4.7 Article

A decentralized strongly secure attribute-based encryption and authentication scheme for distributed Internet of Mobile Things

期刊

COMPUTER NETWORKS
卷 201, 期 -, 页码 -

出版社

ELSEVIER
DOI: 10.1016/j.comnet.2021.108553

关键词

Distributed IoT-assisted cloud computing; Multi-authority CP-ABE (MA-CP-ABE); Zero knowledge proof (ZKP); Outsourced decryption (OD); Progressive attribute-based authentication (ABAuthen)

资金

  1. Sichuan Province Major Science and Technology, China Special Project Spatial Information Network Integrated Security Situation Platform [2018GZDZX0006]
  2. Distributed transactional database based on domestic software and hardware platform, China [2020YFG0460]
  3. UAV intelligent computing system based on edge computing, China [2020YFG0472]

向作者/读者索取更多资源

This paper proposes an IND-CCA-secure multi-authority ciphertext-policy ABE scheme for access control and admission detection in the distributed IoT environment, using zero knowledge proof and random authentication messages to protect user privacy. The theoretical analysis and performance evaluation demonstrate the efficiency and applicability of the scheme in distributed IoT-assisted cloud computing.
Internet of Things (IoT) networks has been widely deployed as the distributed computing and communication component in the smart city. The security problems in the distributed IoT-assisted computing architecture are still noteworthy and has not been solved satisfactorily. So in this paper, to design and build an access control and admission detection model for the distributed IoT environment, we propose an IND-CCA-secure multi-authority ciphertext-policy ABE (MA-CP-ABE) scheme with outsourced decryption (OD) and progressive mode attribute-based authentication (ABAuthen). In our authenticaiton algorithm, by using the zero knowledge proof, the user's secret will be protected from leaking out to the server. And due to the randomness of the authentication message, our authentication algorithm can resist the impersonation attacks by the malicious server. Finally, by the theoretical analysis and performance evaluation for our scheme with other state-of-art schemes, we can observe that our encryption and authentication schemes are both efficient and applicable for the distributed IoT-assisted cloud computing.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据