Accountable and Revocable Large Universe Decentralized Multi-Authority Attribute-Based Encryption for Cloud-Aided IoT

被引:11
作者
Huang, Kaiqing [1 ,2 ]
机构
[1] Dongguan Polytech, Modern Ind Innovat Practice Ctr, Dongguan 523808, Peoples R China
[2] South China Normal Univ, Sch Math Sci, Guangzhou 510631, Peoples R China
关键词
Encryption; Access control; Internet of Things; Outsourcing; Licenses; Cloud computing; Technological innovation; Decentralized; multi-authority attribute-based encryption; accountability; user-attribute revocation; outsourcing decryption; collusion attack; DATA ACCESS-CONTROL; TRACEABLE CP-ABE; EFFICIENT; INTERNET; STORAGE; THINGS; REVOCATION;
D O I
10.1109/ACCESS.2021.3110824
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The data collected, stored, shared, and accessed across different platforms in the dynamic IoT is mostly confidential and privacy-sensitive. Data security and access control issues urgently need to be addressed. Multi-authority attribute-based encryption (MA-ABE) is seen as a potential solution for addressing data access control security concerns in the dynamic IoT since it allows for dynamic access control over encrypted data. However, the existing key abuse problem is severely destroying the security access control of MA-ABE. The existing accountable attribute-based encryption schemes only support small attributes (users) universe and single authority. Moreover, they do not support revocation. Some schemes are inefficient since they are constructed in the composite order bilinear group. In this article, the author proposes the first accountable and revocable large universe decentralized multi-authority attribute-based encryption scheme with outsourcing decryption based on prime order bilinear groups. The proposed scheme allows for the dynamic capacity expansion of attributes, users, and authorities. An audit mechanism is given to judge if the suspicious key was leaked by a malicious user or by authorities and to determine the identity of the leaker. The malicious user who divulges key can be punished by user-attribute revocation. The revocation mechanism is resistant to collusion attacks undertaken by revoked users and non-revoked users. Meanwhile, it satisfies the requirements of forward and backward security. The proposed scheme is static security in the random oracle model under the q-DPBDHE2 assumption. To save resources, the outsourced decryption module is optional for users with restricted resources. According to the results of the performance analysis, it is suited for large-scale cross-domain cooperation in the dynamic cloud-aided IoT.
引用
收藏
页码:123786 / 123804
页数:19
相关论文
共 50 条
  • [41] Outsourced Decentralized Multi-Authority Attribute Based Signature and Its Application in IoT
    Sun, Jiameng
    Su, Ye
    Qin, Jing
    Hu, Jiankun
    Ma, Jixin
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2021, 9 (03) : 1195 - 1209
  • [42] Privacy-preserving Multi-authority Attribute-based Encryption with Dynamic Policy Updating in PHR
    Yan, Xixi
    Ni, Hao
    Liu, Yuan
    Han, Dezhi
    COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2019, 16 (03) : 831 - 847
  • [43] SLIM: A Secure and Lightweight Multi-Authority Attribute-Based Signcryption Scheme for IoT
    Gong, Bei
    Guo, Chong
    Guo, Chong
    Guo, Chen
    Sun, Yao
    Waqas, Muhammad
    Chen, Sheng
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 1299 - 1312
  • [44] A Key-revocable Attribute-based Encryption for Mobile Cloud Environments
    Ishiguro, Tsukasa
    Kiyomoto, Shinsaku
    Miyake, Yutaka
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT 2013), 2013, : 51 - 61
  • [45] Multi-Authority Attribute-Based Encryption Scheme With Access Delegation for Cross Blockchain Data Sharing
    Duan, Pengfei
    Ma, Zhaofeng
    Gao, Hongmin
    Tian, Tian
    Zhang, Yuqing
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2025, 20 : 323 - 337
  • [46] STR-ABKS: Server-Aided Traceable and Revocable Attribute-Based Encryption With Keyword Search
    Meng, Fei
    Cheng, Leixiao
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (07) : 12649 - 12659
  • [47] Privacy preserving secret key extraction protocol for multi-authority attribute-based encryption techniques in cloud computing
    Shynu, P. G.
    Singh, K. John
    INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2018, 10 (04) : 287 - 300
  • [48] Accountable specific attribute-based encryption scheme for cloud access control
    Nayudu, P. Prathap
    Sekhar, Krovi Raja
    INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2022,
  • [49] Security Analysis of a Decentralized, Revocable and Verifiable Attribute-Based Encryption Scheme
    Prantl, Thomas
    Lauer, Marco
    Horn, Lukas
    Engel, Simon
    Dingel, David
    Kounev, Samuel
    Bauer, Andre
    Krupitzer, Christian
    19TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY, ARES 2024, 2024,
  • [50] Privacy-Preserving Online/Offline and Outsourced Multi-Authority Attribute-Based Encryption
    Shao, Jiaye
    Zhu, Yanqin
    Ji, Qijin
    2017 16TH IEEE/ACIS INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE (ICIS 2017), 2017, : 285 - 291