Multi-Authority Revocable Access Control Method Based on CP-ABE in NDN

被引:5
|
作者
Wu, Zhijun [1 ]
Zhang, Yun [1 ]
Xu, Enzhong [1 ]
机构
[1] Civil Aviat Univ China, Sch Elect Informat & Automat, Tianjin 300300, Peoples R China
来源
FUTURE INTERNET | 2020年 / 12卷 / 01期
基金
中国国家自然科学基金;
关键词
Information-Centric Network (ICN); Naming Data Network (NDN); access control; multiple Authorization; Ciphertext-Policy Attribute-Based Encryption (CP-ABE);
D O I
10.3390/fi12010015
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
For the future of the Internet, because information-centric network (ICN) have natural advantages in terms of content distribution, mobility, and security, it is regarded as a potential solution, or even the key, to solve many current problems. Named Data Network (NDN) is one of the research projects initiated by the United States for network architecture. NDN is a more popular project than ICN. The information cache in the NDN separates content from content publishers, but content security is threatened because of the lack of security controls. Therefore, a multi-authority revocable access control method based on CP-ABE needs to be proposed. This method constructs a proxy-assisted access control scheme, which can implement effective data access control in NDN networks, and the scheme has high security. Because of the partial decryption on the NDN node, the decryption burden of the consumer client in the solution is reduced, and effective user and attribute revocation is achieved, and forward security and backward security are ensured, and collusion attacks are prevented. Finally, through the other security and performance analysis of the scheme of this paper, it proves that the scheme is safe and efficient.
引用
收藏
页数:13
相关论文
共 50 条
  • [21] Revocable Outsourced Decryption of CP-ABE Based on OBDD
    Chen, Li
    Guo, Rui
    Xu, Lei
    Wei, Xin
    Yang, Geng
    Zhuang, Chaoyuan
    Zhao, Qianqian
    International Journal of Network Security, 2022, 24 (06): : 1094 - 1105
  • [22] CP-ABE Based Access Control for Cloud Storage
    Wang, Yong
    Wei, Longxing
    Tong, Xuemin
    Zhao, Xiaolin
    Li, Ming
    INFORMATION TECHNOLOGY AND INTELLIGENT TRANSPORTATION SYSTEMS, VOL 2, 2017, 455 : 463 - 472
  • [23] Efficient Compressed Ciphertext Length Scheme Using Multi-Authority CP-ABE for Hierarchical Attributes
    Zhang, Zhiyong
    Li, Cheng
    Gupta, Brij B.
    Niu, Danmei
    IEEE ACCESS, 2018, 6 : 38273 - 38284
  • [24] Multi-Authority CP-ABE with Dynamical Revocation in Space-Air-Ground Integrated Network
    Zhang, ZhiShuo
    Zhang, Wei
    Qin, ZhiGuang
    2020 INTERNATIONAL CONFERENCE ON SPACE-AIR-GROUND COMPUTING (SAGC 2020), 2020, : 76 - 81
  • [25] Revocable Outsourcing Multi-Authority ABE for Medical Data in Mobile Cloud
    Koe, Arthur Sandor Voundi
    Tang, Juan
    Ai, Shan
    Yan, Hongyang
    Zhang, Shiwen
    IEEE CONGRESS ON CYBERMATICS / 2021 IEEE INTERNATIONAL CONFERENCES ON INTERNET OF THINGS (ITHINGS) / IEEE GREEN COMPUTING AND COMMUNICATIONS (GREENCOM) / IEEE CYBER, PHYSICAL AND SOCIAL COMPUTING (CPSCOM) / IEEE SMART DATA (SMARTDATA), 2021, : 338 - 345
  • [26] Traceable and revocable CP-ABE with shorter ciphertexts
    Ning, Jianting
    Cao, Zhenfu
    Dong, Xiaolei
    Wei, Lifei
    SCIENCE CHINA-INFORMATION SCIENCES, 2016, 59 (11)
  • [27] Traceable and revocable CP-ABE with shorter ciphertexts
    Jianting NING
    Zhenfu CAO
    Xiaolei DONG
    Lifei WEI
    Science China(Information Sciences), 2016, 59 (11) : 230 - 232
  • [28] Private blockchain-envisioned multi-authority CP-ABE-based user access control scheme in IIoT
    Banerjee, Soumya
    Bera, Basudeb
    Das, Ashok Kumar
    Chattopadhyay, Samiran
    Khan, Muhammad Khurram
    Rodrigues, Joel J. P. C.
    COMPUTER COMMUNICATIONS, 2021, 169 : 99 - 113
  • [29] A traceable and revocable multi-authority access control scheme with privacy preserving for mHealth
    Zhang, Leyou
    Zhao, Chuchu
    Wu, Qing
    Mu, Yi
    Rezaeibagha, Fatemeh
    JOURNAL OF SYSTEMS ARCHITECTURE, 2022, 130
  • [30] Secure, efficient and revocable multi-authority access control system in cloud storage
    Li, Qi
    Ma, Jianfeng
    Li, Rui
    Liu, Ximeng
    Xiong, Jinbo
    Chen, Danwei
    COMPUTERS & SECURITY, 2016, 59 : 45 - 59