Computer Science ›› 2019, Vol. 46 ›› Issue (8): 194-200.doi: 10.11896/j.issn.1002-137X.2019.08.032

• Information Security • Previous Articles     Next Articles

Efficient Access Control Scheme for Internet of Things Search Technology

ZHANG Yuan-yuan, QIN Ling   

  1. (School of Computer Science and Technology,Nanjing Tech University,Nanjing 211816,China)
  • Received:2018-07-17 Online:2019-08-15 Published:2019-08-15

Abstract: Internet of Things search technology is widely used in daily life,however,due to the openness of the Internet of Things search engine and the incomplete credibility of the search center,information stored in the search background has serious security issues.This paper proposed a secure and efficient attribute-based access control scheme for suppor-ting ciphertext search to solve this problem.In terms of data protection,in order to ensure the security of user attribute information and data,access policy partial hiding and attribute authority decentralization are used.Besides,ciphertext fixed length is used to improve algorithm efficiency and save storage space.At the same time,this paper proposed an attribute revocation scheme that supports policy comparison,which can reduce the computational complexity in the traditional revocation scheme and improve the efficiency of re-encryption.In the ciphertext search,the super peer is introduced and the hybrid index is used to improve the retrieval efficiency.The analysis results show that the solution effectively solves the security problem in the Internet of Things search technology

Key words: Access strategy partially hidden, Attribute authority, Ciphertext search, Internet of Things search technology, Property revocation

CLC Number: 

  • TP393
[1]WANG J H,LIU C Y,FANG B X.A Survey of Research on Data Privacy Protection for Internet of Things Search[J].Journal of Communications,2016,37(9):142-153.(in Chinese) 王佳慧,刘川意,方滨兴.面向物联网搜索的数据隐私保护研究综述[J].通信学报,2016,37(9):142-153.
[2]GORLATYKH A,ZAPECHNIKOV S.Building access tree for attribute-based encryption schemes over multidimensional data objects[C]∥IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering.IEEE,2018:1496-1499.
[3]CANARD S,PHAN D H,TRINH V C.Attribute-based broadcast encryption scheme for lightweight devices[J].IET Information Security,2018,12(1):52-59.
[4]LUAN I,PETKOVIC M,NIKOVA S,et al.Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application[C]∥Information Security Applications,International Workshop.Wisa 2009,2009.
[5]YANG F,YUAN Q,DU S,et al.Reserving relief supplies for earthquake:a multi-attribute decision making of China Red Cross[J].Annals of Operations Research,2016,247(2):759-785.
[6]EWENIKE S,BENKHELIFA E,CHIBELUSHI C.Cloud Based Collaborative Software Development:A Review,Gap Analysis and Future Directions[C]∥IEEE/ACS,International Confe-rence on Computer Systems and Applications.IEEE,2018:901-909.
[7]WANG S,ZHOU J,LIU J K,et al.An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing[J].IEEE Transactions on Information Forensics & Security,2017,11(6):1265-1277.
[8]XU X,ZHANG Q,ZHOU J.NC-MACPABE:Non-centered multi-authority proxy re-encryption based on CP-ABE for cloud storage systems[J].Journal of Central South University,2017,24(4):807-818.
[9]GAO W,WANG G,CHEN K,et al.Efficient identity-based threshold decryption scheme from bilinear pairings[J].Frontiers of Computer Science,2018,12(2):1-13.
[10]GUO F,MU Y,SUSILO W,et al.Optimized Identity-Based Encryption from Bilinear Pairing for Lightweight Devices[J].IEEE Transactions on Dependable & Secure Computing,2017,14(2):211-220.
[11]MALLUHI Q M,TRINH V C.A Ciphertext-Policy Attribute-based Encryption Scheme with Optimized Ciphertext Size And Fast Decryption[C]∥ACM on Asia Conference on Computer and Communications Security.ACM,2017:230-240.
[12]ZIRTOL K A,NOROOZI M,ESLAMI Z.Multi-user searchable encryption scheme with general access structure[C]∥International Conference on Knowledge-Based Engineering and Innovation.IEEE,2016:399-404.
[13]MEI Z,ZHU H,CUI Z,et al.Executing multi-dimensional range query efficiently and flexibly over outsourced ciphertexts in the cloud[J].Information Sciences,2018,432(1):79-96.
[14]LIN S,ZHANG R,MA H,et al.Revisiting Attribute-Based Encryption With Verifiable Outsourced Decryption[J].IEEE Transactions on Information Forensics & Security,2017,10(10):2119-2130.
[15]WANG N,FU J,BHARGAVA B K,et al.Efficient Retrieval over Documents Encrypted by Attributes in Cloud Computing[J].IEEE Transactions on Information Forensics and Security,2018,13(10):2653-2667.
[16]FAN K,WANG X,SUTO K,et al.Secure and Efficient Privacy-Preserving Ciphertext Retrieval in Connected Vehicular Cloud Computing[J].IEEE Network,2018,32(3):52-57.
[17]MA H,ZHANG R,WAN Z,et al.Verifiable and Exculpable Outsourced Attribute-Based Encryption for Access Control in Cloud Computing[J].IEEE Transactions on Dependable & Secure Computing,2017,14(6):679-692.
[18]YAN X X,LIU Y,LI Z C,et al.Multi-attribute attribute-based encryption scheme supporting dynamic update of policies[J].Journal of Communications,2017,38(10):94-101.(in Chinese) 闫玺玺,刘媛,李子臣,等.支持策略动态更新的多机构属性基加密方案[J].通信学报,2017,38(10):94-101.
[19]CHI P W,LEI C L.Audit-Free Cloud Storage via Deniable Attribute-based Encryption[J].IEEE Transactions on Cloud Computing,2018,6(2):414-427.
[20]HAN J,YANG Y,LIU J K,et al.Expressive attribute-based keyword search with constant-size ciphertext[J].Soft Computing,2018,22(15):5163-5177.
[1] LIU Xin, WANG Jun, SONG Qiao-feng, LIU Jia-hao. Collaborative Multicast Proactive Caching Scheme Based on AAE [J]. Computer Science, 2022, 49(9): 260-267.
[2] GUO Peng-jun, ZHANG Jing-zhou, YANG Yuan-fan, YANG Shen-xiang. Study on Wireless Communication Network Architecture and Access Control Algorithm in Aircraft [J]. Computer Science, 2022, 49(9): 268-274.
[3] HU An-xiang, YIN Xiao-kang, ZHU Xiao-ya, LIU Sheng-li. Strcmp-like Function Identification Method Based on Data Flow Feature Matching [J]. Computer Science, 2022, 49(9): 326-332.
[4] JIANG Yang-yang, SONG Li-hua, XING Chang-you, ZHANG Guo-min, ZENG Qing-wei. Belief Driven Attack and Defense Policy Optimization Mechanism in Honeypot Game [J]. Computer Science, 2022, 49(9): 333-339.
[5] WANG Lei, LI Xiao-yu. LBS Mobile Privacy Protection Scheme Based on Random Onion Routing [J]. Computer Science, 2022, 49(9): 347-354.
[6] WANG Xing-wei, XIN Jun-chang, SHAO An-lin, BI Yuan-guo, YI Xiu-shuang. Study on Development Status and Countermeasures of Industrial Intranet in Enterprises [J]. Computer Science, 2022, 49(7): 1-9.
[7] ZHANG Chong-yu, CHEN Yan-ming, LI Wei. Task Offloading Online Algorithm for Data Stream Edge Computing [J]. Computer Science, 2022, 49(7): 263-270.
[8] FEI Xing-rui, XIE Yi. Click Streams Recognition for Web Users Based on HMM-NN [J]. Computer Science, 2022, 49(7): 340-349.
[9] ZHAO Dong-mei, WU Ya-xing, ZHANG Hong-bin. Network Security Situation Prediction Based on IPSO-BiLSTM [J]. Computer Science, 2022, 49(7): 357-362.
[10] WANG Si-ming, TAN Bei-hai, YU Rong. Blockchain Sharding and Incentive Mechanism for 6G Dependable Intelligence [J]. Computer Science, 2022, 49(6): 32-38.
[11] Ran WANG, Jiang-tian NIE, Yang ZHANG, Kun ZHU. Clustering-based Demand Response for Intelligent Energy Management in 6G-enabled Smart Grids [J]. Computer Science, 2022, 49(6): 44-54.
[12] WEI Hui, CHEN Ze-mao, ZHANG Li-qiang. Anomaly Detection Framework of System Call Trace Based on Sequence and Frequency Patterns [J]. Computer Science, 2022, 49(6): 350-355.
[13] TAO Li-jing, QIU Han, ZHU Jun-hu, LI Hang-tian. Model for the Description of Trainee Behavior for Cyber Security Exercises Assessment [J]. Computer Science, 2022, 49(6A): 480-484.
[14] HE Xi, HE Ke-tai, WANG Jin-shan, LIN Shen-wen, YANG Jing-lin, FENG Yu-chao. Analysis of Bitcoin Entity Transaction Patterns [J]. Computer Science, 2022, 49(6A): 502-507.
[15] GAO Wen-long, ZHOU Tian-yang, ZHU Jun-hu, ZHAO Zi-heng. Network Attack Path Discovery Method Based on Bidirectional Ant Colony Algorithm [J]. Computer Science, 2022, 49(6A): 516-522.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!