Fine-grained data access control with attribute-hiding policy for cloud-based IoT

被引:78
作者
Hao, Jialu [1 ]
Huang, Cheng [2 ]
Ni, Jianbing [2 ]
Rong, Hong [1 ]
Xian, Ming [1 ]
Shen, Xuemin [2 ]
机构
[1] Natl Univ Def Technol, Coll Elect Sci & Technol, Changsha 410073, Hunan, Peoples R China
[2] Univ Waterloo, Dept Elect & Comp Engn, Waterloo, ON N2L 3G1, Canada
关键词
Access control; Attribute-based encryption; Attribute hiding; Policy privacy; Cloud computing; Internet of Things; ENCRYPTION SCHEME; CHALLENGES; EFFICIENT; INTERNET;
D O I
10.1016/j.comnet.2019.02.008
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Ciphertext-policy attribute-based encryption (CP-ABE) is a promising approach to achieve fine-grained access control over the outsourced data in Internet of Things (IoT). However, in the existing CP-ABE schemes, the access policy is either appended to the ciphertext explicitly or only partially hidden against public visibility, which results in privacy leakage of the underlying ciphertext and potential recipients. In this paper, we propose a fine-grained data access control scheme supporting expressive access policy with fully attribute hidden for cloud-based IoT. Specifically, the attribute information is fully hidden in access policy by using randomizable technique, and a fuzzy attribute positioning mechanism based on garbled Bloom filter is developed to help the authorized recipients locate their attributes efficiently and decrypt the ciphertext successfully. Security analysis and performance evaluation demonstrate that the proposed scheme achieves effective policy privacy preservation with low storage and computation overhead. As a result, no valuable attribute information in the access policy will be disclosed to the unauthorized recipients. (C) 2019 Elsevier B.V. All rights reserved.
引用
收藏
页码:1 / 10
页数:10
相关论文
共 29 条
[1]  
[Anonymous], APPL CRYPTOGRAPHY PR
[2]   SPACE/TIME TRADE/OFFS IN HASH CODING WITH ALLOWABLE ERRORS [J].
BLOOM, BH .
COMMUNICATIONS OF THE ACM, 1970, 13 (07) :422-&
[3]  
Boneh D, 2007, LECT NOTES COMPUT SC, V4392, P535
[4]   A probabilistic study on combinatorial expanders and hashing [J].
Bradford, Phillip G. ;
Katehakis, Michael N. .
SIAM JOURNAL ON COMPUTING, 2007, 37 (01) :83-111
[5]   An efficient and expressive ciphertext-policy attribute-based encryption scheme with partially hidden access structures, revisited [J].
Cui, Hui ;
Deng, Robert H. ;
Lai, Junzuo ;
Yi, Xun ;
Nepal, Surya .
COMPUTER NETWORKS, 2018, 133 :157-165
[6]   An Efficient and Expressive Ciphertext-Policy Attribute-Based Encryption Scheme with Partially Hidden Access Structures [J].
Cui, Hui ;
Deng, Robert H. ;
Wu, Guowei ;
Lai, Junzuo .
PROVABLE SECURITY, (PROVSEC 2016), 2016, 10005 :19-38
[7]  
Dong C., 2013, P 2013 ACM SIGSAC C, P789, DOI DOI 10.1145/2508859.2516701
[8]  
Goyal V., 2006, P 2006 INT C PRIVACY, P1
[9]   Exteraction: A New State of User Experience Processing for Understanding People [J].
Hao, Jie ;
Pan, Yuehan ;
Zhu, Qiheng ;
Fu, Zhiyong .
PROCEEDINGS OF CHINESE CHI 2018: SIXTH INTERNATIONAL SYMPOSIUM OF CHINESE CHI (CHINESE CHI 2018), 2018, :1-10
[10]   Lightweight attribute based encryption scheme for mobile cloud assisted cyber-physical systems [J].
He, Qian ;
Zhang, Ning ;
Wei, Yongzhuang ;
Zhang, Yan .
COMPUTER NETWORKS, 2018, 140 :163-173