Citation: | Zhang Xuewang, Yao Yaning, Fu Jiali, Xie Haofei. Efficient Multi-Authority CP-ABE IoT Data Sharing Scheme with Hidden Policies[J]. Journal of Computer Research and Development, 2023, 60(10): 2193-2202. DOI: 10.7544/issn1000-1239.202330459 |
Data sharing in the IoT environment suffers from inefficiency and privacy leakage, and the CP-ABE (ciphertext policy attribute-based encryption) data sharing scheme becomes a bottleneck of system operation efficiency because it adopts a single authority, which needs to undertake heavy computational work. To solve the above problems, an efficient multi-authority CP-ABE IoT data sharing scheme with completely hidden policies is proposed in this paper. The scheme uses multi-authority CP-ABE to realize fine-grained access control of data, and uses the non-tampering property of the consortium blockchain to ensure the security of ciphertext Hash and key set ciphertext, and adopts MurmurHash3 algorithm to realize the complete hiding of policy to avoid accessing policy to leak users’ private information; and the scheme combines with multi-secret sharing algorithm to improve multi-authority CP-ABE, thus enhancing efficiency of data sharing. The theoretical analysis proves that the scheme can guarantee the security of access policy and secret sharing process. The simulation experimental results show that the proposed scheme has better performance in both policy hiding and secret distribution processes.
[1] |
刘奇旭,靳泽,陈灿华,等. 物联网访问控制安全性综述[J]. 计算机研究与发展,2022,59(10):2190−2211 doi: 10.7544/issn1000-1239.20220510
Liu Qixu, Jin Ze, Chen Canhua, et al. Survey on Internet of things access control security[J]. Journal of Computer Research and Development, 2022, 59(10): 2190−2211 (in Chinese) doi: 10.7544/issn1000-1239.20220510
|
[2] |
蔡婷,林晖,陈武辉,等. 区块链赋能的高效物联网数据激励共享方案[J]. 软件学报,2021,32(4):953−972
Cai Ting, Lin Hui, Chen Wuhui, et al. Efficient blockchain-empowered data sharing incentive scheme for Internet of things[J]. Journal of Software, 2021, 32(4): 953−972 (in Chinese)
|
[3] |
刘明达,陈左宁,拾以娟,等. 区块链在数据安全领域的研究进展[J]. 计算机学报,2021,44(1):1−27
Liu Mingda, Chen Zuoning, Shi Yijuan, et al. Research progress of blockchain in data security[J]. Chinese Journal of Computers, 2021, 44(1): 1−27 (in Chinese)
|
[4] |
Sahai A, Waters B. Fuzzy identity-based encryption[C] //Proc of the 24th Annual Int Conf on the Theory and Applications of Cryptographic Techniques. Berlin: Springer, 2005: 457−473
|
[5] |
Chase M. Multi-authority attribute based encryption[C] //Proc of Theory of Cryptography Conf. Berlin: Springer, 2007: 515−534
|
[6] |
Lin Huang, Cao Zhenfu, Liang Xiaohui, et al. Secure threshold multi-authority attribute based encryption without a central authority[J]. Information Sciences, 2010, 180(13): 2618−2632 doi: 10.1016/j.ins.2010.03.004
|
[7] |
Zhang Leyou, Wang Jun, Mu Yi. Privacy-preserving flexible access control for encrypted data in Internet of things[J]. IEEE Internet of Things Journal, 2021, 8(19): 14731−14745 doi: 10.1109/JIOT.2021.3071553
|
[8] |
王悦,樊凯. 隐藏访问策略的高效CP-ABE方案[J]. 计算机研究与发展,2019,56(10):2151−2159
Wang Yue, Fan Kai. Effective CP-ABE with hidden access policy[J]. Journal of Computer Research and Development, 2019, 56(10): 2151−2159 (in Chinese)
|
[9] |
刘雪娇,曹天聪,夏莹杰. 区块链架构下高效的车联网跨域数据安全共享研究[J]. 通信学报,2023,44(3):186−197
Liu Xuejiao, Cao Tiancong, Xia Yingjie. Research on efficient and secure cross-domain data sharing of IoV under blockchain architecture[J]. Journal on Communications, 2023, 44(3): 186−197 (in Chinese)
|
[10] |
Dai Weiqi, Tuo Shuyue, Yu Liangliang, et al. HAPPS: A hidden attribute and privilege-protection data-sharing scheme with verifiability[J]. IEEE Internet of Things Journal, 2022, 9(24): 25538−25550 doi: 10.1109/JIOT.2022.3197708
|
[11] |
赵志远,王建华,朱智强,等. 面向物联网数据安全共享的属性基加密方案[J]. 计算机研究与发展,2019,56(6):1290−1301
Zhao Zhiyuan, Wang Jianhua, Zhu Zhiqiang, et al. Attribute-based encryption for data security sharing of Internet of things[J]. Journal of Computer Research and Development, 2019, 56(6): 1290−1301 (in Chinese)
|
[12] |
林莉,储振兴,刘子萌,等. 基于区块链的策略隐藏大数据访问控制方法[J]. 自动化学报,2023,49(5):1031−1049
Lin Li, Chu Zhenxing, Liu Zimeng, et al. A policy-hidden big data access control method based on blockchain[J]. Acta Automatica Sinica, 2023, 49(5): 1031−1049 (in Chinese)
|
[13] |
Wu Qing, Lai Taotao, Zhang Leyou, et al. Blockchain-enabled multi-authorization and multi-cloud attribute-based keyword search over encrypted data in the cloud[J]. Journal of Systems Architecture, 2022, 129: 102569 doi: 10.1016/j.sysarc.2022.102569
|
[14] |
Wang Huiyong, Liang Jialing, Ding Yong, et al. Ciphertext-policy attribute-based encryption supporting policy-hiding and cloud auditing in smart health[J]. Computer Standards & Interfaces, 2023, 84: 103696
|
[15] |
Zhang Zhaoqian, Zhang Jianbiao, Yuan Yilin, et al. An expressive fully policy-hidden ciphertext policy attribute-based encryption scheme with credible verification based on blockchain[J]. IEEE Internet of Things Journal, 2021, 9(11): 8681−8692
|
[16] |
Zhang Zhishuo, Zhang Wei, Qin Zhiguang. A partially hidden policy CP-ABE scheme against attribute values guessing attacks with online privacy-protective decryption testing in IoT assisted cloud computing[J]. Future Generation Computer Systems, 2021, 123: 181−195 doi: 10.1016/j.future.2021.04.022
|
[17] |
张学旺,姚亚宁,黎志鸿,等. 基于联盟链和Asmuth-Bloom秘密共享算法的数据共享方案[J]. 信息网络安全,2022,22(11):17−23 doi: 10.3969/j.issn.1671-1122.2022.11.003
Zhang Xuewang, Yao Yaning, Li Zhihong, et al. Data scheme based on consortium blockchain and Asmuth-Bloom secret sharing algorithm[J]. Netinfo Security, 2022, 22(11): 17−23 (in Chinese) doi: 10.3969/j.issn.1671-1122.2022.11.003
|
[18] |
Lewko A, Waters B. Decentralizing attribute-based encryption[C] //Proc of the 30th Annual Int Conf on the Theory and Applications of Cryptographic Techniques. Berlin: Springer, 2011: 568−588
|
[19] |
李亚红,王彩芬,张玉磊,等. 安全加密的门限签名混淆[J]. 通信学报,2020,41(6):61−69
Li Yahong, Wang Caifen, Zhang Yulei, et al. Security obfuscation for encrypted threshold signatures[J]. Journal on Communications, 2020, 41(6): 61−69 (in Chinese)
|
[20] |
陈律君,肖迪,余柱阳,等. 基于秘密共享和压缩感知的通信高效联邦学习[J]. 计算机研究与发展,2022,59(11):2395−2407
Chen Lüjun, Xiao Di, Yu Zhuyang, et al. Communication-efficient federated learning based on secret sharing and compressed sensing[J]. Journal of Computer Research and Development, 2022, 59(11): 2395−2407 (in Chinese)
|
[21] |
沈剑,周天祺,曹珍富. 云数据安全保护方法综述[J]. 计算机研究与发展,2021,58(10):2079−2098
Shen Jian, Zhou Tianqi, Cao Zhenfu. Protection method for cloud data security[J]. Journal of Computer Research and Development, 2021, 58(10): 2079−2098 (in Chinese)
|
[22] |
庞辽军, 裴庆祺, 李慧贤, 等. 秘密共享技术及其应用[M]. 北京: 人民邮电出版社, 2017: 104−112
Pang Liaojun, Pei Qingqi, Li Huixian, et al. Secret sharing technology and its applications[M]. Beijing: post & Telewm press, 2017: 104−112 (in Chinese)
|
[23] |
Zhu Enguo, Ye Fangbin, Dou Jian, et al. A comparison method of massive power consumption information collection test data based on improved merkle tree[C] //Proc of the 4th Int Conf of Pioneering Computer Scientists, Engineers and Educators. Berlin: Springer, 2018: 401−415
|
[24] |
Li Ruixuan, Shen Chenglin, He Heng, et al. A lightweight secure data sharing scheme for mobile cloud computing[J]. IEEE Transactions on Cloud Computing, 2018, 6(2): 344−357 doi: 10.1109/TCC.2017.2649685
|
[1] | Dai Weiqi, Li Ming, Zhao Kexuan, Jiang Wenchao, Zhou Weilin, Zou Deqing, Jin Hai. Blockchain Marketing Label Trading System for E-Commerce Alliance[J]. Journal of Computer Research and Development, 2025, 62(1): 269-280. DOI: 10.7544/issn1000-1239.202330217 |
[2] | Zhang Chuan, Wang Zihao, Liang Jinwen, Liu Mengxuan, Deng Haotian, Zhu Liehuang. A Privacy-Preserving Data Element Trading Audit Scheme for Cross-Consortium-Blockchains[J]. Journal of Computer Research and Development, 2024, 61(10): 2540-2553. DOI: 10.7544/issn1000-1239.202440472 |
[3] | Chen Xiao, Huang Muhong, Tian Yifan, Wang Yan, Cao Sheng, Zhang Xiaosong. Internet of Vehicles Data Sharing Scheme via Blockchain Sharding[J]. Journal of Computer Research and Development, 2024, 61(9): 2246-2260. DOI: 10.7544/issn1000-1239.202330899 |
[4] | Wu Haibo, Liu Hui, Sun Yi, Li Jun. A Concurrent Conflict Transaction Optimization Method for Consortium Blockchain Hyperledger Fabric[J]. Journal of Computer Research and Development, 2024, 61(8): 2110-2126. DOI: 10.7544/issn1000-1239.202220644 |
[5] | Zhang Zelin, Wang Huaqun. Dynamic Key Management of Industrial Internet Based on Blockchain[J]. Journal of Computer Research and Development, 2023, 60(2): 386-397. DOI: 10.7544/issn1000-1239.202111095 |
[6] | Liu Qixu, Jin Ze, Chen Canhua, Gao Xinbo, Zheng Ningjun, Fang Yiwei, Feng Yun. Survey on Internet of Things Access Control Security[J]. Journal of Computer Research and Development, 2022, 59(10): 2190-2211. DOI: 10.7544/issn1000-1239.20220510 |
[7] | Du Ruizhong, Liu Yan, Tian Junfeng. An Access Control Method Using Smart Contract for Internet of Things[J]. Journal of Computer Research and Development, 2019, 56(10): 2287-2298. DOI: 10.7544/issn1000-1239.2019.20190416 |
[8] | Zhang Jianyi, Wang Zhiqiang, Xu Zhili, Ouyang Yafei, Yang Tao. A Regulatable Digital Currency Model Based on Blockchain[J]. Journal of Computer Research and Development, 2018, 55(10): 2219-2232. DOI: 10.7544/issn1000-1239.2018.20180426 |
[9] | Ren Yanbing, Li Xinghua, Liu Hai, Cheng Qingfeng, Ma Jianfeng. Blockchain-Based Trust Management Framework for Distributed Internet of Things[J]. Journal of Computer Research and Development, 2018, 55(7): 1462-1478. DOI: 10.7544/issn1000-1239.2018.20180073 |
[10] | Zhou Weiwei, Yu Bin. A Secure Transmission Model Between the Nodes in Clusters of Wireless Service System for Internet of Things[J]. Journal of Computer Research and Development, 2018, 55(7): 1393-1408. DOI: 10.7544/issn1000-1239.2018.20170920 |