Abstract
Smart grid requires sharing sensitive data to external researchers. Attribute encryption is a common technique used in data sharing. Unfortunately, existing revocation mechanisms do not consider the following two issues. One is that the revoked user may save intermediate values computed in the past to illegally decrypt the updated cipher text. The other is that the update parameters of keys can be leaked to the revoked user, which leads to revocation failure. To address the above issues, we propose a verifiable outsourcing decryption and data sharing scheme, in which we introduce version parameters of ciphertexts and keys, and associate the update parameters of keys with each user to achieve security-enhanced revocation. In addition, a formal security proof is given under the DBDH assumption. Finally, we evaluate the performance of the scheme and the results show that the proposed scheme is more effective than current schemes.






Similar content being viewed by others
Data availability
The authors state the data availability in this manuscript.
Code availability
Not applicable.
References
Boucenna, F., Nouali, O., Kechid, S., et al.: Secure inverted index based search over encrypted cloud data with user access rights management. J. Comput. Sci. Technol. 34(1), 133–154 (2019)
Bao-Kun, Z., Lie-Huang, Z., Shen, M., et al.: Scalable and privacy-preserving data sharing based on blockchain. J. Comput. Sci. Technol. 33(3), 557–567 (2018)
Leng, J., Zhou, M., Zhao, J.L., et al.: Blockchain security: a survey of techniques and research directions. IEEE Trans. Serv. Comput. (2020). https://doi.org/10.1109/TSC.2020.3038641
Leng, J., Ruan, G., Jiang, P., et al.: Blockchain-empowered sustainable manufacturing and product lifecycle management in industry 4.0: a survey. Renew. Sustain. Energy Rev. 132, 110112–110119 (2020)
Leng, J., Ye, S., Zhou, M., et al.: Blockchain-secured smart manufacturing in industry 4.0: A survey. IEEE Trans. Syst. Man Cybern. 51(1), 237–252 (2020)
Leng, J., Jiang, P., Xu, K., et al.: Makerchain: A blockchain with chemical signature for self-organizing process in social manufacturing. J. Clean. Prod. 234, 767–778 (2019)
Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Annual international conference on the theory and applications of cryptographic techniques, pp. 457–473. Springer, Berlin (2005)
Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. IEEE symposium on security and privacy (SP’07) IEEE 2007, 321–334 (2007)
Goyal, V., Pandey, O., Sahai, A., et al.: Attribute-based encryption for fine-grained access control of encrypted data. Proceedings of the 13th ACM Conference on Computer and Communications Security. 2006, pp. 89–98
Chase, M., Chow, S.S.M.: Improving privacy and security in multi-authority attribute-based encryption. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, 2009, pp. 121–130
Green, M., Hohenberger, S., Waters, B.: Outsourcing the decryption of abe ciphertexts. USENIX security symposium, 2011, 3
Qin, B., Deng, R.H., Liu, S., et al.: Attribute-based encryption with efficient verifiable outsourced decryption. IEEE Trans. Inf. Forensics Secur. 10(7), 1384–1393 (2015)
Liu, J.K., Au, M.H., Huang, X., et al.: Fine-grained two-factor access control for web-based cloud computing services. IEEE Trans. Inf. Forensics Secur. 11(3), 484–497 (2015)
Li, J., Lin, X., Zhang, Y., et al.: KSF-OABE: Outsourced attribute-based encryption with keyword search function for cloud storage. IEEE Trans. Serv. Comput. 10(5), 715–725 (2016)
Li, J., Wang, Y., Zhang, Y., et al.: Full verifiability for outsourced decryption in attribute based encryption. IEEE Trans. Serv. Comput. 13(3), 478–487 (2017)
Li, J., Sha, F., Zhang, Y., et al.: Verifiable outsourced decryption of attribute-based encryption with constant ciphertext length. In: Security and Communication Networks, 2017, 2017
Fan, K., Xu, H., Gao, L., et al.: Efficient and privacy preserving access control scheme for fog-enabled IoT. Futur. Gener. Comput. Syst. 99, 134–142 (2019)
Zhong, H., Zhou, Y., Zhang, Q., et al.: An efficient and outsourcing-supported attribute-based access control scheme for edge-enabled smart healthcare. Futur. Gener. Comput. Syst. 115, 486–496 (2021)
Li, W.M., Li, X.L., Wen, Q.Y., et al.: Flexible CP-ABE based access control on encrypted data for mobile users in hybrid cloud system. J. Comput. Sci. Technol. 32(5), 974–990 (2017)
Ostrovsky, R., Sahai, A., Waters, B.: Attribute-based encryption with non-monotonic access structures. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, 2007, pp. 195–203
Sahai, A., Seyalioglu, H., Waters, B.: Dynamic credentials and ciphertext delegation for attribute-based encryption. In: Annual Cryptology Conference, pp. 199–217. Springer, Berlin (2012)
Liu, Q., Wang, G., Wu, J.: Time-based proxy re-encryption scheme for secure data sharing in a cloud environment. Inf. Sci. 258, 355–370 (2014)
Jahid, S., Borisov, N.: Piratte: Proxy-based immediate revocation of attribute-based encryption. arXiv preprint arXiv:1208.4877, 2012
Hur, J.: Improving security and efficiency in attribute-based data sharing. IEEE Trans. Knowl. Data Eng. 25(10), 2271–2282 (2011)
Yu, G., Ma, X., Cao, Z., et al.: Server-aided directly revocable ciphertext-policy attribute-based encryption with verifiable delegation. In: International Conference on Information and Communications Security, pp. 172–179. Springer, Cham (2017)
Qin, B., Zhao, Q., Zheng, D., et al.: (Dual) server-aided revocable attribute-based encryption with decryption key exposure resistance. Inf. Sci. 490, 74–92 (2019)
Xiong, H., Zhao, Y., Peng, L., et al.: Partially policy-hidden attribute-based broadcast encryption with secure delegation in edge computing. Futur. Gener. Comput. Syst. 97, 453–461 (2019)
Cui, H., Hon Yuen, T., Deng, R.H., et al.: Server-aided revocable attribute-based encryption for cloud computing services. Concurr. Comput. 32(14), e5680 (2020)
Ning, J., Cao, Z., Dong, X., et al.: CryptCloud +: secure and expressive data access control for cloud storage. IEEE Trans. Serv. Comput. 14(1), 111–124 (2018)
Li, J., Yao, W., Zhang, Y., et al.: Flexible and fine-grained attribute-based data storage in cloud computing. IEEE Trans. Serv. Comput. 10(5), 785–796 (2016)
Li, J., Yao, W., Han, J., et al.: User collusion avoidance CP-ABE with efficient attribute revocation for cloud storage. IEEE Syst. J. 12(2), 1767–1777 (2017)
Li, J., Shi, Y., Zhang, Y.: Searchable ciphertext-policy attribute-based encryption with revocation in cloud storage. Int. J. Commun Syst 30(1), e2942 (2017)
Wang, H., Zheng, Z., Wu, L., et al.: New directly revocable attribute-based encryption scheme and its application in cloud storage environment. Clust. Comput. 20(3), 2385–2392 (2017)
Zhang, R., Hui, L., Yiu, S., et al.: A traceable outsourcing cp-abe scheme with attribute revocation. IEEE Trustcom/BigDataSE/ICESS IEEE 2017, 363–370 (2017)
Hur, J., Noh, D.K.: Attribute-based access control with efficient revocation in data outsourcing systems. IEEE Trans. Parallel Distrib. Syst. 22(7), 1214–1221 (2010)
Islam, M.A., Madria, S.: Attribute-based encryption scheme for secure multi-group data sharing in cloud. IEEE Trans. Serv. Comput. (2020). https://doi.org/10.1109/TSC.2020.3038836
Gennaro, R., Jarecki, S., Krawczyk, H., et al.: Secure distributed key generation for discrete-log based cryptosystems. In: International Conference on the Theory and Applications of Cryptographic Techniques, pp. 295–310. Springer, Berlin (1999)
Acknowledgements
This work was supported by National Natural Science Foundation of China (No. 61772001).
Author information
Authors and Affiliations
Contributions
ZW: Conceptualization, Methodology, Formal analysis, Visualization, Writing—Original Draft, Writing—Review & Editing. RS: Conceptualization, Methodology, Writing—Review & Editing. KL: Writing – Review, Software, Visualization. YY: Software, Visualization.
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.
Research involving human and animal participants
The conducted research did not include humans or animal participants.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Wu, Z., Shi, Rh., Li, K. et al. Attribute-based data access control scheme with secure revocation in fog computing for smart grid. Cluster Comput 25, 3899–3913 (2022). https://doi.org/10.1007/s10586-022-03616-0
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10586-022-03616-0