Efficient Fine-Grained Data Sharing Based on Proxy Re-Encryption in IIoT

被引:2
|
作者
Zhang, Qingyang [1 ]
Fu, Yujie [1 ]
Cui, Jie [1 ]
He, Debiao [2 ,3 ]
Zhong, Hong [1 ]
机构
[1] Anhui Univ, Inst Phys Sci & Informat Technol, Sch Comp Sci & Technol, Anhui Engn Lab IoT Secur Technol,Key Lab Intellige, Hefei 230039, Peoples R China
[2] Wuhan Univ, Sch Cyber Sci & Engn, Wuhan 430072, Peoples R China
[3] MatrixElements Technol, Shanghai Key Lab Privacy Preserving Computat, Shanghai 201204, Peoples R China
基金
中国国家自然科学基金;
关键词
Industrial Internet of Things; Encryption; Cryptography; Costs; Servers; Access control; Computational efficiency; data sharing; attribute-based encryption; proxy re-encryption; access control; ACCESS-CONTROL; SCHEME; SECURE; INTERNET;
D O I
10.1109/TDSC.2024.3386690
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of the industrial Internet of Things (IIoT), the amount of data generated by industrial manufacturing equipment will increase. To reduce the cost of data management while achieving secure data sharing, data owners generally upload the resulting ciphertexts to a cloud server after encrypting their data. Attribute-based encryption (ABE) is a valuable technology that implements fine-grained access control over shared information; however, its computational complexity is not suitable for resource-constrained IIoT devices, making it difficult to apply directly to an IIoT environment. To address this problem, we design a fine-grained data sharing scheme based on proxy re-encryption in IIoT. In the proposed scheme, data files are encrypted through an identity-based encryption and a data owner can authorize a semi-trusted proxy server to transform the ciphertext into an ABE ciphertext. This realizes fine-grained access control and decreases a data owner's computational cost in data sharing. In addition, the computational burden is outsourced to a cloud server, and users only need to perform simple computing operations. A formal security proof indicates the proposed scheme's selective chosen-plaintext attack security. Theoretical and experimental analyses illustrate that our construction is more efficient than previous schemes.
引用
收藏
页码:5797 / 5809
页数:13
相关论文
共 50 条
  • [41] A Threshold Proxy Re-Encryption Scheme for Secure IoT Data Sharing Based on Blockchain
    Chen, Yingwen
    Hu, Bowen
    Yu, Hujie
    Duan, Zhimin
    Huang, Junxin
    ELECTRONICS, 2021, 10 (19)
  • [42] Identity-Based Broadcast Proxy Re-Encryption for Flexible Data Sharing in VANETs
    Zhang, Jing
    Su, Shuangshuang
    Zhong, Hong
    Cui, Jie
    He, Debiao
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 4830 - 4842
  • [43] A Blockchain-Based Efficient and Verifiable Attribute-Based Proxy Re-Encryption Cloud Sharing Scheme
    Feng, Tao
    Wang, Dewei
    Gong, Renbin
    INFORMATION, 2023, 14 (05)
  • [44] Public Trace-and-Revoke Proxy Re-Encryption for Secure Data Sharing in Clouds
    Luo, Fucai
    Wang, Haiyan
    Susilo, Willy
    Yan, Xingfu
    Zheng, Xiaofan
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 2919 - 2934
  • [45] CL-PRE: a Certificateless Proxy Re-Encryption Scheme for Secure Data Sharing with Public Cloud
    Xu, Lei
    Wu, Xiaoxin
    Zhang, Xinwen
    7TH ACM SYMPOSIUM ON INFORMATION, COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS 2012), 2012,
  • [46] Blockchain-based privacy-preserving data-sharing framework using proxy re-encryption scheme and interplanetary file system
    Jhong-Ting Lou
    Showkat Ahmad Bhat
    Nen-Fu Huang
    Peer-to-Peer Networking and Applications, 2023, 16 : 2415 - 2437
  • [47] A secure and efficient electronic medical record data sharing scheme based on blockchain and proxy re-encryption
    Guijiang Liu
    Haibo Xie
    Wenming Wang
    Haiping Huang
    Journal of Cloud Computing, 13
  • [48] Efficient and HRA Secure Universal Conditional Proxy Re-Encryption for Cloud-Based Data Sharing
    Hu, Huidan
    Zhou, Yuanjian
    Cao, Zhenfu
    Dong, Xiaolei
    APPLIED SCIENCES-BASEL, 2022, 12 (19):
  • [49] Efficient Unidirectional Proxy Re-Encryption
    Chow, Sherman S. M.
    Weng, Jian
    Yang, Yanjiang
    Deng, Robert H.
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2010, 2010, 6055 : 316 - +
  • [50] Conditional Identity-Based Broadcast Proxy Re-Encryption With Anonymity and Revocation
    Chen, Liqing
    Zhang, Meng
    Li, Jiguo
    IEEE TRANSACTIONS ON RELIABILITY, 2025,