• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
成果搜索

author:

Zhang, Jiawei (Zhang, Jiawei.) [1] | Ma, Jianfeng (Ma, Jianfeng.) [2] | Yang, Yanbo (Yang, Yanbo.) [3] | Liu, Ximeng (Liu, Ximeng.) [4] (Scholars:刘西蒙) | Xiong, Neal N. (Xiong, Neal N..) [5]

Indexed by:

EI Scopus SCIE

Abstract:

Fog-assisted Internet of Things (IoT) can outsource the massive data of resource-constraint IoT devices to cloud and fog nodes (FNs). Meanwhile, it enables convenient and low time-delay data-sharing services, which relies heavily on high security of data confidentiality and fine-grained access control. Many efforts have been focused on this urgent requirement by leveraging ciphertext-policy attribute-based encryption (CP-ABE). However, when deployed in fog-assisted IoT systems for secure data sharing, it remains a challenging problem of how to preserve attribute privacy of access policy, and trace-then-revoke traitors (i.e., malicious users intending to leak decryption keys for illegal profits) efficiently and securely in such a large scale and decentralized environment with resource-constraint user devices, especially in consideration of misbehaving cloud and FNs. Therefore, in this article, we propose a revocable and privacy-preserving decentralized data-sharing framework (RPDDSF) by designing a large universe and multiauthority CP-ABE scheme with fully hidden access policy for secure data sharing in IoT systems to achieve user attribute privacy preserving with unbounded attribute universe and key escrow resistance suitable for large scale and decentralized environment. Based on this, with RPDDSF, anyone can efficiently expose the traitors and punish them by forward/backward secure revocation. Besides, RPDDSF is able to guarantee data integrity for both data owners (DOs) and users to resist misbehaving cloud and FNs, alongwith low computation overhead for resource-constraint devices. Finally, RPDDSF is proven to be secure with detailed security proofs, and its high efficiency and feasibility are demonstrated by extensive performance evaluations.

Keyword:

attribute-based encryption Attribute privacy preserving backward security Cloud computing Costs Data integrity Data privacy Encryption forward Internet of Things multiauthority offline online outsourced decryption Privacy

Community:

  • [ 1 ] [Zhang, Jiawei]Xidian Univ, Sch Cyber Engn, Xian 710071, Peoples R China
  • [ 2 ] [Ma, Jianfeng]Xidian Univ, Sch Cyber Engn, Xian 710071, Peoples R China
  • [ 3 ] [Zhang, Jiawei]Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
  • [ 4 ] [Ma, Jianfeng]Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
  • [ 5 ] [Liu, Ximeng]Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
  • [ 6 ] [Yang, Yanbo]Inner Mongolia Univ Sci & Technol, Sch Informat Engn, Baotou 014040, Peoples R China
  • [ 7 ] [Liu, Ximeng]Fuzhou Univ, Coll Comp & Big Data, Fuzhou 350116, Peoples R China
  • [ 8 ] [Xiong, Neal N.]Northeastern State Univ, Dept Math & Comp Sci, Tahlequah, OK 74464 USA

Reprint 's Address:

Show more details

Related Keywords:

Source :

IEEE INTERNET OF THINGS JOURNAL

ISSN: 2327-4662

Year: 2022

Issue: 13

Volume: 9

Page: 10446-10463

1 0 . 6

JCR@2022

8 . 2 0 0

JCR@2023

ESI Discipline: COMPUTER SCIENCE;

ESI HC Threshold:61

JCR Journal Grade:1

CAS Journal Grade:1

Cited Count:

WoS CC Cited Count: 17

SCOPUS Cited Count: 19

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 1

Online/Total:110/10037842
Address:FZU Library(No.2 Xuyuan Road, Fuzhou, Fujian, PRC Post Code:350116) Contact Us:0591-22865326
Copyright:FZU Library Technical Support:Beijing Aegean Software Co., Ltd. 闽ICP备05005463号-1