Abstract

Cloud-assisted Internet of Things (IoT) significantly facilitate IoT devices to outsource their data for high efficient management. Unfortunately, some unsettled security issues dramatically impact the popularity of IoT, such as illegal access and key escrow problem. Traditional public-key encryption can be used to guarantees data confidentiality, while it cannot achieve efficient data sharing. The attribute-based encryption (ABE) is the most promising way to ensure data security and to realize one-to-many fine-grained data sharing simultaneously. However, it cannot be well applied in the cloud-assisted IoT due to the complexity of its decryption and the decryption key leakage problem. To prevent the abuse of decryption rights, we propose a multiauthority ABE scheme with white-box traceability in this paper. Moreover, our scheme greatly lightens the overhead on devices by outsourcing the most decryption work to the cloud server. Besides, fully hidden policy is implemented to protect the privacy of the access policy. Our scheme is proved to be selectively secure against replayable chosen ciphertext attack (RCCA) under the random oracle model. Some theory analysis and simulation are described in the end.

Highlights

  • In traditional public key encryption schemes, the encryptor encrypts the message with the public key of the decryptor; only the decryptor who owns the corresponding decryption key can decrypt the data

  • To tackle the huge amount of data users contained in Internet of Things (IoT), multiauthority attributebased encryption (MA_ABE) was proposed, which can manage the huge amount of attributes in a more efficient way [6, 17,18,19], where each attribute authority controls an unique set of attributes independently

  • We propose a multiauthority attribute-based encryption (ABE) scheme supporting verifiable outsourced decryption and white-box traceability

Read more

Summary

Introduction

In traditional public key encryption schemes, the encryptor encrypts the message with the public key of the decryptor; only the decryptor who owns the corresponding decryption key can decrypt the data. The IBE solves the public key management problem, it still cannot achieve one-to-many private data sharing This kind of application is extremely common in ubiquitous Internet of Things (IoT) scenarios. To tackle this issue, Sahai et al first proposed a fuzzy identity encryption scheme [3], which is later developed into the attribute-based encryption (ABE). A multiauthority attribute-based encryption scheme with white-box traceability and verifiable outsourced decryption was proposed for cloud IoT. To protect the privacy of IoT users, our scheme realizes fully hidden access policy (iii) Considering the needs of resource-constrained IoT devices, our scheme outsources most decryption works to the cloud by the verifiable outsourcing technology (iv) Our scheme adopts the Boneh-Boyen short signature algorithm to implement the user traceability mechanism.

Related Work
Preliminaries
Access Structure
Complexity Assumptions
System Definition
Construction and Application
Phase I
Phase II
Phase III
Phase IV
Phase V
Indistinguishability
Verifiability
Fully Hiding
Performance Analysis
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call