Privacy-preserving revocable access control for LLM-driven electrical distributed systems

被引:0
|
作者
Peng Xiao [1 ]
Shunkun Yang [2 ]
Hailin Wang [1 ]
Zhenhong Zhang [1 ]
Chunsheng Zou [3 ]
机构
[1] China Southern Yunnan Power Grid Co. Ltd,Information Center
[2] Kash Institute of Electronics and Information Industry,undefined
[3] Chinaunicom,undefined
关键词
Fine-grained access control; Attribute-based encryption; Large language model (LLM); Policy hiding; Direct revocation;
D O I
10.1007/s12083-025-01964-3
中图分类号
学科分类号
摘要
Large Language Models (LLMs) have become transformative tools in natural language processing, significantly advancing the fields of communication, information analysis, and knowledge sharing. However, the vast amounts of sensitive data they handle pose significant challenges for data security and privacy. Traditional cryptographic methods face limitations in efficiently managing access control in LLM-driven electrical distributed systems. This paper introduces a novel Privacy-preserving Revocable Access Control for LLM-driven electrical distributed systems, addressing key concerns such as access policy concealment, user revocation efficiency, and computational overhead. Leveraging an inner-product-based access control mechanism, the proposed scheme achieves complete access policy concealment while supporting flexible access control with wildcard capabilities. Additionally, it facilitates efficient user revocation without requiring costly updates to ciphertexts in such an LLM-driven electrical distributed system. The concise algorithmic structure ensures high efficiency, further enhanced through online/offline encryption and outsourced decryption mechanisms.
引用
收藏
相关论文
共 50 条
  • [21] Distributed Privacy-preserving Consensus Control Based on Steganography
    Wu, Yi-Ming
    Zhang, Run-Rong
    Xu, Hong
    Zhu, Chen-Rui
    Zheng, Ning
    Zidonghua Xuebao/Acta Automatica Sinica, 2025, 51 (01): : 221 - 232
  • [22] A Privacy-Preserving Distributed Control of Optimal Power Flow
    Ryu, Minseok
    Kim, Kibaek
    IEEE TRANSACTIONS ON POWER SYSTEMS, 2022, 37 (03) : 2042 - 2051
  • [23] To pass or not to pass: Privacy-preserving physical access control
    Garcia-Rodriguez, Jesus
    Krenn, Stephan
    Slamanig, Daniel
    COMPUTERS & SECURITY, 2024, 136
  • [24] A survey of privacy-preserving access control in cloud computing
    Li, Hongjiao, 1600, Binary Information Press (10):
  • [25] ACCESS CONTROL FOR PRIVACY-PRESERVING GAUSSIAN PROCESS REGRESSION
    Nakachi, Takayuki
    Wang, Yitu
    2022 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2022, : 4158 - 4162
  • [26] Distributed Privacy-Preserving Methods for Statistical Disclosure Control
    Herranz, Javier
    Nin, Jordi
    Torra, Vicenc
    DATA PRIVACY MANAGEMENT AND AUTONOMOUS SPONTANEOUS SECURITY, 2010, 5939 : 33 - +
  • [27] Privacy-Preserving Data Processing with Flexible Access Control
    Ding, Wenxiu
    Yan, Zheng
    Deng, Robert H.
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (02) : 363 - 376
  • [28] No free lunch theorem for privacy-preserving LLM inference
    Zhang, Xiaojin
    Pang, Yahao
    Kang, Yan
    Chen, Wei
    Fan, Lixin
    Jin, Hai
    Yang, Qiang
    ARTIFICIAL INTELLIGENCE, 2025, 341
  • [29] Privacy-preserving and tokenless chaotic revocable face authentication scheme
    Muhammad Khurram Khan
    Khaled Alghathbar
    Jiashu Zhang
    Telecommunication Systems, 2011, 47 : 227 - 234
  • [30] Privacy-Preserving and Revocable Redactable Blockchains With Expressive Policies in IoT
    Guo, Hongchen
    Chen, Liren
    Ren, Xuhao
    Zhao, Mingyang
    Li, Chunhai
    Xue, Jingfeng
    Zhu, Liehuang
    Zhang, Chuan
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (21): : 35390 - 35404