Private blockchain-envisioned multi-authority CP-ABE-based user access control scheme in IIoT

被引:49
作者
Banerjee, Soumya [1 ]
Bera, Basudeb [2 ]
Das, Ashok Kumar [2 ]
Chattopadhyay, Samiran [1 ]
Khan, Muhammad Khurram [3 ]
Rodrigues, Joel J. P. C. [4 ,5 ]
机构
[1] Jadavpur Univ, Dept Informat Technol, Kolkata 700098, India
[2] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, India
[3] King Saud Univ, Coll Comp & Informat Sci, Ctr Excellence Informat Assurance, Riyadh 11653, Saudi Arabia
[4] Fed Univ Piaui UFPI, BR-64049550 Teresina, PI, Brazil
[5] Inst Telecomunicacoes, P-6201001 Covilha, Portugal
关键词
Industrial Internet of Things (IIoT); Access control; Attribute-based encryption; Blockchain; Security; ATTRIBUTE-BASED ENCRYPTION; CONSTANT-SIZE CIPHERTEXTS; KEY AGREEMENT PROTOCOL; IOT-ENABLED INTERNET; AUTHENTICATION SCHEME; DESIGN; MANAGEMENT;
D O I
10.1016/j.comcom.2021.01.023
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recent advances in Low Power Wide Area Network (LPWAN) are expected to augment the already prodigious proliferation of Industrial Internet of Things (IIoT). However, this unrepresented growth is tinged by the uncertainty of possible challenges in security and privacy. In this work, we propose a novel blockchain-envisioned fine grained user access control scheme for data security and scalability in IIoT environment. The proposed scheme supports multiple attribute authorities and also a constant size key and ciphertext. The data gathered by the IoT smart devices are encrypted using the cipher-policy attribute based encryption (CP-ABE) and sent to their nearby gateway nodes. Later, the gateway nodes form the transactions from the encrypted data from the smart devices which are used to form partial blocks. The partial blocks are then forwarded to the cloud server(s) in the peer-to-peer (P2P) network to convert them into full blocks, which are verified, mined and added into the blockchain using the voting-based practical Byzantine fault tolerance (PBFT) consensus algorithm. The proposed scheme also allows a user to access the secure data stored in the blocks into the blockchain using the CP-ABE mechanism. The security analysis demonstrates the robustness of the proposed scheme against various attacks, and the comparative study with related relevant schemes also highlights the advantage of the proposed scheme over existing approaches. Finally, a blockchain implementation of the presented scheme summarizes the computational costs for a varied number of transactions per block, and also for a varied number of blocks mined in the blockchain.
引用
收藏
页码:99 / 113
页数:15
相关论文
共 62 条
  • [1] Applications of Blockchains in the Internet of Things: A Comprehensive Survey
    Ali, Muhammad Salek
    Vecchio, Massimo
    Pincheira, Miguel
    Dolui, Koustabh
    Antonelli, Fabio
    Rehmani, Mubashir Husain
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (02): : 1676 - 1717
  • [2] [Anonymous], 2020, Raspberry pi 3 model b+
  • [3] [Anonymous], 2020, Miracl Cryptographic SDK: Multiprecision Integer and Rational Arithmetic Cryptographic Library
  • [4] Attribute-based encryption schemes with constant-size ciphertexts
    Attrapadung, Nuttapong
    Herranz, Javier
    Laguillaumie, Fabien
    Libert, Benoit
    de Panafieu, Elie
    Rafols, Carla
    [J]. THEORETICAL COMPUTER SCIENCE, 2012, 422 : 15 - 38
  • [5] Multi -Authority CP-ABE-Based user access control scheme with constant -size key and ciphertext for IoT deployment
    Banerjee, Soumya
    Roy, Sandip
    Odelu, Vanga
    Das, Ashok Kumar
    Chattopadhyay, Samiran
    Rodrigues, Joel J. P. C.
    Park, Youngho
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 53
  • [6] Barker E., 2016, Special Publication 800-57
  • [7] PROUD: Verifiable Privacy-preserving Outsourced Attribute Based SignCryption supporting access policy Update for cloud assisted IoT applications
    Belguith, Sana
    Kaaniche, Nesrine
    Hammoudeh, Mohammad
    Dargahi, Tooska
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 111 : 899 - 918
  • [8] PHOABE: Securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted IoT
    Belguith, Sana
    Kaaniche, Nesrine
    Laurent, Maryline
    Jemai, Abderrazak
    Attia, Rabah
    [J]. COMPUTER NETWORKS, 2018, 133 : 141 - 156
  • [9] Blockchain-Envisioned Secure Data Delivery and Collection Scheme for 5G-Based IoT-Enabled Internet of Drones Environment
    Bera, Basudeb
    Saha, Sourav
    Das, Ashok Kumar
    Kumar, Neeraj
    Lorenz, Pascal
    Alazab, Mamoun
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (08) : 9097 - 9111
  • [10] Designing secure blockchain-based access control scheme in IoT-enabled Internet of Drones deployment
    Bera, Basudeb
    Chattaraj, Durbadal
    Das, Ashok Kumar
    [J]. COMPUTER COMMUNICATIONS, 2020, 153 : 229 - 249