A dual auditing protocol for fine-grained access control in the edge-cloud-based smart home

被引:6
作者
Zhang, XiaoXu [1 ]
Shi, Run-hua [1 ]
Guo, WanPeng [1 ]
Wang, PengBo [1 ]
Ke, WeiYang [1 ]
机构
[1] North China Elect Power Univ, Sch Control & Comp Engn, Beijing 102206, Peoples R China
基金
中国国家自然科学基金;
关键词
Cloud computing; Edge computing; Smart home; Attribute-based encryption; Data integrity auditing; Smart contract; SECURITY;
D O I
10.1016/j.comnet.2023.109735
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Devices and edges of the Internet of Things (IoT) are working together to broaden the sensing capability of the IoT. The protection of personal sensory information privacy in the smart home has gotten more attention. To enable secure data sharing under the scenario of the smart home, attribute-based encryption (ABE) has been applied widely. As a general rule, the sophisticated calculation of ABE is difficult under resource-constrained devices. The appearance of edge computing alleviates this dilemma, where an edge server (ES) is responsible for computing all heavy cryptographic operations and uploading massive device data to a cloud. Nevertheless, the ES and the cloud may be attacked artificially in reality. Accordingly, to check the correctness of the ES data and the integrity of the cloud data, we design a lightweight dual auditing scheme, where the first adopts the aggregation of data blocks and signatures to check the integrity of the cloud data, and the second constructs an efficient Zero-Knowledge (ZK) proof to verify the correctness of the ES data in a lightweight way. To prevent collusion attacks, the legitimacy of the data user is authenticated by a smart contract. The simulation experiment shows that our multiple auditing scheme is relatively efficient.
引用
收藏
页数:13
相关论文
共 36 条
  • [1] Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
  • [2] PHOABE: Securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted IoT
    Belguith, Sana
    Kaaniche, Nesrine
    Laurent, Maryline
    Jemai, Abderrazak
    Attia, Rabah
    [J]. COMPUTER NETWORKS, 2018, 133 : 141 - 156
  • [3] Ciphertext-policy attribute-based encryption
    Bethencourt, John
    Sahai, Amit
    Waters, Brent
    [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +
  • [4] Practical integrity preservation for data streaming in cloud-assisted healthcare sensor systems
    Chen, Chi-Yuan
    Wu, Hsin-Min
    Wang, Lei
    Yu, Chia-Mu
    [J]. COMPUTER NETWORKS, 2017, 129 : 472 - 480
  • [5] Chen Y., 2020, EUR S RES COMP SEC
  • [6] Deepa N., 2020, arXiv, DOI DOI 10.1016/J.FUTURE.2022.01.017
  • [7] Goyal Vipul, 2006, P 13 ACM C COMP COMM, P89, DOI 10.1145/1180405.1180418
  • [8] Fine-grained data access control with attribute-hiding policy for cloud-based IoT
    Hao, Jialu
    Huang, Cheng
    Ni, Jianbing
    Rong, Hong
    Xian, Ming
    Shen, Xuemin
    [J]. COMPUTER NETWORKS, 2019, 153 : 1 - 10
  • [9] Reconfigurable Security: Edge-Computing-Based Framework for IoT
    Hsu, Ruei-Hau
    Lee, Jemin
    Quek, Tony Q. S.
    Chen, Jyh-Cheng
    [J]. IEEE NETWORK, 2018, 32 (05): : 92 - 99
  • [10] Attribute-Based Access Control
    Hu, Vincent C.
    Kuhn, D. Richard
    Ferraiolo, David F.
    [J]. COMPUTER, 2015, 48 (02) : 85 - 88