Abstract

Information leakage and efficiency are the two main concerns of data sharing in cloud‐aided IoT. The main problem is that smart devices cannot afford both energy and computation costs and tend to outsource data to a cloud server. Furthermore, most schemes focus on preserving the data stored in the cloud but omitting the access policy is typically stored in unencrypted form. In this paper, we proposed a fine‐grained data access control scheme based on CP‐ABE to implement access policies with a greater degree of expressiveness as well as hidden policies from curious cloud service providers. Moreover, to mitigate the extra computation cost generated by complex policies, an outsourcing service for decryption can be used by data users. Further experiments and extensive analysis show that we significantly decrease the communication and computation overhead while providing a high‐level security scheme compared with the existing schemes.

Highlights

  • The smart city is considered to be one of the promising urban environments to achieve the goal of intelligent and effective data sharing via different sectors of society [1]

  • With more flexible access control and less encryption/decryption time, our scheme only pays the price of affordable additional cost on the secret key size (ii) We present a policy hidden method that can be implemented on a policy with attribute comparison

  • The attributes of the access structure are replaced with hidden values to achieve a complete access policy hidden method (iii) We construct an optional lightweight outsourcing decryption method to significantly reduce the userside computation overhead for only one pairing operation

Read more

Summary

Introduction

The smart city is considered to be one of the promising urban environments to achieve the goal of intelligent and effective data sharing via different sectors of society [1]. There exist several methods of policy hidden in ABE, but they cannot support those point-in-interval policies For this reason, compared to traditional cloud computing, it is much more urgent to deploy a method to hide access policies in smart city. The research goal of this paper is to construct an access control scheme with flexible policies to realize unequal attributes’ comparison and further hide the policy in the ciphertext. With more flexible access control and less encryption/decryption time, our scheme only pays the price of affordable additional cost on the secret key size (ii) We present a policy hidden method that can be implemented on a policy with attribute comparison.

Related Work
Preliminaries and Definitions
18: Add Sa into S0a
System Structure and Security Model
Phase 1
Phase 2
Phase 3
Phase 4
Phase 5
Security Proof
Findings
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.