Accountable and Revocable Large Universe Decentralized Multi-Authority Attribute-Based Encryption for Cloud-Aided IoT

被引:11
|
作者
Huang, Kaiqing [1 ,2 ]
机构
[1] Dongguan Polytech, Modern Ind Innovat Practice Ctr, Dongguan 523808, Peoples R China
[2] South China Normal Univ, Sch Math Sci, Guangzhou 510631, Peoples R China
关键词
Encryption; Access control; Internet of Things; Outsourcing; Licenses; Cloud computing; Technological innovation; Decentralized; multi-authority attribute-based encryption; accountability; user-attribute revocation; outsourcing decryption; collusion attack; DATA ACCESS-CONTROL; TRACEABLE CP-ABE; EFFICIENT; INTERNET; STORAGE; THINGS; REVOCATION;
D O I
10.1109/ACCESS.2021.3110824
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The data collected, stored, shared, and accessed across different platforms in the dynamic IoT is mostly confidential and privacy-sensitive. Data security and access control issues urgently need to be addressed. Multi-authority attribute-based encryption (MA-ABE) is seen as a potential solution for addressing data access control security concerns in the dynamic IoT since it allows for dynamic access control over encrypted data. However, the existing key abuse problem is severely destroying the security access control of MA-ABE. The existing accountable attribute-based encryption schemes only support small attributes (users) universe and single authority. Moreover, they do not support revocation. Some schemes are inefficient since they are constructed in the composite order bilinear group. In this article, the author proposes the first accountable and revocable large universe decentralized multi-authority attribute-based encryption scheme with outsourcing decryption based on prime order bilinear groups. The proposed scheme allows for the dynamic capacity expansion of attributes, users, and authorities. An audit mechanism is given to judge if the suspicious key was leaked by a malicious user or by authorities and to determine the identity of the leaker. The malicious user who divulges key can be punished by user-attribute revocation. The revocation mechanism is resistant to collusion attacks undertaken by revoked users and non-revoked users. Meanwhile, it satisfies the requirements of forward and backward security. The proposed scheme is static security in the random oracle model under the q-DPBDHE2 assumption. To save resources, the outsourced decryption module is optional for users with restricted resources. According to the results of the performance analysis, it is suited for large-scale cross-domain cooperation in the dynamic cloud-aided IoT.
引用
收藏
页码:123786 / 123804
页数:19
相关论文
共 50 条
  • [11] Revocable Decentralized Multi-Authority Functional Encryption
    Tsuchida, Hikaru
    Nishide, Takashi
    Okamoto, Eiji
    Kim, Kwangjo
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2016, 2016, 10095 : 248 - 265
  • [12] Cryptanalysis to Ming et al.'s Revocable Multi-Authority Attribute-Based Encryption
    Tseng, Yi-Fan
    Yang, Hao-Yu
    Wu, Chieh-Han
    Chien, Tsung-Yu
    Tso, Raylin
    Liu, Zi-Yuan
    Hsu, Jen-Chieh
    2022 17TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY, ASIAJCIS, 2022, : 29 - 32
  • [13] Multi-Authority Attribute-Based Keyword Search over Encrypted Cloud Data
    Miao, Yinbin
    Deng, Robert H.
    Liu, Ximeng
    Choo, Kim-Kwang Raymond
    Wu, Hongjun
    Li, Hongwei
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (04) : 1667 - 1680
  • [14] Verifiable and auditable multi-authority attribute-based encryption
    Wang, Xingwang
    Zeng, Peng
    Luo, Jiaying
    COMPUTER STANDARDS & INTERFACES, 2025, 94
  • [15] A decentralized multi-authority ciphertext-policy attribute-based encryption with mediated obfuscation
    Jiguo Li
    Shengzhou Hu
    Yichen Zhang
    Jinguang Han
    Soft Computing, 2020, 24 : 1869 - 1882
  • [16] TRACEABLE MULTI-AUTHORITY ATTRIBUTE-BASED ENCRYPTION SCHEME FOR CLOUD COMPUTING
    Yang, Xiaodong
    Yang, Ping
    An, Faying
    Zhou, Qixu
    Yang, Miaomiao
    2017 14TH INTERNATIONAL COMPUTER CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (ICCWAMTIP), 2017, : 263 - 267
  • [17] Large-Universe Attribute-Based Encryption With Public Traceability for Cloud Storage
    Zhang, Zhiting
    Zeng, Peng
    Pan, Bofeng
    Choo, Kim-Kwang Raymond
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (10): : 10314 - 10323
  • [18] Revocable and Decentralized Attribute-Based Encryption
    Cui, Hui
    Deng, Robert H.
    COMPUTER JOURNAL, 2016, 59 (08): : 1220 - 1235
  • [19] Server-aided revocable attribute-based encryption for cloud computing services
    Cui, Hui
    Yuen, Tsz Hon
    Deng, Robert H.
    Wang, Guilin
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2020, 32 (14):
  • [20] Secure Online/Offline Multi-Authority Attribute-Based Encryption for Resource-Constrained Devices in Cloud Computing
    Shao, Jiaye
    Zhu, Yanqin
    Ji, Qijin
    2018 IEEE SMARTWORLD, UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTING, SCALABLE COMPUTING & COMMUNICATIONS, CLOUD & BIG DATA COMPUTING, INTERNET OF PEOPLE AND SMART CITY INNOVATION (SMARTWORLD/SCALCOM/UIC/ATC/CBDCOM/IOP/SCI), 2018, : 642 - 649