Cargando…

Access Control Based on Ciphertext Attribute Authentication and Threshold Policy for the Internet of Things

The development of the Internet of Things has led to great development of data sharing and data interaction, which has made security and privacy more and more a concern for users. How to ensure the safe sharing of data, avoid the leakage of sensitive information, and protect the privacy of users is...

Descripción completa

Detalles Bibliográficos
Autores principales: Zhang, Qikun, Li, Yongjiao, Li, Zhigang, Yuan, Junling, Gan, Yong, Luo, Xiangyang
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2019
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6928987/
https://www.ncbi.nlm.nih.gov/pubmed/31795236
http://dx.doi.org/10.3390/s19235237
_version_ 1783482600023654400
author Zhang, Qikun
Li, Yongjiao
Li, Zhigang
Yuan, Junling
Gan, Yong
Luo, Xiangyang
author_facet Zhang, Qikun
Li, Yongjiao
Li, Zhigang
Yuan, Junling
Gan, Yong
Luo, Xiangyang
author_sort Zhang, Qikun
collection PubMed
description The development of the Internet of Things has led to great development of data sharing and data interaction, which has made security and privacy more and more a concern for users. How to ensure the safe sharing of data, avoid the leakage of sensitive information, and protect the privacy of users is a serious challenge. Access control is an important issue to ensure the trust of the Internet of Things. This paper proposes an access control scheme based on ciphertext attribute authentication and threshold policy, which uses the identity authentication of hidden attributes and divides the user’s permission grade by setting the threshold function with the user’s attributes. Users obtain different permission grades according to attribute authentication and access data of different sensitivity grades to achieve fine-grained, flexible and secure access to data in the cloud server while protecting personal privacy issues. In addition, when the resource is acquired, the identity and permission joint authentication method is adopted to avoid the collusion attack of the illegal member, which makes the resource access control more secure.
format Online
Article
Text
id pubmed-6928987
institution National Center for Biotechnology Information
language English
publishDate 2019
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-69289872019-12-26 Access Control Based on Ciphertext Attribute Authentication and Threshold Policy for the Internet of Things Zhang, Qikun Li, Yongjiao Li, Zhigang Yuan, Junling Gan, Yong Luo, Xiangyang Sensors (Basel) Article The development of the Internet of Things has led to great development of data sharing and data interaction, which has made security and privacy more and more a concern for users. How to ensure the safe sharing of data, avoid the leakage of sensitive information, and protect the privacy of users is a serious challenge. Access control is an important issue to ensure the trust of the Internet of Things. This paper proposes an access control scheme based on ciphertext attribute authentication and threshold policy, which uses the identity authentication of hidden attributes and divides the user’s permission grade by setting the threshold function with the user’s attributes. Users obtain different permission grades according to attribute authentication and access data of different sensitivity grades to achieve fine-grained, flexible and secure access to data in the cloud server while protecting personal privacy issues. In addition, when the resource is acquired, the identity and permission joint authentication method is adopted to avoid the collusion attack of the illegal member, which makes the resource access control more secure. MDPI 2019-11-28 /pmc/articles/PMC6928987/ /pubmed/31795236 http://dx.doi.org/10.3390/s19235237 Text en © 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Zhang, Qikun
Li, Yongjiao
Li, Zhigang
Yuan, Junling
Gan, Yong
Luo, Xiangyang
Access Control Based on Ciphertext Attribute Authentication and Threshold Policy for the Internet of Things
title Access Control Based on Ciphertext Attribute Authentication and Threshold Policy for the Internet of Things
title_full Access Control Based on Ciphertext Attribute Authentication and Threshold Policy for the Internet of Things
title_fullStr Access Control Based on Ciphertext Attribute Authentication and Threshold Policy for the Internet of Things
title_full_unstemmed Access Control Based on Ciphertext Attribute Authentication and Threshold Policy for the Internet of Things
title_short Access Control Based on Ciphertext Attribute Authentication and Threshold Policy for the Internet of Things
title_sort access control based on ciphertext attribute authentication and threshold policy for the internet of things
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6928987/
https://www.ncbi.nlm.nih.gov/pubmed/31795236
http://dx.doi.org/10.3390/s19235237
work_keys_str_mv AT zhangqikun accesscontrolbasedonciphertextattributeauthenticationandthresholdpolicyfortheinternetofthings
AT liyongjiao accesscontrolbasedonciphertextattributeauthenticationandthresholdpolicyfortheinternetofthings
AT lizhigang accesscontrolbasedonciphertextattributeauthenticationandthresholdpolicyfortheinternetofthings
AT yuanjunling accesscontrolbasedonciphertextattributeauthenticationandthresholdpolicyfortheinternetofthings
AT ganyong accesscontrolbasedonciphertextattributeauthenticationandthresholdpolicyfortheinternetofthings
AT luoxiangyang accesscontrolbasedonciphertextattributeauthenticationandthresholdpolicyfortheinternetofthings