Journal
IEEE INTERNET OF THINGS JOURNAL
Volume 7, Issue 9, Pages 8077-8089Publisher
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JIOT.2020.2997389
Keywords
Servers; Data privacy; Encryption; Internet of Things; Resists; Data models; Data sharing; privacy preserving; recoverable; revocable
Categories
Funding
- National Key Research and Development Project [2019YFB2102600]
- Fundamental Research Funds for the Central Universities [2019CDQYRJ006]
- National Natural Science Foundation of China [61702062, 61932006, 61672119, U1836114]
- Chongqing Research Program of Basic Research and Frontier Technology [cstc2018jcyjAX0334, cstc2017jcyjB0305]
- Key Project of Technology Innovation and Application Development of Chongqing [cstc2019jscx-mbdxX0044]
- Overseas Returnees Innovation and Entrepreneurship Support Program of Chongqing [cx2018015]
- Deanship of Scientific Research at Prince Sattam Bin Abdulaziz University [2019/01/1041]
Ask authors/readers for more resources
Edge servers (ESs) are utilized to achieve the storage and sharing of IoT data. However, even if ES brings us much benefit, it also leads to many serious privacy leakage issues because users' data in ESs are out of control. Moreover, ES providers may also disclose user's private-sensitive data. Hence, in this article, we present a privacy-preserving, recoverable, and revocable edge data sharing scheme. In this scheme, we propose a novel attribute revocation chain based on the blockchain technology to achieve attribute revocation in ciphertext-policy attribute-based encryption (CP-ABE). Meanwhile, a secret sharing scheme (SSS) is introduced to assist the data recovery. Especially, for the situation that a single ES is hijacked, we also propose a corresponding efficient detection mechanism and key updating policy to promise the subsequent security of the whole system. Moreover, this scheme also resists Economic Denial-of-Sustainability (EDoS) attacks which are launched by some malicious users. The analysis shows that the proposed scheme can protect user's privacy and resist many attacks. Additionally, relevant experimental results demonstrate that our scheme has low computational overhead on the user side.
Authors
I am an author on this paper
Click your name to claim this paper and add it to your profile.
Reviews
Recommended
No Data Available