Abstract

The rapid development of the power Internet of Things (IoT) has greatly enhanced the level of security, quality and efficiency in energy production, energy consumption, and related fields. However, it also puts forward higher requirements for the security and privacy of data. Ciphertext-policy attribute-based encryption (CP-ABE) is considered a suitable method to solve this issue and can implement fine-grained access control. However, its internal bilinear pairing operation is too expensive, which is not suitable for power IoT with limited computing resources. Hence, in this paper, a novel CP-ABE scheme based on elliptic curve cryptography (ECC) is proposed, which replaces the bilinear pairing operation with simple scalar multiplication and outsources most of the decryption work to edge devices. In addition, time and location attributes are combined in the proposed scheme, allowing the data users to access only within the range of time and locations set by the data owners to achieve a more fine-grained access control function. Simultaneously, the scheme uses multiple authorities to manage attributes, thereby solving the performance bottleneck of having a single authority. A performance analysis demonstrates that the proposed scheme is effective and suitable for power IoT.

Highlights

  • Power Internet of Things (IoT) connects power users, grid enterprises, generation enterprises, suppliers, and their equipment to generate shared data and serve users, power grids, power suppliers, and the government and society in return [1].With the construction and promotion of the power IoT, hundreds of millions ofIoT terminals are deployed in the areas of power generation-transmission-substationdistribution-consumption

  • We propose an efficient Ciphertext-policy attribute-based encryption (CP-ABE) scheme, which uses simple scalar multiplication based on elliptic curve cryptography (ECC) instead of complex bilinear pairing to reduce the computational overhead and make it more suitable for power IoT terminals with resource constraints

  • We propose a novel CP-ABE algorithm based on ECC combined with edge computing

Read more

Summary

Introduction

Power Internet of Things (IoT) connects power users, grid enterprises, generation enterprises, suppliers, and their equipment to generate shared data and serve users, power grids, power suppliers, and the government and society in return [1]. The traditional one-to-one access mode between data and users by public key encryption schemes cannot satisfy the requirements of complex power IoT systems. Ciphertext-policy attribute-based encryption (CP-ABE) with fine-grained access control can support a one-to-many access mode between data and multiple users, which can solve the problems mentioned above. The scheme proposed here, which combines the CP-ABE based on ECC and edge computing, can effectively provide information security protection for power IoT. We propose an efficient CP-ABE scheme, which uses simple scalar multiplication based on ECC instead of complex bilinear pairing to reduce the computational overhead and make it more suitable for power IoT terminals with resource constraints.

Related Work
Elliptic Curve Cryptography
Decisional Diffie–Hellman Assumption
Linear Secret Sharing Scheme
System Model
Security Model
Proposed Scheme
Security Analysis
Data Security
Forward Safety
Collusion Attack
Performance Analysis
Conclusions

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.