| Literature DB >> 31795236 |
Qikun Zhang1, Yongjiao Li1, Zhigang Li1, Junling Yuan1, Yong Gan2, Xiangyang Luo3.
Abstract
The development of the Internet of Things has led to great development of data sharing and data interaction, which has made security and privacy more and more a concern for users. How to ensure the safe sharing of data, avoid the leakage of sensitive information, and protect the privacy of users is a serious challenge. Access control is an important issue to ensure the trust of the Internet of Things. This paper proposes an access control scheme based on ciphertext attribute authentication and threshold policy, which uses the identity authentication of hidden attributes and divides the user's permission grade by setting the threshold function with the user's attributes. Users obtain different permission grades according to attribute authentication and access data of different sensitivity grades to achieve fine-grained, flexible and secure access to data in the cloud server while protecting personal privacy issues. In addition, when the resource is acquired, the identity and permission joint authentication method is adopted to avoid the collusion attack of the illegal member, which makes the resource access control more secure.Entities:
Keywords: Internet of Things; access control; attribute authentication; attribute-based encryption; data security sharing
Year: 2019 PMID: 31795236 PMCID: PMC6928987 DOI: 10.3390/s19235237
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1System model diagram.
The terminal users registration process of ABE-AC.
| Terminal Users | CA | |
|---|---|---|
|
|
| |
|
| ||
|
|
|
|
|
| ||
|
| ||
|
|
The registration information of terminal users.
| Terminals |
|
| … |
|
|---|---|---|---|---|
| Effectiveness | yes | yes | … | yes |
| Publickey |
|
| … |
|
| Keywords |
|
| … |
|
| Description |
|
| … |
|
| Encryptionkey |
|
| … |
|
| Ciphertextresource |
|
| … |
|
| Privilege grade |
|
| … |
|
| right parameter | … | |||
| Threshold value | … |
Symbols used mainly in this chapter.
| Phase | Bethencourt et al. [ | Xue et al. [ | Li et al. [ | Zhong et al. [ | Ours |
|---|---|---|---|---|---|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Figure 2Calculation time cost comparison analysis in the setup phase of the five protocols.
Figure 3Calculation time cost comparison analysis in the key generation phase of the five protocols.
Figure 4Calculation time cost comparison analysis in the encryption phase of the five protocols.
Figure 5Calculation time cost comparison analysis in the decryption phase of the five protocols.