Achieve Revocable Access Control for Fog-based Smart Grid System

被引:4
作者
Chen, Shan [1 ]
Wen, Mi [1 ]
Lu, Rongxing [2 ]
Li, Jinguo [1 ]
Chen, Sijia [1 ]
机构
[1] Shanghai Univ Elect Power, Coll Comp Sci & Technol, Shanghai, Peoples R China
[2] Univ New Brunswick, Fac Comp Sci, New Brunswick, NJ USA
来源
2019 IEEE 90TH VEHICULAR TECHNOLOGY CONFERENCE (VTC2019-FALL) | 2019年
基金
中国国家自然科学基金;
关键词
CP-ABE Scheme; Revocation; Fog Computing; Smart Grid; SECURE;
D O I
10.1109/vtcfall.2019.8891162
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to its prodigious advantages, smart grid technology has received considerable attention in recent years. However, security issues are still currently challenging in smart grid. In this paper, aiming at tackle the security issue of power consumption data, we propose a new Ciphertext Policy Attribute-based Encryption (CP-ABE) scheme with revocation for the fogbased smart grid system. Specifically, in order to achieve attribute revocation without requiring users to be always online, we divide users' attributes into attribute groups, assign an attribute group key to each group, and selectively distribute group key update messages. In addition, our scheme uses the DH (Diffie-Hellman) tree to distribute the group key statelessly, which solves the problem of collusion attack. The combination of attribute revocation and user revocation has been used to improve the efficiency of the revocation mechanism. Furthermore, the proposed scheme outsources unnecessary computing operations to fog nodes, so that the computing overhead of users is independent of the number of attributes. Both security analysis and experimental results demonstrate that our proposed scheme can balance the security objectives with the actual efficiency.
引用
收藏
页数:7
相关论文
共 12 条
[1]   An Attribute-Based Encryption Scheme to Secure Fog Communications [J].
Alrawais, Arwa ;
Alhothaily, Abdulrahman ;
Hu, Chunqiang ;
Xing, Xiaoshuang ;
Cheng, Xiuzhen .
IEEE ACCESS, 2017, 5 :9131-9138
[2]  
BETHENCOURT J, 2011, ADV CRYPTO SOFTWARE
[3]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[4]  
Bonomi F., 2012, Proceedings of the first edition of the MCC workshop on Mobile cloud computing, P13, DOI [DOI 10.1145/2342509.2342513, 10.1145/2342509.2342513]
[5]   On Ends-to-Ends Encryption Asynchronous Group Messaging with Strong Security Guarantees [J].
Cohn-Gordon, Katriel ;
Cremers, Cas ;
Garratt, Luke ;
Millican, Jon ;
Milner, Kevin .
PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, :1802-1819
[6]   Secure, efficient and revocable data sharing scheme for vehicular fogs [J].
Fan, Kai ;
Wang, Junxiong ;
Wang, Xin ;
Li, Hui ;
Yang, Yintang .
PEER-TO-PEER NETWORKING AND APPLICATIONS, 2018, 11 (04) :766-777
[7]   Achieving Efficient and Secure Data Acquisition for Cloud-Supported Internet of Things in Smart Grid [J].
Guan, Zhitao ;
Li, Jing ;
Wu, Longfei ;
Zhang, Yue ;
Wu, Jun ;
Du, Xiaojiang .
IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (06) :1934-1944
[8]   Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems [J].
Hur, Junbeom ;
Noh, Dong Kun .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2011, 22 (07) :1214-1221
[9]   PPFA: Privacy Preserving Fog-Enabled Aggregation in Smart Grid [J].
Lyu, Lingjuan ;
Nandakumar, Karthik ;
Rubinstein, Ben ;
Jin, Jiong ;
Bedo, Justin ;
Palaniswami, Marimuthu .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (08) :3733-3744
[10]   An efficient access control scheme with outsourcing capability and attribute update for fog computing [J].
Zhang, Peng ;
Chen, Zehong ;
Liu, Joseph K. ;
Liang, Kaitai ;
Liu, Hongwei .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 78 :753-762