UWSpace is currently experiencing technical difficulties resulting from its recent migration to a new version of its software. These technical issues are not affecting the submission and browse features of the site. UWaterloo community members may continue submitting items to UWSpace. We apologize for the inconvenience, and are actively working to resolve these technical issues.
 

Fine-grained data access control with attribute-hiding policy for cloud-based IoT

Loading...
Thumbnail Image

Date

2019-04-22

Authors

Hao, Jialu
Huang, Cheng
Ni, Jianbing
Rong, Hong
Xian, Ming
Shen, Xuemin (Sherman)

Journal Title

Journal ISSN

Volume Title

Publisher

Elsevier

Abstract

Ciphertext-policy attribute-based encryption (CP-ABE) is a promising approach to achieve fine-grained access control over the outsourced data in Internet of Things (IoT). However, in the existing CP-ABE schemes, the access policy is either appended to the ciphertext explicitly or only partially hidden against public visibility, which results in privacy leakage of the underlying ciphertext and potential recipients. In this paper, we propose a fine-grained data access control scheme supporting expressive access policy with fully attribute hidden for cloud-based IoT. Specifically, the attribute information is fully hidden in access policy by using randomizable technique, and a fuzzy attribute positioning mechanism based on garbled Bloom filter is developed to help the authorized recipients locate their attributes efficiently and decrypt the ciphertext successfully. Security analysis and performance evaluation demonstrate that the proposed scheme achieves effective policy privacy preservation with low storage and computation overhead. As a result, no valuable attribute information in the access policy will be disclosed to the unauthorized recipients.

Description

The final publication is available at Elsevier via https://doi.org/10.1016/j.comnet.2019.02.008. © 2019. This manuscript version is made available under the CC-BY-NC-ND 4.0 license http://creativecommons.org/licenses/by-nc-nd/4.0/

Keywords

access control, attribute-based encryption, attribute hiding, policy privacy, cloud computing, Internet of Things

LC Keywords

Citation