Online/Offline MA-CP-ABE with Cryptographic Reverse Firewalls for IoT

被引:7
作者
Li, Juyan [1 ]
Fan, Ye [1 ]
Bian, Xuefen [1 ]
Yuan, Qi [2 ]
机构
[1] Heilongjiang Univ, Coll Data Sci & Technol, Harbin 150080, Peoples R China
[2] Qiqihar Univ, Coll Telecommun & Elect Engn, Qiqihar 161006, Peoples R China
基金
中国国家自然科学基金; 黑龙江省自然科学基金;
关键词
MA-CP-ABE; CRF; online; offline; outsourced decryption; IoT; ATTRIBUTE-BASED ENCRYPTION; MULTI-AUTHORITY; SCHEME;
D O I
10.3390/e25040616
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Devices in the Internet of Things (IoT) usually use cloud storage and cloud computing to save storage and computing cost. Therefore, the efficient realization of one-to-many communication of data on the premise of ensuring the security of cloud storage data is a challenge. Ciphertext-Policy Attribute-Based Encryption (CP-ABE) can not only protect the security of data in the cloud and achieve one-to-many communication but also achieve fine-grained access control for data. However, the single-authority CP-ABE faces the crisis of single point of failure. In order to improve security, the Multi-Authority CP-ABE (MA-CP-ABE) is adopted. Although there are provably-secure MA-CP-ABE schemes, Edward Snowden's research shows that provably-secure cryptographic schemes are vulnerable to backdoor attacks, resulting in secret disclosure, and thus threatening security. In addition, ABE requires huge computational overhead in key generation, encryption and decryption, which increase with the increase in the number of attributes and the complexity of the access structure, and there are a large number of resource-constrained devices in the IoT. To mitigate this issue, we construct the Online/Offline MA-CP-ABE with Cryptographic Reverse Firewalls (OO-MA-CP-ABE-CRFs) scheme. This scheme not only uses Cryptographic Reverse Firewall (CRF) to resist backdoor attacks but also uses online/offline key generation, online/offline encryption and outsourcing encryption technology to optimize the efficiency of the MA-CP-ABE scheme with reverse firewall, reducing the storage and computing cost of users. Finally, the security of the OO-MA-CP-ABE-CRFs scheme is proved, and the experimental results indicate that the scheme is efficient and practical.
引用
收藏
页数:19
相关论文
共 37 条
[1]   Verifiable online/offline multi-keyword search for cloud-assisted Industrial Internet of Things [J].
Ali, Mohammad ;
Sadeghi, Mohammad-Reza ;
Liu, Ximeng ;
Miao, Yinbin ;
Vasilakos, Athanasios V. .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 65
[2]  
[Anonymous], 2013, Revealed: how US and UK spy agencies defeat internet privacy and security
[3]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[4]  
Chase M, 2007, LECT NOTES COMPUT SC, V4392, P515
[5]  
Chase M, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P121
[6]   RMA-CPABE : A multi-authority CPABE scheme with reduced ciphertext size for IoT devices [J].
Chaudhary, Chandan Kumar ;
Sarma, Richa ;
Barbhuiya, Ferdous Ahmed .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2023, 138 :226-242
[7]   Efficient CP-ABE Scheme With Shared Decryption in Cloud Storage [J].
Chen, Ningyu ;
Li, Jiguo ;
Zhang, Yichen ;
Guo, Yuyan .
IEEE TRANSACTIONS ON COMPUTERS, 2022, 71 (01) :175-184
[8]   Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions [J].
Chen, Rongmao ;
Mu, Yi ;
Yang, Guomin ;
Susilo, Willy ;
Guo, Fuchun ;
Zhang, Mingwu .
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT I, 2016, 10031 :844-876
[9]   Multiauthority CP-ABE-based Access Control Model for IoT-enabled Healthcare Infrastructure [J].
Das, Sangjukta ;
Namasudra, Suyel .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2023, 19 (01) :821-829
[10]   Fully Secure Online/Offline Predicate and Attribute-Based Encryption [J].
Datta, Pratish ;
Dutta, Ratna ;
Mukhopadhyay, Sourav .
INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2015, 2015, 9065 :331-345