An Anonymous and Outsourcing-Supported Multiauthority Access Control Scheme With Revocation for Edge-Enabled IIoT System

被引:7
作者
Cui, Jie [1 ,2 ]
Bian, Fengyu [1 ,2 ]
Zhong, Hong [1 ,2 ]
Zhang, Qingyang [1 ,2 ]
Xu, Sheng [1 ,2 ]
Gu, Chengjie [3 ]
Liu, Lu [4 ]
机构
[1] Anhui Univ, Anhui Engn Lab IoT Secur Technol, Sch Comp Sci & Technol, Hefei 230039, Peoples R China
[2] Anhui Univ, Inst Phys Sci & Informat Technol, Hefei 230039, Peoples R China
[3] Secur Res Inst, New H3C Grp, Hefei 230088, Peoples R China
[4] Univ Leicester, Sch Informat, Leicester LE1 7RH, Leics, England
来源
IEEE SYSTEMS JOURNAL | 2022年 / 16卷 / 04期
关键词
Industrial Internet of Things; Encryption; Privacy; Security; Access control; Hospitals; Servers; Attribute-based encryption (ABE); edge computing; Industrial Internet of Things (IIoT); multiauthority; ATTRIBUTE-BASED ENCRYPTION; EFFICIENT; SECURE; INTERNET;
D O I
10.1109/JSYST.2022.3189219
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the application of the Internet of Things and intelligent technologies in industrial systems, the manufacturing efficiency and product quality have been improved, leading to the development of the Industrial Internet of Things (IIoT). Uploading private data to the cloud may lead to data leakage without security protection. Thus, attribute-based encryption (ABE) is widely used to ensure data security and implement data access control, and some multiauthority ABE schemes are proposed to meet the requirement of attributes from different authorities, such as factory and government, which is more suitable for the IIoT system. However, the current multiauthority ABE schemes are with privacy leakage problems on attributes and low-efficiency issues. To address these problems, we propose a multiauthority ABE scheme, which protects users' privacy by anonymizing attributes in authentication, reduces the computing burden of IIoT devices by adapting online/offline technique and outsourcing decryption to edge devices, and realizes effective attribute revocation. A formal security proof is presented that our scheme is replayable chosen ciphertext attack secure. Finally, we implement the proposed scheme, and experimental results show that our scheme is more efficient than the existing schemes.
引用
收藏
页码:6569 / 6580
页数:12
相关论文
共 36 条
  • [1] Canetti R, 2003, LECT NOTES COMPUT SC, V2729, P565
  • [2] Cui J., 2021, IEEE T IND ELECTRON, V68, P1330
  • [3] Efficient Decentralized Attribute Based Access Control for Mobile Clouds
    De, Sourya Joyee
    Ruj, Sushmita
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2020, 8 (01) : 124 - 137
  • [4] Efficient and privacy preserving access control scheme for fog-enabled IoT
    Fan, Kai
    Xu, Huiyue
    Gao, Longxiang
    Li, Hui
    Yang, Yintang
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 99 : 134 - 142
  • [5] A secure and efficient outsourced computation on data sharing scheme for privacy computing
    Fan, Kai
    Liu, Tingting
    Zhang, Kuan
    Li, Hui
    Yang, Yintang
    [J]. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2020, 135 : 169 - 176
  • [6] Green Matthew., 2011, USENIX SECURITY S, V2011
  • [7] Guo F., 2008, PROC INT C FINANCIAL, P1330
  • [8] Hohenberger S, 2014, LECT NOTES COMPUT SC, V8383, P293, DOI 10.1007/978-3-642-54631-0_17
  • [9] TAFC: Time and Attribute Factors Combined Access Control for Time-Sensitive Data in Public Cloud
    Hong, Jianan
    Xue, Kaiping
    Xue, Yingjie
    Chen, Weikeng
    Wei, David S. L.
    Yu, Nenghai
    Hong, Peilin
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2020, 13 (01) : 158 - 171
  • [10] Kate A, 2007, LECT NOTES COMPUT SC, V4776, P95