A Novel Hierarchical Key Assignment Scheme for Data Access Control in IoT

Author:

Li Xiaoyu1ORCID,Ye Min2,Chen Jiahui3ORCID,Chen Jianhui1,Chen Yeh-Cheng4

Affiliation:

1. School of Intelligence Engineering, Zhengzhou University of Aeronautics, Zhengzhou 450 046, China

2. GuangDong Overseas Chinese Vocational School, and Guangdong Communication Polytechnic, Guangzhou 510 520, China

3. School of Computers, Guangdong University of Technology, Guangzhou 510 006, China

4. Department of Computer Science, University of California, Davis, CA 95616, USA

Abstract

Hierarchical key assignment scheme is an efficient cryptographic method for hierarchical access control, in which the encryption keys of lower classes can be derived by the higher classes. Such a property is an effective way to ensure the access control security of Internet of Things data markets. However, many researchers on this field cannot avoid potential single point of failure in key distribution, and some key assignment schemes are insecure against collusive attack or sibling attack or collaborative attack. In this paper, we propose a hierarchical key assignment scheme based on multilinear map to solve the multigroup access control in Internet of Things data markets. Compared with previous hierarchical key assignment schemes, our scheme can avoid potential single point of failure in key distribution. Also the central authority of our scheme (corresponding to the data owner in IoT data markets) does not need to assign the corresponding encryption keys to each user directly, and users in each class can obtain the encryption key via only a one-round key agreement protocol. We then show that our scheme satisfies the security of key indistinguishability under decisional multilinear Diffie-Hellman assumption. Finally, comparisons show the efficiency of our scheme and indicates that our proposed scheme can not only resist the potential attacks, but also guarantee the forward and backward security.

Funder

National Natural Science Foundation of China

Publisher

Hindawi Limited

Subject

Computer Networks and Communications,Information Systems

Reference46 articles.

1. Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications

2. Ciphertext-policy attribute-based encryption;J. Bethencourt

3. Fine-grained data access control with attribute-hiding policy for cloud-based IoT

4. Secure sharing of IOT data in cloud environment using attribute-based encryption;T. A. A. Victoire;Journal of Circuits, Systems, and Computers,2021

5. Pay-per-use Sensor Data Exchange between IoT Devices by Blockchain and Smart Contract based Data and Encryption Key Management

Cited by 2 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3