Data Access Control Scheme Based on Blockchain and Outsourced Verifiable Attribute-Based Encryption in Edge Computing

被引:0
作者
Ma, Chao [1 ]
Jin, Xiaojun [2 ]
Luo, Song [1 ]
Wei, Yifei [2 ]
Wang, Xiaojun [3 ]
机构
[1] China Acad Informat & Commun Technol, Beijing 100045, Peoples R China
[2] Univ Posts & Telecommun, Beijing 100876, Peoples R China
[3] Dublin City Univ, Dublin, Dublin, Ireland
来源
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS | 2023年 / 17卷 / 07期
关键词
Blockchain; CP-ABE; Edge Computing; Date Sharing; Attribute Revocation;
D O I
10.3837/tiis.2023.07.011
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The arrival of the Internet of Things and 5G technology enables users to rely on edge computing platforms to process massive data. Data sharing based on edge computing refines the efficiency of data collection and analysis, saves the communication cost of data transmission back and forth, but also causes the privacy leakage of a lot of user data. Based on attribute-based encryption and blockchain technology, we design a fine-grained access control scheme for data in edge computing, which has the characteristics of verifiability, support for outsourcing decryption and user attribute revocation. User attributes are authorized by multi-attribute authorization, and the calculation of outsourcing decryption in attribute encryption is completed by edge server, which reduces the computing cost of end users. Meanwhile, We implemented the user's attribute revocation process through the dual encryption process of attribute authority and blockchain. Compared with other schemes, our scheme can manage users' attributes more flexibly. Blockchain technology also ensures the verifiability in the process of outsourcing decryption, which reduces the space occupied by ciphertext compared with other schemes. Meanwhile, the user attribute revocation scheme realizes the dynamic management of user attribute and protects the privacy of user attribute.
引用
收藏
页码:1935 / 1950
页数:16
相关论文
共 50 条
  • [21] Attribute-based Encryption for Cloud Computing Access Control: A Survey
    Zhang, Yinghui
    Deng, Robert H.
    Xu, Shengmin
    Sun, Jianfei
    Li, Qi
    Zheng, Dong
    ACM COMPUTING SURVEYS, 2020, 53 (04)
  • [22] Attribute-Based Access Control for Vehicular Edge Cloud Computing
    Cheng, Cheng-Yu
    Liu, Hang
    Hsieh, Li-Tse
    Colbert, Edward
    Cho, Jin-Hee
    2020 IEEE CLOUD SUMMIT, 2020, : 18 - 24
  • [23] Attribute-based Access Control of Data Sharing Based on Hyperledger Blockchain
    Alniamy, Afnan
    Taylor, Bradley D.
    2020 2ND INTERNATIONAL CONFERENCE ON BLOCKCHAIN TECHNOLOGY (ICBCT 2020), 2020, : 135 - 139
  • [24] A Blockchain-Based Efficient and Verifiable Attribute-Based Proxy Re-Encryption Cloud Sharing Scheme
    Feng, Tao
    Wang, Dewei
    Gong, Renbin
    INFORMATION, 2023, 14 (05)
  • [25] An attribute-based access control scheme using blockchain technology for IoT data protection
    Yang, Zenghui
    Chen, Xiubo
    He, Yunfeng
    Liu, Luxi
    Che, Yinmei
    Wang, Xiao
    Xiao, Ke
    Xu, Gang
    HIGH-CONFIDENCE COMPUTING, 2024, 4 (03):
  • [26] Attribute-based data access control scheme with secure revocation in fog computing for smart grid
    Wu, Zhiwei
    Shi, Run-hua
    Li, Kunchang
    Yang, Yifan
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2022, 25 (06): : 3899 - 3913
  • [27] Data-Sharing System with Attribute-Based Encryption in Blockchain and Privacy Computing
    Wu, Hao
    Liu, Yu
    Zhu, Konglin
    Zhang, Lin
    SYMMETRY-BASEL, 2024, 16 (11):
  • [28] Accountable specific attribute-based encryption scheme for cloud access control
    Nayudu, P. Prathap
    Sekhar, Krovi Raja
    INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2022,
  • [29] Attribute-Based Encryption With Blockchain Protection Scheme for Electronic Health Records
    Jiang, Yu
    Xu, Xiaolong
    Xiao, Fu
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2022, 19 (04): : 3884 - 3895
  • [30] A Novel Attribute-Based Access Control Scheme Using Blockchain for IoT
    Ding, Sheng
    Cao, Jin
    Li, Chen
    Fan, Kai
    Li, Hui
    IEEE ACCESS, 2019, 7 : 38431 - 38441