Cargando…

Online/Offline MA-CP-ABE with Cryptographic Reverse Firewalls for IoT

Devices in the Internet of Things (IoT) usually use cloud storage and cloud computing to save storage and computing cost. Therefore, the efficient realization of one-to-many communication of data on the premise of ensuring the security of cloud storage data is a challenge. Ciphertext-Policy Attribut...

Descripción completa

Detalles Bibliográficos
Autores principales: Li, Juyan, Fan, Ye, Bian, Xuefen, Yuan, Qi
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2023
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10137905/
https://www.ncbi.nlm.nih.gov/pubmed/37190404
http://dx.doi.org/10.3390/e25040616
_version_ 1785032578813657088
author Li, Juyan
Fan, Ye
Bian, Xuefen
Yuan, Qi
author_facet Li, Juyan
Fan, Ye
Bian, Xuefen
Yuan, Qi
author_sort Li, Juyan
collection PubMed
description Devices in the Internet of Things (IoT) usually use cloud storage and cloud computing to save storage and computing cost. Therefore, the efficient realization of one-to-many communication of data on the premise of ensuring the security of cloud storage data is a challenge. Ciphertext-Policy Attribute-Based Encryption (CP-ABE) can not only protect the security of data in the cloud and achieve one-to-many communication but also achieve fine-grained access control for data. However, the single-authority CP-ABE faces the crisis of single point of failure. In order to improve security, the Multi-Authority CP-ABE (MA-CP-ABE) is adopted. Although there are provably-secure MA-CP-ABE schemes, Edward Snowden’s research shows that provably-secure cryptographic schemes are vulnerable to backdoor attacks, resulting in secret disclosure, and thus threatening security. In addition, ABE requires huge computational overhead in key generation, encryption and decryption, which increase with the increase in the number of attributes and the complexity of the access structure, and there are a large number of resource-constrained devices in the IoT. To mitigate this issue, we construct the Online/Offline MA-CP-ABE with Cryptographic Reverse Firewalls (OO-MA-CP-ABE-CRFs) scheme. This scheme not only uses Cryptographic Reverse Firewall (CRF) to resist backdoor attacks but also uses online/offline key generation, online/offline encryption and outsourcing encryption technology to optimize the efficiency of the MA-CP-ABE scheme with reverse firewall, reducing the storage and computing cost of users. Finally, the security of the OO-MA-CP-ABE-CRFs scheme is proved, and the experimental results indicate that the scheme is efficient and practical.
format Online
Article
Text
id pubmed-10137905
institution National Center for Biotechnology Information
language English
publishDate 2023
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-101379052023-04-28 Online/Offline MA-CP-ABE with Cryptographic Reverse Firewalls for IoT Li, Juyan Fan, Ye Bian, Xuefen Yuan, Qi Entropy (Basel) Article Devices in the Internet of Things (IoT) usually use cloud storage and cloud computing to save storage and computing cost. Therefore, the efficient realization of one-to-many communication of data on the premise of ensuring the security of cloud storage data is a challenge. Ciphertext-Policy Attribute-Based Encryption (CP-ABE) can not only protect the security of data in the cloud and achieve one-to-many communication but also achieve fine-grained access control for data. However, the single-authority CP-ABE faces the crisis of single point of failure. In order to improve security, the Multi-Authority CP-ABE (MA-CP-ABE) is adopted. Although there are provably-secure MA-CP-ABE schemes, Edward Snowden’s research shows that provably-secure cryptographic schemes are vulnerable to backdoor attacks, resulting in secret disclosure, and thus threatening security. In addition, ABE requires huge computational overhead in key generation, encryption and decryption, which increase with the increase in the number of attributes and the complexity of the access structure, and there are a large number of resource-constrained devices in the IoT. To mitigate this issue, we construct the Online/Offline MA-CP-ABE with Cryptographic Reverse Firewalls (OO-MA-CP-ABE-CRFs) scheme. This scheme not only uses Cryptographic Reverse Firewall (CRF) to resist backdoor attacks but also uses online/offline key generation, online/offline encryption and outsourcing encryption technology to optimize the efficiency of the MA-CP-ABE scheme with reverse firewall, reducing the storage and computing cost of users. Finally, the security of the OO-MA-CP-ABE-CRFs scheme is proved, and the experimental results indicate that the scheme is efficient and practical. MDPI 2023-04-04 /pmc/articles/PMC10137905/ /pubmed/37190404 http://dx.doi.org/10.3390/e25040616 Text en © 2023 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Li, Juyan
Fan, Ye
Bian, Xuefen
Yuan, Qi
Online/Offline MA-CP-ABE with Cryptographic Reverse Firewalls for IoT
title Online/Offline MA-CP-ABE with Cryptographic Reverse Firewalls for IoT
title_full Online/Offline MA-CP-ABE with Cryptographic Reverse Firewalls for IoT
title_fullStr Online/Offline MA-CP-ABE with Cryptographic Reverse Firewalls for IoT
title_full_unstemmed Online/Offline MA-CP-ABE with Cryptographic Reverse Firewalls for IoT
title_short Online/Offline MA-CP-ABE with Cryptographic Reverse Firewalls for IoT
title_sort online/offline ma-cp-abe with cryptographic reverse firewalls for iot
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10137905/
https://www.ncbi.nlm.nih.gov/pubmed/37190404
http://dx.doi.org/10.3390/e25040616
work_keys_str_mv AT lijuyan onlineofflinemacpabewithcryptographicreversefirewallsforiot
AT fanye onlineofflinemacpabewithcryptographicreversefirewallsforiot
AT bianxuefen onlineofflinemacpabewithcryptographicreversefirewallsforiot
AT yuanqi onlineofflinemacpabewithcryptographicreversefirewallsforiot