A Secure and Computable Blockchain-Based Data Sharing Scheme in IoT System

被引:10
作者
Sun, Shuang [1 ,2 ]
Du, Rong [1 ,2 ]
Chen, Shudong [1 ,2 ]
机构
[1] Chinese Acad Sci, Inst Microelect, Beijing 100029, Peoples R China
[2] Univ Chinese Acad Sci, Sch Microelect, Beijing 100049, Peoples R China
关键词
IoT; blockchain; CP-ABE; FHE; homomorphic signature;
D O I
10.3390/info12020047
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The internet of things (IoT) devices are expected to collect vast amounts of data that support different kinds of applications such as health monitor, smart home, and traffic management. However, its characteristics such as resource-constrained nature, dynamicity, and large-scale growth bring challenges to secure IoT data sharing. Nowadays, blockchain-based ciphertext-policy attribute-based encryption (CP-ABE) was proposed to realize secure IoT data sharing. In blockchain-based CP-ABE data sharing schemes, the data are encrypted and stored in the cloud. Once users want to process the data, they should download and then decrypt the ciphertext in the client-end, and after processing the data, users encrypt and upload the ciphertext onto the cloud. This outweighs the advantage of using cloud computing resources. Fully homomorphic encryption (FHE) and homomorphic signature technology may be adopted to realize ciphertext computation and for correctness checking of ciphertext computation results. In this paper, we propose a secure and computable IoT data sharing system to ensure users enjoying the computation convenience of the cloud-end. Specifically, the proposed system integrates CP-ABE and FHE to realize secure IoT data sharing and ciphertext computation. In addition, we generated homomorphic signatures of ciphertexts to enable users to check the correctness of the ciphertext computation results. Moreover, to supervise the cloud, providing the honest IoT data access control, storage, and computing services for users, we recorded the access policy of the data, the hash of the data, the signature of the ciphertext, and the homomorphic signature of the ciphertext on the blockchain. The performance evaluation and security analysis show the proposed scheme is practical and secure.
引用
收藏
页码:1 / 20
页数:20
相关论文
共 50 条
[41]  
Shuang Sun, 2019, 2019 IEEE Fourth International Conference on Data Science in Cyberspace (DSC). Proceedings, P598, DOI 10.1109/DSC.2019.00097
[42]   Secure Data Sharing and Search for Cloud-Edge-Collaborative Storage [J].
Tao, Ye ;
Xu, Peng ;
Jin, Hai .
IEEE ACCESS, 2020, 8 :15963-15972
[43]   Performance Benchmarking and Optimizing Hyperledger Fabric Blockchain Platform [J].
Thakkar, Parth ;
Nathan, Senthil N. ;
Viswanathan, Balaji .
2018 IEEE 26TH INTERNATIONAL SYMPOSIUM ON MODELING, ANALYSIS, AND SIMULATION OF COMPUTER AND TELECOMMUNICATION SYSTEMS (MASCOTS), 2018, :264-276
[44]  
Traverso G, 2016, SPRINGERBRIEF COMPUT, P11, DOI 10.1007/978-3-319-32115-8_2
[45]   Lattice-based linearly homomorphic signature scheme over binary field [J].
Wang FengHe ;
Hu YuPu ;
Wang BaoCang .
SCIENCE CHINA-INFORMATION SCIENCES, 2013, 56 (11) :1-9
[46]   A Blockchain-Based Framework for Data Sharing With Fine-Grained Access Control in Decentralized Storage Systems [J].
Wang, Shangping ;
Zhang, Yinglong ;
Zhang, Yaling .
IEEE ACCESS, 2018, 6 :38437-38450
[47]  
Xinyan Li, 2019, Wuhan University Journal of Natural Sciences, V24, P218, DOI 10.1007/s11859-019-1388-4
[48]   Data Security Issues in Deep Learning: Attacks, Countermeasures, and Opportunities [J].
Xu, Guowen ;
Li, Hongwei ;
Ren, Hao ;
Yang, Kan ;
Deng, Robert H. .
IEEE COMMUNICATIONS MAGAZINE, 2019, 57 (11) :116-122
[49]   Efficient multiple sources network coding signature in the standard model [J].
Zhang, Jinlin ;
Shao, Jun ;
Ling, Yun ;
Ji, Min ;
Wei, Guiyi ;
Ying, Bishan .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2015, 27 (10) :2616-2636
[50]  
Zhang P, 2012, CHINESE J ELECTRON, V21, P701