• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
成果搜索

author:

Zhang, J. (Zhang, J..) [1] | Ma, J. (Ma, J..) [2] | Yang, Y. (Yang, Y..) [3] | Liu, X. (Liu, X..) [4] | Xiong, N.N. (Xiong, N.N..) [5]

Indexed by:

Scopus

Abstract:

Fog-assisted Internet of Things (IoT) can outsource the massive data of resource-constraint IoT devices to cloud and fog nodes (FNs). Meanwhile, it enables convenient and low time-delay data-sharing services, which relies heavily on high security of data confidentiality and fine-grained access control. Many efforts have been focused on this urgent requirement by leveraging ciphertext-policy attribute-based encryption (CP-ABE). However, when deployed in fog-assisted IoT systems for secure data sharing, it remains a challenging problem of how to preserve attribute privacy of access policy, and trace-then-revoke traitors (i.e., malicious users intending to leak decryption keys for illegal profits) efficiently and securely in such a large scale and decentralized environment with resource-constraint user devices, especially in consideration of misbehaving cloud and FNs. Therefore, in this article, we propose a revocable and privacy-preserving decentralized data-sharing framework (RPDDSF) by designing a large universe and multiauthority CP-ABE scheme with fully hidden access policy for secure data sharing in IoT systems to achieve user attribute privacy preserving with unbounded attribute universe and key escrow resistance suitable for large scale and decentralized environment. Based on this, with RPDDSF, anyone can efficiently expose the traitors and punish them by forward/backward secure revocation. Besides, RPDDSF is able to guarantee data integrity for both data owners (DOs) and users to resist misbehaving cloud and FNs, alongwith low computation overhead for resource-constraint devices. Finally, RPDDSF is proven to be secure with detailed security proofs, and its high efficiency and feasibility are demonstrated by extensive performance evaluations. © 2014 IEEE.

Keyword:

Attribute privacy preserving; attribute-based encryption; forward/backward security; multiauthority; online/offline; outsourced decryption

Community:

  • [ 1 ] [Zhang, J.]Xidian University, School of Cyber Engineering, The State Key Laboratory of Integrated Services Networks, Xi'an, 710071, China
  • [ 2 ] [Ma, J.]Xidian University, School of Cyber Engineering, The State Key Laboratory of Integrated Services Networks, Xi'an, 710071, China
  • [ 3 ] [Yang, Y.]Inner Mongolia University of Science and Technology, School of Information Engineering, Baotou, 014040, China
  • [ 4 ] [Liu, X.]Fuzhou University, College of Computer and Big Data, Fuzhou, 350116, China
  • [ 5 ] [Liu, X.]Xidian University, State Key Laboratory of Integrated Services Networks, Xi'an, 710071, China
  • [ 6 ] [Xiong, N.N.]Northeastern State University, Department of Mathematics and Computer Science, Tahlequah, OK 74464, United States

Reprint 's Address:

  • [Yang, Y.]Inner Mongolia University of Science and Technology, China

Show more details

Related Keywords:

Related Article:

Source :

IEEE Internet of Things Journal

ISSN: 2327-4662

Year: 2022

Issue: 13

Volume: 9

Page: 10446-10463

1 0 . 6

JCR@2022

8 . 2 0 0

JCR@2023

ESI HC Threshold:61

JCR Journal Grade:1

CAS Journal Grade:1

Cited Count:

WoS CC Cited Count: 0

SCOPUS Cited Count: 16

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 2

Affiliated Colleges:

Online/Total:220/10047595
Address:FZU Library(No.2 Xuyuan Road, Fuzhou, Fujian, PRC Post Code:350116) Contact Us:0591-22865326
Copyright:FZU Library Technical Support:Beijing Aegean Software Co., Ltd. 闽ICP备05005463号-1