Attribute Based Encryption with Privacy Protection and Accountability for CloudIoT

被引:184
作者
Li, Jiguo [1 ,2 ,3 ]
Zhang, Yichen [1 ,2 ]
Ning, Jianting [1 ]
Huang, Xinyi [1 ,2 ]
Poh, Geong Sen [4 ]
Wang, Debang [4 ]
机构
[1] Fujian Normal Univ, Coll Math & Informat, Fuzhou 350117, Fujian, Peoples R China
[2] Fujian Prov Key Lab Network Secur & Cryptol Fuzho, Fuzhou 350117, Fujian, Peoples R China
[3] State Key Lab Cryptol, POB 5159, Beijing 100878, Peoples R China
[4] Natl Univ Singapore, Dept Comp Sci, Singapore 119077, Singapore
基金
中国国家自然科学基金;
关键词
CloudIoT; access control over data; attribute based encryption; hidden access structure; accountability; CP-ABE; POLICY; SECURITY; INTERNET; SCHEME;
D O I
10.1109/TCC.2020.2975184
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The pervasive, ubiquitous, and heterogeneous properties of IoT make securing IoT systems a very challenging task. More so when access and storage are performed through a cloud-based IoT system. IoT data stored on cloud should be encrypted to ensure data privacy. It is also crucial to allow only authorized entities to access and decrypt the encrypted data. In this article, we propose a ciphertext-policy attribute-based encryption (CP-ABE) scheme that enables fine-grained access control of encrypted IoT data on cloud. CP-ABE is regarded as a highly promising approach to provide flexible and fine-grained access control, which is quite suited to secure cloud based IoT systems. We first present an access control system model of CloudIoT platform based on ABE. Based on the presented system model, we construct a ciphertext-policy hiding CP-ABE scheme, which guarantees the privacy of the users. We further construct a white-box traceable CP-ABE scheme with accountability in order to address the user key abuse and authorization center key abuse. Experiment illustrates the proposed systems are efficient.
引用
收藏
页码:762 / 773
页数:12
相关论文
共 58 条
[1]  
[Anonymous], 2019, CHARM CRYPTO 0 50 DO
[2]  
[Anonymous], 2013, CCS
[3]  
[Anonymous], 2011, Encyclopedia of Cryptography and Security
[4]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[5]   Integration of Cloud computing and Internet of Things: A survey [J].
Botta, Alessio ;
de Donato, Walter ;
Persico, Valerio ;
Pescape, Antonio .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 56 :684-700
[6]   Supporting dynamic updates in storage clouds with the Akl-Taylor scheme [J].
Castiglione, Arcangelo ;
De Santis, Alfredo ;
Masucci, Barbara ;
Palmieri, Francesco ;
Huang, Xinyi ;
Castiglione, Aniello .
INFORMATION SCIENCES, 2017, 387 :56-74
[7]  
Chen C, 2011, LECT NOTES COMPUT SC, V6980, P84, DOI 10.1007/978-3-642-24316-5_8
[8]  
Cheung L, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P456
[9]  
Emura K, 2009, LECT NOTES COMPUT SC, V5451, P13, DOI 10.1007/978-3-642-00843-6_2
[10]  
Goyal V., 2006, P 2006 INT C PRIVACY, P1, DOI DOI 10.1145/1180405.1180418