Blockchain-Enhanced Attribute-Based Encryption Architecture With Feasibility Analysis

被引:0
|
作者
Ferrer-Rojas, Agustin [1 ]
Maharaj, Bodhaswar T. [1 ]
Hlophe, Mduduzi C. [1 ]
机构
[1] University of Pretoria, Department of Electronic, Electrical, and Computer Engineering, Pretoria
关键词
Access control; consensus algorithms; Internet of Things; NS3; Paxos; PBFT; Raft;
D O I
10.1109/ACCESS.2025.3554643
中图分类号
学科分类号
摘要
In today’s digital landscape, data security is critical, particularly in the Internet of Things (IoT), where large volumes of sensitive data are exchanged. Traditional encryption methods like RSA and AES face challenges in balancing security and performance, exposing systems to advanced cyber threats. To address these issues, blockchain technology offers decentralized, tamper-resistant data protection that enhances trust and transparency. Attribute-Based Encryption (ABE) schemes have been developed, often combining asymmetric and symmetric encryption for efficiency and security. However, gaps remain in practical deployment due to underexplored network architectures and limited feasibility simulations. This study proposes an end-to-end security architecture integrating ABE with Linear Secret Sharing Scheme (LSSS) access policies and blockchain-based distributed key management. The system’s feasibility was evaluated using Network Simulator 3 (NS3) within a simulated IoT network. Results demonstrate a lightweight and scalable solution suitable for constrained environments. Numerical simulations showed consensus times as low as 0.25 seconds for key agreement and 0.7 seconds for message consensus, even in resource-constrained settings. For large networks, consensus times reached as low as 0.75 seconds. The system also achieved an average throughput of 0.3 transactions per second in low-resource environments. These outcomes highlight the system’s potential for secure, efficient data transmission in IoT and other distributed systems. © 2013 IEEE.
引用
收藏
页码:57629 / 57638
页数:9
相关论文
共 50 条
  • [21] An efficient and scalable vaccine passport verification system based on ciphertext policy attribute-based encryption and blockchain
    Somchart Fugkeaw
    Journal of Cloud Computing, 12
  • [22] MedSBA: a novel and secure scheme to share medical data based on blockchain technology and attribute-based encryption
    Pournaghi, Seyed Morteza
    Bayat, Majid
    Farjami, Yaghoub
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020, 11 (11) : 4613 - 4641
  • [23] Securely Outsourcing Attribute-Based Encryption with Checkability
    Li, Jin
    Huang, Xinyi
    Li, Jingwei
    Chen, Xiaofeng
    Xiang, Yang
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (08) : 2201 - 2210
  • [24] Batch Attribute-Based Encryption for Secure Clouds
    Yang, Chen
    Sun, Yang
    Wu, Qianhong
    INFORMATION, 2015, 6 (04) : 704 - 718
  • [25] Lightweight Attribute-based Encryption for the Internet of Things
    Oualha, Nouha
    Kim Thuat Nguyen
    2016 25TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN), 2016,
  • [26] An Efficient Ciphertext-Policy Attribute-Based Encryption Scheme Supporting Collaborative Decryption With Blockchain
    He, Ying
    Wang, Haiyan
    Li, Yuan
    Huang, Ke
    Leung, Victor C. M.
    Yu, F. Richard
    Ming, Zhong
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (04) : 2722 - 2733
  • [27] A survey on attribute-based encryption for internet of things
    Kumar, Dilip
    Kumar, Manoj
    Gupta, Gaurav
    INTERNATIONAL JOURNAL OF MODELING SIMULATION AND SCIENTIFIC COMPUTING, 2023, 14 (02)
  • [28] Revocable Blockchain-Aided Attribute-Based Encryption With Escrow-Free in Cloud Storage
    Guo, Yuyan
    Lu, Zhenhua
    Ge, Hui
    Li, Jiguo
    IEEE TRANSACTIONS ON COMPUTERS, 2023, 72 (07) : 1901 - 1912
  • [29] Attribute-Based Encryption Optimized for Cloud Computing
    Horvath, Mate
    SOFSEM 2015: THEORY AND PRACTICE OF COMPUTER SCIENCE, 2015, 8939 : 566 - 577
  • [30] Weighted Attribute-based Encryption with Parallelized Decryption
    Ionita, Alexandru
    SECRYPT : PROCEEDINGS OF THE 19TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2022, : 574 - 579