University of Leicester
Browse
An Anonymous and Outsourcing-Supported Multiauthority Access Control Scheme With Revocation for Edge-Enabled IIoT System.pdf (1.19 MB)

An Anonymous and Outsourcing-Supported Multiauthority Access Control Scheme With Revocation for Edge-Enabled IIoT System

Download (1.19 MB)
journal contribution
posted on 2024-03-26, 15:52 authored by Jie Cui, Fengyu Bian, Hong Zhong, Qingyang Zhang, Sheng Xu, Chengjie Gu, Lu Liu

With the application of the Internet of Things and intelligent technologies in industrial systems, the manufacturing efficiency and product quality have been improved, leading to the development of the Industrial Internet of Things (IIoT). Uploading private data to the cloud may lead to data leakage without security protection. Thus, attribute-based encryption (ABE) is widely used to ensure data security and implement data access control, and some multiauthority ABE schemes are proposed to meet the requirement of attributes from different authorities, such as factory and government, which is more suitable for the IIoT system. However, the current multiauthority ABE schemes are with privacy leakage problems on attributes and low-efficiency issues. To address these problems, we propose a multiauthority ABE scheme, which protects users' privacy by anonymizing attributes in authentication, reduces the computing burden of IIoT devices by adapting online/offline technique and outsourcing decryption to edge devices, and realizes effective attribute revocation. A formal security proof is presented that our scheme is replayable chosen ciphertext attack secure. Finally, we implement the proposed scheme, and experimental results show that our scheme is more efficient than the existing schemes.

Funding

10.13039/501100001809-National Natural Science Foundation of China (Grant Number: 62011530046, 61872001 and U1936220)

Excellent Youth Foundation of Anhui Scientific Committee (Grant Number: 2108085J31)

Special Fund for Key Program of Science and Technology of Anhui Province (Grant Number: 202003A05020043)

History

Author affiliation

School of Computing and Mathematical Sciences, University of Leicester

Version

  • AM (Accepted Manuscript)

Published in

IEEE SYSTEMS JOURNAL

Volume

16

Issue

4

Pagination

6569 - 6580

Publisher

IEEE

issn

1932-8184

eissn

1937-9234

Copyright date

2022

Available date

2024-03-26

Language

English