Abstract
The development of the Internet of Things has led to great development of data sharing and data interaction, which has made security and privacy more and more a concern for users. How to ensure the safe sharing of data, avoid the leakage of sensitive information, and protect the privacy of users is a serious challenge. Access control is an important issue to ensure the trust of the Internet of Things. This paper proposes an access control scheme based on ciphertext attribute authentication and threshold policy, which uses the identity authentication of hidden attributes and divides the user’s permission grade by setting the threshold function with the user’s attributes. Users obtain different permission grades according to attribute authentication and access data of different sensitivity grades to achieve fine-grained, flexible and secure access to data in the cloud server while protecting personal privacy issues. In addition, when the resource is acquired, the identity and permission joint authentication method is adopted to avoid the collusion attack of the illegal member, which makes the resource access control more secure.
Highlights
The development of the Internet of Things has spawned the emergence of new informatization concepts such as smart homes, smart cities, and mobile crowd sensing
This paper proposes an access control scheme based on ciphertext attribute authentication and threshold policy for the Internet of Things (AC-CAATP), which uploads the data to the cloud server after encrypting the data, and uses attributes to set a threshold policy to limit the user’s access to the data
According to the characteristics of the Internet of Things, such as limited mobile resources and easy disclosure of personal privacy, we propose an access control scheme based on ciphertext attribute authentication and threshold policy, in which further optimizations have been made in terms of personal privacy protection, lightweight and security
Summary
The development of the Internet of Things has spawned the emergence of new informatization concepts such as smart homes, smart cities, and mobile crowd sensing It connects people, people and things, things and things on the Internet, and realizes information exchange, collaborative operation, and resource sharing among terminal entities through wired or wireless network technologies according to different physical environments and application scenarios [1]. The powerful interoperability and flexible access features of the Internet of Things have greatly threatened data security and personal privacy Aiming at these problems, this paper proposes an access control scheme based on ciphertext attribute authentication and threshold policy for the Internet of Things (AC-CAATP), which uploads the data to the cloud server after encrypting the data, and uses attributes to set a threshold policy to limit the user’s access to the data. An access control policy is set for data access, which avoids the leakage of sensitive information
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.