• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Zhang Xuewang, Yao Yaning, Fu Jiali, Xie Haofei. Efficient Multi-Authority CP-ABE IoT Data Sharing Scheme with Hidden Policies[J]. Journal of Computer Research and Development, 2023, 60(10): 2193-2202. DOI: 10.7544/issn1000-1239.202330459
Citation: Zhang Xuewang, Yao Yaning, Fu Jiali, Xie Haofei. Efficient Multi-Authority CP-ABE IoT Data Sharing Scheme with Hidden Policies[J]. Journal of Computer Research and Development, 2023, 60(10): 2193-2202. DOI: 10.7544/issn1000-1239.202330459

Efficient Multi-Authority CP-ABE IoT Data Sharing Scheme with Hidden Policies

Funds: This work was supported by the National Key Research and Development Program of China (2022YFB3204503).
More Information
  • Author Bio:

    Zhang Xuewang: born in 1974. PhD, associate professor, master supervisor, Senior member of CCF. His main research interests include blockchain and Internet of things, and data security and privacy protection

    Yao Yaning: born in 1998. Master candidate. Student member of CCF. His main research interests include blockchain, Internet software, and security technologies

    Fu Jiali: born in 1998. Master candidate. Student member of CCF. Her main research interests include blockchain, Internet software, and security technologies

    Xie Haofei: bom in 1978. PhD, professor, master supervisor. His main research interests include networked control systems, wireless sensing, and the industrial Internet of things

  • Received Date: June 04, 2023
  • Revised Date: August 18, 2023
  • Available Online: October 07, 2023
  • Data sharing in the IoT environment suffers from inefficiency and privacy leakage, and the CP-ABE (ciphertext policy attribute-based encryption) data sharing scheme becomes a bottleneck of system operation efficiency because it adopts a single authority, which needs to undertake heavy computational work. To solve the above problems, an efficient multi-authority CP-ABE IoT data sharing scheme with completely hidden policies is proposed in this paper. The scheme uses multi-authority CP-ABE to realize fine-grained access control of data, and uses the non-tampering property of the consortium blockchain to ensure the security of ciphertext Hash and key set ciphertext, and adopts MurmurHash3 algorithm to realize the complete hiding of policy to avoid accessing policy to leak users’ private information; and the scheme combines with multi-secret sharing algorithm to improve multi-authority CP-ABE, thus enhancing efficiency of data sharing. The theoretical analysis proves that the scheme can guarantee the security of access policy and secret sharing process. The simulation experimental results show that the proposed scheme has better performance in both policy hiding and secret distribution processes.

  • [1]
    刘奇旭,靳泽,陈灿华,等. 物联网访问控制安全性综述[J]. 计算机研究与发展,2022,59(10):2190−2211 doi: 10.7544/issn1000-1239.20220510

    Liu Qixu, Jin Ze, Chen Canhua, et al. Survey on Internet of things access control security[J]. Journal of Computer Research and Development, 2022, 59(10): 2190−2211 (in Chinese) doi: 10.7544/issn1000-1239.20220510
    [2]
    蔡婷,林晖,陈武辉,等. 区块链赋能的高效物联网数据激励共享方案[J]. 软件学报,2021,32(4):953−972

    Cai Ting, Lin Hui, Chen Wuhui, et al. Efficient blockchain-empowered data sharing incentive scheme for Internet of things[J]. Journal of Software, 2021, 32(4): 953−972 (in Chinese)
    [3]
    刘明达,陈左宁,拾以娟,等. 区块链在数据安全领域的研究进展[J]. 计算机学报,2021,44(1):1−27

    Liu Mingda, Chen Zuoning, Shi Yijuan, et al. Research progress of blockchain in data security[J]. Chinese Journal of Computers, 2021, 44(1): 1−27 (in Chinese)
    [4]
    Sahai A, Waters B. Fuzzy identity-based encryption[C] //Proc of the 24th Annual Int Conf on the Theory and Applications of Cryptographic Techniques. Berlin: Springer, 2005: 457−473
    [5]
    Chase M. Multi-authority attribute based encryption[C] //Proc of Theory of Cryptography Conf. Berlin: Springer, 2007: 515−534
    [6]
    Lin Huang, Cao Zhenfu, Liang Xiaohui, et al. Secure threshold multi-authority attribute based encryption without a central authority[J]. Information Sciences, 2010, 180(13): 2618−2632 doi: 10.1016/j.ins.2010.03.004
    [7]
    Zhang Leyou, Wang Jun, Mu Yi. Privacy-preserving flexible access control for encrypted data in Internet of things[J]. IEEE Internet of Things Journal, 2021, 8(19): 14731−14745 doi: 10.1109/JIOT.2021.3071553
    [8]
    王悦,樊凯. 隐藏访问策略的高效CP-ABE方案[J]. 计算机研究与发展,2019,56(10):2151−2159

    Wang Yue, Fan Kai. Effective CP-ABE with hidden access policy[J]. Journal of Computer Research and Development, 2019, 56(10): 2151−2159 (in Chinese)
    [9]
    刘雪娇,曹天聪,夏莹杰. 区块链架构下高效的车联网跨域数据安全共享研究[J]. 通信学报,2023,44(3):186−197

    Liu Xuejiao, Cao Tiancong, Xia Yingjie. Research on efficient and secure cross-domain data sharing of IoV under blockchain architecture[J]. Journal on Communications, 2023, 44(3): 186−197 (in Chinese)
    [10]
    Dai Weiqi, Tuo Shuyue, Yu Liangliang, et al. HAPPS: A hidden attribute and privilege-protection data-sharing scheme with verifiability[J]. IEEE Internet of Things Journal, 2022, 9(24): 25538−25550 doi: 10.1109/JIOT.2022.3197708
    [11]
    赵志远,王建华,朱智强,等. 面向物联网数据安全共享的属性基加密方案[J]. 计算机研究与发展,2019,56(6):1290−1301

    Zhao Zhiyuan, Wang Jianhua, Zhu Zhiqiang, et al. Attribute-based encryption for data security sharing of Internet of things[J]. Journal of Computer Research and Development, 2019, 56(6): 1290−1301 (in Chinese)
    [12]
    林莉,储振兴,刘子萌,等. 基于区块链的策略隐藏大数据访问控制方法[J]. 自动化学报,2023,49(5):1031−1049

    Lin Li, Chu Zhenxing, Liu Zimeng, et al. A policy-hidden big data access control method based on blockchain[J]. Acta Automatica Sinica, 2023, 49(5): 1031−1049 (in Chinese)
    [13]
    Wu Qing, Lai Taotao, Zhang Leyou, et al. Blockchain-enabled multi-authorization and multi-cloud attribute-based keyword search over encrypted data in the cloud[J]. Journal of Systems Architecture, 2022, 129: 102569 doi: 10.1016/j.sysarc.2022.102569
    [14]
    Wang Huiyong, Liang Jialing, Ding Yong, et al. Ciphertext-policy attribute-based encryption supporting policy-hiding and cloud auditing in smart health[J]. Computer Standards & Interfaces, 2023, 84: 103696
    [15]
    Zhang Zhaoqian, Zhang Jianbiao, Yuan Yilin, et al. An expressive fully policy-hidden ciphertext policy attribute-based encryption scheme with credible verification based on blockchain[J]. IEEE Internet of Things Journal, 2021, 9(11): 8681−8692
    [16]
    Zhang Zhishuo, Zhang Wei, Qin Zhiguang. A partially hidden policy CP-ABE scheme against attribute values guessing attacks with online privacy-protective decryption testing in IoT assisted cloud computing[J]. Future Generation Computer Systems, 2021, 123: 181−195 doi: 10.1016/j.future.2021.04.022
    [17]
    张学旺,姚亚宁,黎志鸿,等. 基于联盟链和Asmuth-Bloom秘密共享算法的数据共享方案[J]. 信息网络安全,2022,22(11):17−23 doi: 10.3969/j.issn.1671-1122.2022.11.003

    Zhang Xuewang, Yao Yaning, Li Zhihong, et al. Data scheme based on consortium blockchain and Asmuth-Bloom secret sharing algorithm[J]. Netinfo Security, 2022, 22(11): 17−23 (in Chinese) doi: 10.3969/j.issn.1671-1122.2022.11.003
    [18]
    Lewko A, Waters B. Decentralizing attribute-based encryption[C] //Proc of the 30th Annual Int Conf on the Theory and Applications of Cryptographic Techniques. Berlin: Springer, 2011: 568−588
    [19]
    李亚红,王彩芬,张玉磊,等. 安全加密的门限签名混淆[J]. 通信学报,2020,41(6):61−69

    Li Yahong, Wang Caifen, Zhang Yulei, et al. Security obfuscation for encrypted threshold signatures[J]. Journal on Communications, 2020, 41(6): 61−69 (in Chinese)
    [20]
    陈律君,肖迪,余柱阳,等. 基于秘密共享和压缩感知的通信高效联邦学习[J]. 计算机研究与发展,2022,59(11):2395−2407

    Chen Lüjun, Xiao Di, Yu Zhuyang, et al. Communication-efficient federated learning based on secret sharing and compressed sensing[J]. Journal of Computer Research and Development, 2022, 59(11): 2395−2407 (in Chinese)
    [21]
    沈剑,周天祺,曹珍富. 云数据安全保护方法综述[J]. 计算机研究与发展,2021,58(10):2079−2098

    Shen Jian, Zhou Tianqi, Cao Zhenfu. Protection method for cloud data security[J]. Journal of Computer Research and Development, 2021, 58(10): 2079−2098 (in Chinese)
    [22]
    庞辽军, 裴庆祺, 李慧贤, 等. 秘密共享技术及其应用[M]. 北京: 人民邮电出版社, 2017: 104−112

    Pang Liaojun, Pei Qingqi, Li Huixian, et al. Secret sharing technology and its applications[M]. Beijing: post & Telewm press, 2017: 104−112 (in Chinese)
    [23]
    Zhu Enguo, Ye Fangbin, Dou Jian, et al. A comparison method of massive power consumption information collection test data based on improved merkle tree[C] //Proc of the 4th Int Conf of Pioneering Computer Scientists, Engineers and Educators. Berlin: Springer, 2018: 401−415
    [24]
    Li Ruixuan, Shen Chenglin, He Heng, et al. A lightweight secure data sharing scheme for mobile cloud computing[J]. IEEE Transactions on Cloud Computing, 2018, 6(2): 344−357 doi: 10.1109/TCC.2017.2649685
  • Related Articles

    [1]Dai Weiqi, Li Ming, Zhao Kexuan, Jiang Wenchao, Zhou Weilin, Zou Deqing, Jin Hai. Blockchain Marketing Label Trading System for E-Commerce Alliance[J]. Journal of Computer Research and Development, 2025, 62(1): 269-280. DOI: 10.7544/issn1000-1239.202330217
    [2]Zhang Chuan, Wang Zihao, Liang Jinwen, Liu Mengxuan, Deng Haotian, Zhu Liehuang. A Privacy-Preserving Data Element Trading Audit Scheme for Cross-Consortium-Blockchains[J]. Journal of Computer Research and Development, 2024, 61(10): 2540-2553. DOI: 10.7544/issn1000-1239.202440472
    [3]Chen Xiao, Huang Muhong, Tian Yifan, Wang Yan, Cao Sheng, Zhang Xiaosong. Internet of Vehicles Data Sharing Scheme via Blockchain Sharding[J]. Journal of Computer Research and Development, 2024, 61(9): 2246-2260. DOI: 10.7544/issn1000-1239.202330899
    [4]Wu Haibo, Liu Hui, Sun Yi, Li Jun. A Concurrent Conflict Transaction Optimization Method for Consortium Blockchain Hyperledger Fabric[J]. Journal of Computer Research and Development, 2024, 61(8): 2110-2126. DOI: 10.7544/issn1000-1239.202220644
    [5]Zhang Zelin, Wang Huaqun. Dynamic Key Management of Industrial Internet Based on Blockchain[J]. Journal of Computer Research and Development, 2023, 60(2): 386-397. DOI: 10.7544/issn1000-1239.202111095
    [6]Liu Qixu, Jin Ze, Chen Canhua, Gao Xinbo, Zheng Ningjun, Fang Yiwei, Feng Yun. Survey on Internet of Things Access Control Security[J]. Journal of Computer Research and Development, 2022, 59(10): 2190-2211. DOI: 10.7544/issn1000-1239.20220510
    [7]Du Ruizhong, Liu Yan, Tian Junfeng. An Access Control Method Using Smart Contract for Internet of Things[J]. Journal of Computer Research and Development, 2019, 56(10): 2287-2298. DOI: 10.7544/issn1000-1239.2019.20190416
    [8]Zhang Jianyi, Wang Zhiqiang, Xu Zhili, Ouyang Yafei, Yang Tao. A Regulatable Digital Currency Model Based on Blockchain[J]. Journal of Computer Research and Development, 2018, 55(10): 2219-2232. DOI: 10.7544/issn1000-1239.2018.20180426
    [9]Ren Yanbing, Li Xinghua, Liu Hai, Cheng Qingfeng, Ma Jianfeng. Blockchain-Based Trust Management Framework for Distributed Internet of Things[J]. Journal of Computer Research and Development, 2018, 55(7): 1462-1478. DOI: 10.7544/issn1000-1239.2018.20180073
    [10]Zhou Weiwei, Yu Bin. A Secure Transmission Model Between the Nodes in Clusters of Wireless Service System for Internet of Things[J]. Journal of Computer Research and Development, 2018, 55(7): 1393-1408. DOI: 10.7544/issn1000-1239.2018.20170920
  • Cited by

    Periodical cited type(5)

    1. 欧阳志强,罗荣,张静. 基于ECC公钥加密体制的监控网络安全接入协议. 电子设计工程. 2024(18): 66-70 .
    2. 刘怡龙,许盛伟,岳梓岩. 密文长度固定的策略部分隐藏多授权机构CP-ABE方案. 通信学报. 2024(08): 20-36 .
    3. 李宏志,夏启寿,马小琴. 基于区块链的个人电子健康记录细粒度访问控制框架设计. 电脑知识与技术. 2024(29): 5-8+11 .
    4. 吴佐平,徐景龙,古敬彬,甄宗,刘若怡. 基于CP-ABE的客户服务平台异构数据共享方法. 中国新技术新产品. 2024(21): 42-44 .
    5. 王艳玲. 基于哈希值计算的数据爬取策略. 昆明冶金高等专科学校学报. 2024(06): 73-77 .

    Other cited types(7)

Catalog

    Article views (359) PDF downloads (198) Cited by(12)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return