Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3523181.3523191acmotherconferencesArticle/Chapter ViewAbstractPublication PagesasseConference Proceedingsconference-collections
research-article
Open access

Attribute-based encryption with outsourced computation for access control in IoTs

Published: 18 April 2022 Publication History

Abstract

There are many terminal devices with constrained computing resources in the IoT environment. The traditional lightweight attribute-based encryption schemes adopt third-party outsourcing computing to meet the lightweight access control requirements of constrained devices, but the correctness of outsourcing computing results is difficult to guarantee. To solve this problem, a lightweight attribute-based encryption scheme based on blockchain technology was proposed to realize outsourcing decryption based on the blockchain. However, the computational complexity of encryption process is much higher than that of the decryption process in attribute-based encryption schemes. This paper extends and improves the related work to further achieve outsourcing encryption based on blockchain. The proposed method can effectively reduce the burden of encryption computation on the user side.

References

[1]
Elli Androulaki, Artem Barger, Vita Bortnikov, Christian Cachin, Konstantinos Christidis, Angelo De Caro, David Enyeart, Christopher Ferris, Gennady Laventman, Yacov Manevich, 2018. Hyperledger fabric: a distributed operating system for permissioned blockchains. In Proceedings of the thirteenth EuroSys conference. 1–15.
[2]
Xiaofeng Chen, Willy Susilo, Jin Li, Duncan S. Wong, Jianfeng Ma, Shaohua Tang, and Qiang Tang. 2015. Efficient algorithms for secure outsourcing of bilinear pairings. Theoretical Computer Science 562 (2015), 112–121. https: //doi.org/10.1016/j.tcs.2014.09.038
[3]
Matthew Green, Susan Hohenberger, and Brent Waters. 2011. Outsourcing the Decryption of ABE Ciphertexts. In Proceedings of the 20th USENIX Conference on Security (San Francisco, CA) (SEC’11). USENIX Association, USA, 34.
[4]
Bo Kang, Moon Lee, and Je Park. 2005. Efficient Delegation of Pairing Computation. IACR Cryptology ePrint Archive 2005 (01 2005), 259.
[5]
J. Lai, R. H. Deng, C. Guan, and J. Weng. 2013. Attribute-Based Encryption With Verifiable Outsourced Decryption. IEEE Transactions on Information Forensics and Security 8, 8 (2013), 1343–1354. https://doi.org/10.1109/TIFS.2013.2271848
[6]
S. Lin, R. Zhang, H. Ma, and M. Wang. 2015. Revisiting Attribute-Based Encryption With Verifiable Outsourced Decryption. IEEE Transactions on Information Forensics and Security 10, 10 (2015), 2119–2130. https://doi.org/10.1109/ TIFS.2015.2449264
[7]
X. Mao, J. Lai, Q. Mei, K. Chen, and J. Weng. 2016. Generic and Efficient Constructions of Attribute-Based Encryption with Verifiable Outsourced Decryption. IEEE Transactions on Dependable and Secure Computing 13, 5 (2016), 533–546. https://doi.org/10.1109/TDSC.2015.2423669
[8]
Xuanmei Qin, Yongfeng Huang, Zhen Yang, and Xing Li. 2021. LBAC: A lightweight blockchain-based access control scheme for the internet of things. Information Sciences 554 (2021), 222–235. https://doi.org/10.1016/j.ins.2020.12.035
[9]
K. Yang, X. Jia, and K. Ren. 2015. Secure and Verifiable Policy Update Outsourcing for Big Data Access Control in the Cloud. IEEE Transactions on Parallel and Distributed Systems 26, 12 (2015), 3461–3470. https://doi.org/10.1109/TPDS. 2014.2380373
[10]
K. Yang, X. Jia, K. Ren, B. Zhang, and R. Xie. 2013. DAC-MACS: Effective Data Access Control for Multiauthority Cloud Storage Systems. IEEE Transactions on Information Forensics and Security 8, 11 (2013), 1790–1801. https: //doi.org/10.1109/TIFS.2013.2279531
[11]
Xuanxia Yao, Zhi Chen, and Ye Tian. 2015. A lightweight attribute-based encryption scheme for the Internet of Things. Future Generation Computer Systems 49 (2015), 104–112. https://doi.org/10.1016/j.future.2014.10.010
[12]
Peng Zhang, Zehong Chen, Joseph K. Liu, Kaitai Liang, and Hongwei Liu. 2018. An efficient access control scheme with outsourcing capability and attribute update for fog computing. Future Generation Computer Systems 78 (2018), 753–762. https://doi.org/10.1016/j.future.2016.12.015, Vol. 1, No. 1, Article . Publication date: February 2022.

Cited By

View all
  • (2024)Domain-Specific Fine-Grained Access Control for Cloud-Edge Collaborative IoTIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.341971619(6499-6513)Online publication date: 2024
  • (2024)Attribute-Based Management of Secure Kubernetes Cloud BurstingIEEE Open Journal of the Communications Society10.1109/OJCOMS.2024.33674615(1276-1298)Online publication date: 2024
  • (2024)Efficient Data Sharing Scheme With Fine-Grained Access Control and Integrity Auditing in Terminal–Edge–Cloud NetworkIEEE Internet of Things Journal10.1109/JIOT.2024.339363911:16(26944-26954)Online publication date: 15-Aug-2024

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ASSE' 22: 2022 3rd Asia Service Sciences and Software Engineering Conference
February 2022
202 pages
ISBN:9781450387453
DOI:10.1145/3523181
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 18 April 2022

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

ASSE' 22

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)146
  • Downloads (Last 6 weeks)12
Reflects downloads up to 26 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Domain-Specific Fine-Grained Access Control for Cloud-Edge Collaborative IoTIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.341971619(6499-6513)Online publication date: 2024
  • (2024)Attribute-Based Management of Secure Kubernetes Cloud BurstingIEEE Open Journal of the Communications Society10.1109/OJCOMS.2024.33674615(1276-1298)Online publication date: 2024
  • (2024)Efficient Data Sharing Scheme With Fine-Grained Access Control and Integrity Auditing in Terminal–Edge–Cloud NetworkIEEE Internet of Things Journal10.1109/JIOT.2024.339363911:16(26944-26954)Online publication date: 15-Aug-2024
  • (2023)EVOAC-HP: An Efficient and Verifiable Outsourced Access Control Scheme with Hidden PolicySensors10.3390/s2309438423:9(4384)Online publication date: 28-Apr-2023

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media