A Multi-Group-Supporting Policy Hidden Fine-Grained Data Sharing Scheme in 5G-Enabled IoT With Edge Computing

被引:1
作者
Cai, Jiayin [1 ]
Zhang, Hongjie [2 ]
Duo, Zhilin [3 ]
Wang, Xuan [1 ]
Zhao, Xingwen [1 ]
机构
[1] Xidian Univ, Sch Cyber Engn, Xian 710126, Peoples R China
[2] State Grid Ningxia Elect Power Co Ltd, Yinchuan 750011, Ningxia, Peoples R China
[3] Beijing Kedong Elect Power Control Syst Co Ltd, Beijing 100192, Peoples R China
关键词
5G-enabled IoT; data sharing; CP-ABE scheme; dynamic multi-group management; policy hidden; edge computing; ATTRIBUTE-BASED ENCRYPTION; INDUSTRIAL INTERNET; DELEGATION; EFFICIENT; ABE;
D O I
10.1109/ACCESS.2024.3381509
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Relying on the low latency, high reliability, and large bandwidth of 5G networks, the Internet of Things (IoT) can more efficiently promote information interaction and data utilization across remote locations. However, publicly accessible IoT environments involve risks of data and privacy leakage, which threatens the security and feasibility of the cloud-assisted IoT system. Although attribute-based encryption technology provides a fine-grained and secure data sharing solution, it is still challenging to employ dynamic management of multiple groups when device nodes operate cooperatively in dynamic groups. Thus, we propose a dynamic multi-group-supporting policy-hidden secure data sharing scheme in 5G-enabled IoT. Specifically, we exploit a group key management scheme based on the Chinese Remainder Theorem to achieve efficient dynamic group management in IoT and implement concealment of data owners' access policies to enhance privacy preservation. Moreover, an edge computing layer has been introduced in our 5G-enabled IoT system to entrust decryption to edge servers and cloud servers, thereby mitigating the calculation burden of data users and assisting to fortify resilience against potential collusion attacks. To improve the availability of our system, mechanisms for validating the correctness of the final ciphertext were also incorporated. We further proved the security of the proposed scheme and conducted experimental simulations, which affirm its efficiency and practicability.
引用
收藏
页码:46362 / 46378
页数:17
相关论文
共 47 条
[1]   Deploying Fog Computing in Industrial Internet of Things and Industry 4.0 [J].
Aazam, Mohammad ;
Zeadally, Sherali ;
Harras, Khaled A. .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (10) :4674-4682
[2]   Highly Efficient and Revocable CP-ABE with Outsourcing Decryption for IoT [J].
Abdollahi, Sina ;
Mohajeri, Javad ;
Salmasizadeh, Mahmoud .
ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2023, 15 (01) :97-110
[3]   Fine-Grained Data Sharing With Enhanced Privacy Protection and Dynamic Users Group Service for the IoV [J].
Bao, Yangyang ;
Qiu, Weidong ;
Cheng, Xiaochun ;
Sun, Jianfei .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2023, 24 (11) :13035-13049
[4]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[5]   Efficient CP-ABE Scheme With Shared Decryption in Cloud Storage [J].
Chen, Ningyu ;
Li, Jiguo ;
Zhang, Yichen ;
Guo, Yuyan .
IEEE TRANSACTIONS ON COMPUTERS, 2022, 71 (01) :175-184
[6]  
Delerablee L., 2022, Key-policy ABE withswitchable attributes,'' inSecurity and Cryptography for Networks, P147
[7]   Revocable Attribute-Based Encryption With Data Integrity in Clouds [J].
Ge, Chunpeng ;
Susilo, Willy ;
Baek, Joonsang ;
Liu, Zhe ;
Xia, Jinyue ;
Fang, Liming .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (05) :2864-2872
[8]  
Goyal V., 2006, Proceedings of the 13th ACM Conference on Computer and Communications Security, P89, DOI DOI 10.1145/1180405.1180418
[9]  
Green M., 2011, 20 USENIX SECUR S, P1
[10]   Revocable Blockchain-Aided Attribute-Based Encryption With Escrow-Free in Cloud Storage [J].
Guo, Yuyan ;
Lu, Zhenhua ;
Ge, Hui ;
Li, Jiguo .
IEEE TRANSACTIONS ON COMPUTERS, 2023, 72 (07) :1901-1912