期刊
CMC-COMPUTERS MATERIALS & CONTINUA
卷 76, 期 1, 页码 939-956出版社
TECH SCIENCE PRESS
DOI: 10.32604/cmc.2023.035798
关键词
Bilinear Diffie-Hellman (DBDH); Internet of Things (IoT); Ciphertext-Policy Attribute-Based Encryption (CP-ABE); Hidden Hierarchy CP-ABE (HH-CP-ABE)
Most research focuses on real-time IoT data and the challenges of storing such massive amounts of data in cloud storage systems. Ciphertext-Policy Attribute-Based Encryption (CP-ABE) offers a secure solution for IoT data storage in cloud services. Cloud-assisted IoTs face privacy issues regarding access policies and decryption times. A proposed CP-ABE scheme addresses these issues and provides better storage efficiency, reduced costs, and improved security.
Most research works nowadays deal with real-time Internet of Things (IoT) data. However, with exponential data volume increases, organizations need help storing such humongous amounts of IoT data in cloud storage systems. Moreover, such systems create security issues while efficiently using IoT and Cloud Computing technologies. Ciphertext-Policy Attribute-Based Encryption (CP-ABE) has the potential to make IoT data more secure and reliable in various cloud storage services. Cloud-assisted IoTs suffer from two privacy issues: access policies (public) and super polynomial decryption times (attributed mainly to complex access structures). We have developed a CP-ABE scheme in alignment with a Hidden Hierarchy ture embedded within two policies, i.e., public policy and sensitive policy. In this proposed scheme, information is only revealed when the user's information is satisfactory to the public policy. Furthermore, the proposed scheme applies to resource-constrained devices already contracted tasks to trusted servers (especially encryption/decryption/searching). Implementing the method and keywords search resulted in higher access policy privacy and increased security. The new scheme introduces superior storage in comparison to existing systems (CP-ABE, H-CP-ABE), while also decreasing storage costs in HH-CP-ABE. Furthermore, a reduction in time for key generation can also be noted. Moreover, the scheme proved secure, even in handling IoT data threats in the Decisional Bilinear Diffie-Hellman (DBDH) case.
作者
我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。
推荐
暂无数据