4.5 Article

Hidden Hierarchy Based on Cipher-Text Attribute Encryption for IoT Data Privacy in Cloud

期刊

CMC-COMPUTERS MATERIALS & CONTINUA
卷 76, 期 1, 页码 939-956

出版社

TECH SCIENCE PRESS
DOI: 10.32604/cmc.2023.035798

关键词

Bilinear Diffie-Hellman (DBDH); Internet of Things (IoT); Ciphertext-Policy Attribute-Based Encryption (CP-ABE); Hidden Hierarchy CP-ABE (HH-CP-ABE)

向作者/读者索取更多资源

Most research focuses on real-time IoT data and the challenges of storing such massive amounts of data in cloud storage systems. Ciphertext-Policy Attribute-Based Encryption (CP-ABE) offers a secure solution for IoT data storage in cloud services. Cloud-assisted IoTs face privacy issues regarding access policies and decryption times. A proposed CP-ABE scheme addresses these issues and provides better storage efficiency, reduced costs, and improved security.
Most research works nowadays deal with real-time Internet of Things (IoT) data. However, with exponential data volume increases, organizations need help storing such humongous amounts of IoT data in cloud storage systems. Moreover, such systems create security issues while efficiently using IoT and Cloud Computing technologies. Ciphertext-Policy Attribute-Based Encryption (CP-ABE) has the potential to make IoT data more secure and reliable in various cloud storage services. Cloud-assisted IoTs suffer from two privacy issues: access policies (public) and super polynomial decryption times (attributed mainly to complex access structures). We have developed a CP-ABE scheme in alignment with a Hidden Hierarchy ture embedded within two policies, i.e., public policy and sensitive policy. In this proposed scheme, information is only revealed when the user's information is satisfactory to the public policy. Furthermore, the proposed scheme applies to resource-constrained devices already contracted tasks to trusted servers (especially encryption/decryption/searching). Implementing the method and keywords search resulted in higher access policy privacy and increased security. The new scheme introduces superior storage in comparison to existing systems (CP-ABE, H-CP-ABE), while also decreasing storage costs in HH-CP-ABE. Furthermore, a reduction in time for key generation can also be noted. Moreover, the scheme proved secure, even in handling IoT data threats in the Decisional Bilinear Diffie-Hellman (DBDH) case.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.5
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据