Private blockchain-envisioned multi-authority CP-ABE-based user access control scheme in IIoT

被引:49
作者
Banerjee, Soumya [1 ]
Bera, Basudeb [2 ]
Das, Ashok Kumar [2 ]
Chattopadhyay, Samiran [1 ]
Khan, Muhammad Khurram [3 ]
Rodrigues, Joel J. P. C. [4 ,5 ]
机构
[1] Jadavpur Univ, Dept Informat Technol, Kolkata 700098, India
[2] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, India
[3] King Saud Univ, Coll Comp & Informat Sci, Ctr Excellence Informat Assurance, Riyadh 11653, Saudi Arabia
[4] Fed Univ Piaui UFPI, BR-64049550 Teresina, PI, Brazil
[5] Inst Telecomunicacoes, P-6201001 Covilha, Portugal
关键词
Industrial Internet of Things (IIoT); Access control; Attribute-based encryption; Blockchain; Security; ATTRIBUTE-BASED ENCRYPTION; CONSTANT-SIZE CIPHERTEXTS; KEY AGREEMENT PROTOCOL; IOT-ENABLED INTERNET; AUTHENTICATION SCHEME; DESIGN; MANAGEMENT;
D O I
10.1016/j.comcom.2021.01.023
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recent advances in Low Power Wide Area Network (LPWAN) are expected to augment the already prodigious proliferation of Industrial Internet of Things (IIoT). However, this unrepresented growth is tinged by the uncertainty of possible challenges in security and privacy. In this work, we propose a novel blockchain-envisioned fine grained user access control scheme for data security and scalability in IIoT environment. The proposed scheme supports multiple attribute authorities and also a constant size key and ciphertext. The data gathered by the IoT smart devices are encrypted using the cipher-policy attribute based encryption (CP-ABE) and sent to their nearby gateway nodes. Later, the gateway nodes form the transactions from the encrypted data from the smart devices which are used to form partial blocks. The partial blocks are then forwarded to the cloud server(s) in the peer-to-peer (P2P) network to convert them into full blocks, which are verified, mined and added into the blockchain using the voting-based practical Byzantine fault tolerance (PBFT) consensus algorithm. The proposed scheme also allows a user to access the secure data stored in the blocks into the blockchain using the CP-ABE mechanism. The security analysis demonstrates the robustness of the proposed scheme against various attacks, and the comparative study with related relevant schemes also highlights the advantage of the proposed scheme over existing approaches. Finally, a blockchain implementation of the presented scheme summarizes the computational costs for a varied number of transactions per block, and also for a varied number of blocks mined in the blockchain.
引用
收藏
页码:99 / 113
页数:15
相关论文
共 62 条
  • [51] BACC: Blockchain-Based Access Control For Cloud Data
    Sohrabi, Nasrin
    Yi, Xun
    Tari, Zahir
    Khalil, Ibrahim
    [J]. PROCEEDINGS OF THE AUSTRALASIAN COMPUTER SCIENCE WEEK MULTICONFERENCE (ACSW 2020), 2020,
  • [52] Song JF, 2020, ICIET 2020: 2020 8TH INTERNATIONAL CONFERENCE ON INFORMATION AND EDUCATION TECHNOLOGY, P1, DOI [10.1145/3395245.3395249, 10.1109/TII.2020.3046129]
  • [53] IoT Passport: A Blockchain-Based Trust Framework for Collaborative Internet-of-Things
    Tang, Bo
    Kang, Hongjuan
    Fan, Jingwen
    Li, Qi
    Sandhu, Ravi
    [J]. PROCEEDINGS OF THE 24TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT '19), 2019, : 83 - 92
  • [54] Blockchain-Enabled Certificate-Based Authentication for Vehicle Accident Detection and Notification in Intelligent Transportation Systems
    Vangala, Anusha
    Bera, Basudeb
    Saha, Sourav
    Das, Ashok Kumar
    Kumar, Neeraj
    Park, Youngho
    [J]. IEEE SENSORS JOURNAL, 2021, 21 (14) : 15824 - 15838
  • [55] Efficient and Secure Ciphertext-Policy Attribute-Based Encryption Without Pairing for Cloud-Assisted Smart Grid
    Wang, Yong
    Chen, Biwen
    Li, Lei
    Ma, Qiang
    Li, Huicong
    He, Debiao
    [J]. IEEE ACCESS, 2020, 8 : 40704 - 40713
  • [56] Authentication in cloud-driven IoT-based big data environment: Survey and outlook
    Wazid, Mohammad
    Das, Ashok Kumar
    Hussain, Rasheed
    Succi, Giancarlo
    Rodrigues, Joel J. P. C.
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2019, 97 : 185 - 196
  • [57] Design of secure key management and user authentication scheme for fog computing services
    Wazid, Mohammad
    Das, Ashok Kumar
    Kumar, Neeraj
    Vasilakos, Athanasios V.
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 91 (475-492): : 475 - 492
  • [58] Design of Lightweight Authentication and Key Agreement Protocol for Vehicular Ad Hoc Networks
    Wazid, Mohammad
    Das, Ashok Kumar
    Kumar, Neeraj
    Odelu, Vanga
    Reddy, Alavalapati Goutham
    Parks, Kisung
    Parks, Youngho
    [J]. IEEE ACCESS, 2017, 5 : 14966 - 14980
  • [59] Wood G., 2014, ETHEREUM PROJECT YEL, V151, P1, DOI DOI 10.1017/CBO9781107415324.004
  • [60] Secure Key Agreement and Key Protection for Mobile Device User Authentication
    Wu, Libing
    Wang, Jing
    Choo, Kim-Kwang Raymond
    He, Debiao
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (02) : 319 - 330