IIoT devices, making it difficult to apply directly to an IIoT environment. To address this problem, we design a fine-grained data sharing scheme based on proxy re-encryption in IIoT. In the proposed scheme, data files are encrypted through an identity-based encryption and a data owner can authorize a semi-trusted proxy server to transform the ciphertext into an ABE ciphertext. This realizes fine-grained access control and decreases a data owner's computational cost in data sharing. In addition, the computational burden is outsourced to a cloud server, and users only need to perform simple computing operations. A formal security proof indicates the proposed scheme's selective chosen-plaintext attack security. Theoretical and experimental analyses illustrate that our construction is more efficient than previous schemes.
引用
收藏
页码:5797 / 5809
页数:13
相关论文
共 50 条
  • [31] A proxy broadcast re-encryption for cloud data sharing
    Sun, Maosheng
    Ge, Chunpeng
    Fang, Liming
    Wang, Jiandong
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (09) : 10455 - 10469
  • [32] A proxy broadcast re-encryption for cloud data sharing
    Maosheng Sun
    Chunpeng Ge
    Liming Fang
    Jiandong Wang
    Multimedia Tools and Applications, 2018, 77 : 10455 - 10469
  • [33] Blockchain-based Scalable and Secure EHR Data Sharing using Proxy Re-Encryption
    Sammeta, Naresh
    Parthiban, Latha
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2023, 20 (05) : 702 - 710
  • [34] Achieving fine-grained and flexible access control on blockchain-based data sharing for the Internet of Things
    Wang, Ruimiao
    Wang, Xiaodong
    Yang, Wenti
    Yuan, Shuai
    Guan, Zhitao
    CHINA COMMUNICATIONS, 2022, 19 (06) : 22 - 34
  • [35] Blockchain Data Controlled Sharing Scheme Based on Proxy Re-Encryption
    Guo Q.
    Tian Y.-L.
    Wan L.
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2023, 51 (02): : 477 - 488
  • [36] Data sharing using proxy re-encryption based on DNA computing
    Elhadad, Ahmed
    SOFT COMPUTING, 2020, 24 (03) : 2101 - 2108
  • [37] Data sharing using proxy re-encryption based on DNA computing
    Ahmed Elhadad
    Soft Computing, 2020, 24 : 2101 - 2108
  • [38] Efficient Certificate-Based Proxy Re-encryption Scheme for Data Sharing in Public Clouds
    Lu, Yang
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2015, 9 (07): : 2703 - 2718
  • [39] Attribute-based Searchable Proxy Re-encryption Blockchain Data Sharing Scheme
    Xu, Guangxia
    Huang, Yuling
    Ma, Chuang
    2023 IEEE 12TH INTERNATIONAL CONFERENCE ON CLOUD NETWORKING, CLOUDNET, 2023, : 372 - 380
  • [40] WB-PROXSHARE: A WARRANT-BASED PROXY RE-ENCRYPTION MODEL FOR SECURE DATA SHARING IN IOT NETWORKS VIA BLOCKCHAIN
    Sey, Collins
    Lei, Hang
    Li, Xiaoyu
    Qian, Weizhong
    Barnes, Obed
    Fiasam, Linda Delali
    Zhang, Cong
    Kodjiku, Seth Larweh
    Agyemang, Isaac Osei
    Adjei-Mensah, Isaac
    Shang, Xiaolei
    2022 19TH INTERNATIONAL COMPUTER CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (ICCWAMTIP), 2022,