Fine-grained data access control with attribute-hiding policy for cloud-based IoT

被引:78
作者
Hao, Jialu [1 ]
Huang, Cheng [2 ]
Ni, Jianbing [2 ]
Rong, Hong [1 ]
Xian, Ming [1 ]
Shen, Xuemin [2 ]
机构
[1] Natl Univ Def Technol, Coll Elect Sci & Technol, Changsha 410073, Hunan, Peoples R China
[2] Univ Waterloo, Dept Elect & Comp Engn, Waterloo, ON N2L 3G1, Canada
关键词
Access control; Attribute-based encryption; Attribute hiding; Policy privacy; Cloud computing; Internet of Things; ENCRYPTION SCHEME; CHALLENGES; EFFICIENT; INTERNET;
D O I
10.1016/j.comnet.2019.02.008
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Ciphertext-policy attribute-based encryption (CP-ABE) is a promising approach to achieve fine-grained access control over the outsourced data in Internet of Things (IoT). However, in the existing CP-ABE schemes, the access policy is either appended to the ciphertext explicitly or only partially hidden against public visibility, which results in privacy leakage of the underlying ciphertext and potential recipients. In this paper, we propose a fine-grained data access control scheme supporting expressive access policy with fully attribute hidden for cloud-based IoT. Specifically, the attribute information is fully hidden in access policy by using randomizable technique, and a fuzzy attribute positioning mechanism based on garbled Bloom filter is developed to help the authorized recipients locate their attributes efficiently and decrypt the ciphertext successfully. Security analysis and performance evaluation demonstrate that the proposed scheme achieves effective policy privacy preservation with low storage and computation overhead. As a result, no valuable attribute information in the access policy will be disclosed to the unauthorized recipients. (C) 2019 Elsevier B.V. All rights reserved.
引用
收藏
页码:1 / 10
页数:10
相关论文
共 29 条
[11]   An Expressive Hidden Access Policy CP-ABE [J].
Khan, Fawad ;
Li, Hui ;
Zhang, Liangxuan ;
Shen, Jian .
2017 IEEE SECOND INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC), 2017, :178-186
[12]   Internet of things security: A top-down survey [J].
Kouicem, Djamel Eddine ;
Bouabdallah, Abdelmadjid ;
Lakhlef, Hicham .
COMPUTER NETWORKS, 2018, 141 :199-221
[13]  
Lai JZ, 2012, 7TH ACM SYMPOSIUM ON INFORMATION, COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS 2012)
[14]  
Lai JZ, 2011, LECT NOTES COMPUT SC, V6672, P24, DOI 10.1007/978-3-642-21031-0_3
[15]  
Li J, 2009, LECT NOTES COMPUT SC, V5735, P347
[16]   Privacy-Preserving Outsourced Calculation Toolkit in the Cloud [J].
Liu, Ximeng ;
Deng, Robert H. ;
Choo, Kim-Kwang Raymond ;
Yang, Yang ;
Pang, HweeHwa .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (05) :898-911
[17]   Decentralized Policy-Hiding ABE with Receiver Privacy [J].
Michalevsky, Yan ;
Joye, Marc .
COMPUTER SECURITY (ESORICS 2018), PT II, 2018, 11099 :548-567
[18]   Securing Fog Computing for Internet of Things Applications: Challenges and Solutions [J].
Ni, Jianbing ;
Zhang, Kuan ;
Lin, Xiaodong ;
Shen, Xuemin .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2018, 20 (01) :601-628
[19]  
Nishide T, 2008, LECT NOTES COMPUT SC, V5037, P111, DOI 10.1007/978-3-540-68914-0_7
[20]   Access control in the Internet of Things: Big challenges and new opportunities [J].
Ouaddah, Aafaf ;
Mousannif, Hajar ;
Abou Elkalam, Anas ;
Ouahman, Abdellah Ait .
COMPUTER NETWORKS, 2017, 112 :237-262