An efficient attribute-based encryption scheme based on SM9 encryption algorithm for dispatching and control cloud

被引:36
作者
Ji, Honghan [1 ]
Zhang, Hongjie [2 ]
Shao, Lisong [3 ]
He, Debiao [1 ]
Luo, Min [1 ]
机构
[1] Wuhan Univ, Sch Cyber Sci & Engn, Wuhan 430072, Peoples R China
[2] State Grid Ningxia Elect Power Co Ltd, Yinchuan, Ningxia, Peoples R China
[3] Nari Grp Corp, State Grid Elect Power Res Inst, Nanjing, Peoples R China
关键词
Dispatching and control cloud; attribute-based encryption; fine-grained access control; SM9; Algorithm;
D O I
10.1080/09540091.2020.1858757
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Dispatching and Control Cloud (DCC) is a cloud platform constructed by State Grid Corporation with the technology of cloud computing. DCC has improved the overall operation and monitoring capabilities, the smart level and many other advantages of power grid. However, the development of DCC has been hampered by security and privacy issues. Secure unified identity authentication, access control and authorisation management are significant topics in DCC. To find out a solution for the topics above, we have employed some encryption schemes using the attribute-based encryption(ABE), as ABE can preserve users' privacy and achieve access control with fine grain over the encrypted information. SM9 is a kind of Chinese official standard in the field of cryptography, which contains the SM9 encryption algorithm (SM9-IBE). In this paper, an ABE scheme based on SM9-IBE is proposed, making SM9 support fine-grained access control which would be better applied in DCC. Our proposed scheme (SM9-ABE) has been proven to be of great security in the selective CPA model under DBDH assumption. Furthermore, we implement SM9-ABE and evaluate its practical performance. The implementation indicates our scheme performs well in the matter of security and functionality, at an additional time cost which is acceptable.
引用
收藏
页码:1094 / 1115
页数:22
相关论文
共 27 条
[1]   An Attribute-Based Encryption Scheme to Secure Fog Communications [J].
Alrawais, Arwa ;
Alhothaily, Abdulrahman ;
Hu, Chunqiang ;
Xing, Xiaoshuang ;
Cheng, Xiuzhen .
IEEE ACCESS, 2017, 5 :9131-9138
[2]  
[Anonymous], IEEE T INFORM FORENS
[3]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[4]  
Cheng-Chi Lee, 2013, International Journal of Network Security, V15, P231
[5]  
Cheung L, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P456
[6]  
Goyal V., 2006, P 13 ACM C COMP COMM, P89, DOI DOI 10.1145/1180405.1180418
[7]  
Ibraimi L, 2009, LECT NOTES COMPUT SC, V5451, P1, DOI 10.1007/978-3-642-00843-6_1
[8]   Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing [J].
Jiang, Yinhao ;
Susilo, Willy ;
Mu, Yi ;
Guo, Fuchun .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 78 :720-729
[9]  
Jung T., 2014, IEEE T INF FORENSICS
[10]  
Li HW, 2009, LECT NOTES COMPUT SC, V5931, P157