Accountable and Revocable Large Universe Decentralized Multi-Authority Attribute-Based Encryption for Cloud-Aided IoT

被引:11
|
作者
Huang, Kaiqing [1 ,2 ]
机构
[1] Dongguan Polytech, Modern Ind Innovat Practice Ctr, Dongguan 523808, Peoples R China
[2] South China Normal Univ, Sch Math Sci, Guangzhou 510631, Peoples R China
关键词
Encryption; Access control; Internet of Things; Outsourcing; Licenses; Cloud computing; Technological innovation; Decentralized; multi-authority attribute-based encryption; accountability; user-attribute revocation; outsourcing decryption; collusion attack; DATA ACCESS-CONTROL; TRACEABLE CP-ABE; EFFICIENT; INTERNET; STORAGE; THINGS; REVOCATION;
D O I
10.1109/ACCESS.2021.3110824
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The data collected, stored, shared, and accessed across different platforms in the dynamic IoT is mostly confidential and privacy-sensitive. Data security and access control issues urgently need to be addressed. Multi-authority attribute-based encryption (MA-ABE) is seen as a potential solution for addressing data access control security concerns in the dynamic IoT since it allows for dynamic access control over encrypted data. However, the existing key abuse problem is severely destroying the security access control of MA-ABE. The existing accountable attribute-based encryption schemes only support small attributes (users) universe and single authority. Moreover, they do not support revocation. Some schemes are inefficient since they are constructed in the composite order bilinear group. In this article, the author proposes the first accountable and revocable large universe decentralized multi-authority attribute-based encryption scheme with outsourcing decryption based on prime order bilinear groups. The proposed scheme allows for the dynamic capacity expansion of attributes, users, and authorities. An audit mechanism is given to judge if the suspicious key was leaked by a malicious user or by authorities and to determine the identity of the leaker. The malicious user who divulges key can be punished by user-attribute revocation. The revocation mechanism is resistant to collusion attacks undertaken by revoked users and non-revoked users. Meanwhile, it satisfies the requirements of forward and backward security. The proposed scheme is static security in the random oracle model under the q-DPBDHE2 assumption. To save resources, the outsourced decryption module is optional for users with restricted resources. According to the results of the performance analysis, it is suited for large-scale cross-domain cooperation in the dynamic cloud-aided IoT.
引用
收藏
页码:123786 / 123804
页数:19
相关论文
共 50 条
  • [21] Revocable Blockchain-Aided Attribute-Based Encryption With Escrow-Free in Cloud Storage
    Guo, Yuyan
    Lu, Zhenhua
    Ge, Hui
    Li, Jiguo
    IEEE TRANSACTIONS ON COMPUTERS, 2023, 72 (07) : 1901 - 1912
  • [22] Multi-authority attribute-based encryption with efficient revocation
    Zhang K.
    Ma J.-F.
    Li H.
    Zhang J.-W.
    Zhang T.
    Tongxin Xuebao/Journal on Communications, 2017, 38 (03): : 83 - 91
  • [23] Improving File Hierarchy Attribute-Based Encryption Scheme with Multi-authority in Cloud
    Kang, Li
    Zhang, Leyou
    FRONTIERS IN CYBER SECURITY, FCS 2019, 2019, 1105 : 3 - 18
  • [24] PHOABE: Securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted IoT
    Belguith, Sana
    Kaaniche, Nesrine
    Laurent, Maryline
    Jemai, Abderrazak
    Attia, Rabah
    COMPUTER NETWORKS, 2018, 133 : 141 - 156
  • [25] Decentralized, Revocable and Verifiable Attribute-Based Encryption in Hybrid Cloud System
    Yu, Ping
    Wen, Qiaoyan
    Ni, Wei
    Li, Wenmin
    Sun, Caijun
    Zhang, Hua
    Jin, Zhengping
    WIRELESS PERSONAL COMMUNICATIONS, 2019, 106 (02) : 719 - 738
  • [26] Large universe multi-authority attribute-based PHR sharing with user revocation
    Dong, Enting
    Wang, Jianfeng
    Liu, Zhenhua
    Ma, Hua
    INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2019, 19 (03) : 376 - 386
  • [27] SIMPLE MULTI-AUTHORITY ATTRIBUTE-BASED ENCRYPTION FOR SHORT MESSAGES
    Villanyi, Viktoria I.
    COMPUTING AND INFORMATICS, 2016, 35 (01) : 128 - 142
  • [28] Efficient quantum multi-authority attribute-based encryption and generalizations
    Chaudhury, Shion Samadder
    QUANTUM INFORMATION PROCESSING, 2024, 23 (10)
  • [29] Efficient Multi-authority Access Control using Attribute-based Encryption in Cloud Storage
    Challagidad, Praveen S.
    Birje, Mahantesh N.
    INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND DATA SCIENCE, 2020, 167 : 840 - 849
  • [30] Privacy-Preserving Traceable Attribute-Based Keyword Search in Multi-Authority Medical Cloud
    Huang, Qinlong
    Yan, Guanyu
    Yang, Yixian
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023, 11 (01) : 678 - 691