Efficient and robust attribute-based encryption supporting access policy hiding in Internet of Things

被引:27
|
作者
Han, Qi [1 ]
Zhang, Yinghui [2 ,3 ]
Li, Hui [1 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Shaanxi, Peoples R China
[2] Xian Univ Posts & Telecommun, Natl Engn Lab Wireless Secur, Xian 710121, Shaanxi, Peoples R China
[3] Westone Cryptol Res Ctr, Beijing 100070, Peoples R China
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2018年 / 83卷
基金
中国国家自然科学基金;
关键词
IoT; Privacy; CP-ABE; Oblivious transfer; Bloom filter;
D O I
10.1016/j.future.2018.01.019
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The term of Internet of Things (IoT) remarkably increases the ubiquity of the internet by integrating smart object-based infrastructures. How to achieve efficient fine-grained data access control while preserving data privacy is a challenge task in the scenario of IoT. Despite ciphertext-policy attribute-based encryption (CP-ABE) can provide fine-grained data access control by allowing the specific users whose attributes match the access policy to decrypt ciphertexts. However, existing CP-ABE schemes will leak users' attribute values to the attribute authority (AA) in the phase of key generation, which poses a significant threat to users' privacy. To address this issue, we propose a new CP-ABE scheme which can successfully protect the user's attribute values against the AA based on 1-out-of-n oblivious transfer technique. In addition, we use Attribute Bloom Filter to protect the attribute type of the access policy in the ciphertext. Finally, security and efficiency evaluations show that the proposed scheme can achieve the desired security goals, while keeping comparable computation overhead. (C) 2018 Elsevier B.V. All rights reserved.
引用
收藏
页码:269 / 277
页数:9
相关论文
共 50 条
  • [1] Efficient Policy-Hiding and Large Universe Attribute-Based Encryption With Public Traceability for Internet of Medical Things
    Zeng, Peng
    Zhang, Zhiting
    Lu, Rongxing
    Choo, Kim-Kwang Raymond
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (13) : 10963 - 10972
  • [2] An Efficient Ciphertext-Policy Weighted Attribute-Based Encryption for the Internet of Health Things
    Li, Hang
    Yu, Keping
    Liu, Bin
    Feng, Chaosheng
    Qin, Zhiguang
    Srivastava, Gautam
    IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, 2022, 26 (05) : 1949 - 1960
  • [3] Ciphertext-Policy Attribute-Based Encryption with Hiding Access Structure
    Yadav, Umesh Chandra
    2015 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2015, : 23 - 27
  • [4] Combining IOTA and Attribute-Based Encryption for Access Control in the Internet of Things
    Zhang, Yuanyu
    Nakanishi, Ruka
    Sasabe, Masahiro
    Kasahara, Shoji
    SENSORS, 2021, 21 (15)
  • [5] Lightweight Attribute-based Encryption for the Internet of Things
    Oualha, Nouha
    Kim Thuat Nguyen
    2016 25TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN), 2016,
  • [6] A survey on attribute-based encryption for internet of things
    Kumar, Dilip
    Kumar, Manoj
    Gupta, Gaurav
    INTERNATIONAL JOURNAL OF MODELING SIMULATION AND SCIENTIFIC COMPUTING, 2023, 14 (02)
  • [7] Application of Attribute-based Encryption in Internet of Things
    Wang, Zixuan
    Liu, Hao
    Ma, Hao
    PROCEEDINGS OF THE 2018 8TH INTERNATIONAL CONFERENCE ON MANAGEMENT, EDUCATION AND INFORMATION (MEICI 2018), 2018, 163 : 180 - 183
  • [8] Ciphertext Policy-Hiding Attribute-Based Encryption
    Yadav, Umesh Chandra
    Ali, Syed Taqi
    2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2015, : 2067 - 2071
  • [9] Sharing and Privacy in PHRs: Efficient Policy Hiding and Update Attribute-based Encryption
    Liu, Zhenhua
    Ji, Jiaqi
    Yin, Fangfang
    Wang, Baocang
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2021, 15 (01): : 323 - 342
  • [10] A lightweight attribute-based encryption scheme for the Internet of Things
    Yao, Xuanxia
    Chen, Zhi
    Tian, Ye
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2015, 49 : 104 - 112