Attribute-based data access control scheme with secure revocation in fog computing for smart grid

被引:5
|
作者
Wu, Zhiwei [1 ]
Shi, Run-hua [1 ]
Li, Kunchang [1 ]
Yang, Yifan [1 ]
机构
[1] North China Elect Power Univ, Sch Control & Comp Engn, Beijing 102206, Peoples R China
来源
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS | 2022年 / 25卷 / 06期
基金
中国国家自然科学基金;
关键词
Attribute-based encryption; Dynamic group data sharing; Fog computing; Secure revocation; Smart grid; CP-ABE; ENCRYPTION; EFFICIENT; BLOCKCHAIN; DELEGATION;
D O I
10.1007/s10586-022-03616-0
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Smart grid requires sharing sensitive data to external researchers. Attribute encryption is a common technique used in data sharing. Unfortunately, existing revocation mechanisms do not consider the following two issues. One is that the revoked user may save intermediate values computed in the past to illegally decrypt the updated cipher text. The other is that the update parameters of keys can be leaked to the revoked user, which leads to revocation failure. To address the above issues, we propose a verifiable outsourcing decryption and data sharing scheme, in which we introduce version parameters of ciphertexts and keys, and associate the update parameters of keys with each user to achieve security-enhanced revocation. In addition, a formal security proof is given under the DBDH assumption. Finally, we evaluate the performance of the scheme and the results show that the proposed scheme is more effective than current schemes.
引用
收藏
页码:3899 / 3913
页数:15
相关论文
共 50 条
  • [1] Attribute-based data access control scheme with secure revocation in fog computing for smart grid
    Zhiwei Wu
    Run-hua Shi
    Kunchang Li
    Yifan Yang
    Cluster Computing, 2022, 25 : 3899 - 3913
  • [2] Attribute-based data access control scheme with secure revocation in fog computing for smart grid
    Wu, Zhiwei
    Shi, Run-hua
    Li, Kunchang
    Yang, Yifan
    Cluster Computing, 2022, 25 (06) : 3899 - 3913
  • [3] Secure Data Access Control for Fog Computing Based on Multi-Authority Attribute-Based Signcryption with Computation Outsourcing and Attribute Revocation
    Xu, Qian
    Tan, Chengxiang
    Fan, Zhijie
    Zhu, Wenye
    Xiao, Ya
    Cheng, Fujia
    SENSORS, 2018, 18 (05)
  • [4] Attribute-Based Access Control Scheme with Efficient Revocation in Cloud Computing
    Xia, Zhihua
    Zhang, Liangao
    Liu, Dandan
    CHINA COMMUNICATIONS, 2016, 13 (07) : 92 - 99
  • [5] Attribute-Based Access Control Scheme with Efficient Revocation in Cloud Computing
    Zhihua Xia
    Liangao Zhang
    Dandan Liu
    中国通信, 2016, 13 (07) : 92 - 99
  • [6] Access Control Scheme Supporting Userand Attribute Revocation in Fog Computing
    Wang Z.
    Li L.
    Li N.
    Li, Ling (liling_li_ling@163.com), 1600, Beijing University of Posts and Telecommunications (43): : 88 - 95
  • [7] An Attribute-Based Access Control with Efficient and Secure Attribute Revocation for Cloud Data Sharing Service
    Nyamsuren Vaanchig
    Wei Chen
    Zhi-Guang Qin
    JournalofElectronicScienceandTechnology, 2017, 15 (01) : 90 - 98
  • [8] An Efficient and Secure Revocation-Enabled Attribute-Based Access Control for eHealth in Smart Society
    Khan, Shahzad
    Iqbal, Waseem
    Waheed, Abdul
    Mehmood, Gulzar
    Khan, Shawal
    Zareei, Mahdi
    Biswal, Rajesh Roshan
    SENSORS, 2022, 22 (01)
  • [9] EABDS: Attribute-Based Secure Data Sharing with Efficient Revocation in Cloud Computing
    Huang Qinlong
    Ma Zhaofeng
    Yang Yixian
    Fu Jingyi
    Niu Xinxin
    CHINESE JOURNAL OF ELECTRONICS, 2015, 24 (04) : 862 - 868
  • [10] EABDS: Attribute-Based Secure Data Sharing with Efficient Revocation in Cloud Computing
    HUANG Qinlong
    MA Zhaofeng
    YANG Yixian
    FU Jingyi
    NIU Xinxin
    Chinese Journal of Electronics, 2015, 24 (04) : 862 - 868