Skip to main content
Log in

Attribute-based data access control scheme with secure revocation in fog computing for smart grid

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

Smart grid requires sharing sensitive data to external researchers. Attribute encryption is a common technique used in data sharing. Unfortunately, existing revocation mechanisms do not consider the following two issues. One is that the revoked user may save intermediate values computed in the past to illegally decrypt the updated cipher text. The other is that the update parameters of keys can be leaked to the revoked user, which leads to revocation failure. To address the above issues, we propose a verifiable outsourcing decryption and data sharing scheme, in which we introduce version parameters of ciphertexts and keys, and associate the update parameters of keys with each user to achieve security-enhanced revocation. In addition, a formal security proof is given under the DBDH assumption. Finally, we evaluate the performance of the scheme and the results show that the proposed scheme is more effective than current schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

Data availability

The authors state the data availability in this manuscript.

Code availability

Not applicable.

References

  1. Boucenna, F., Nouali, O., Kechid, S., et al.: Secure inverted index based search over encrypted cloud data with user access rights management. J. Comput. Sci. Technol. 34(1), 133–154 (2019)

    Article  Google Scholar 

  2. Bao-Kun, Z., Lie-Huang, Z., Shen, M., et al.: Scalable and privacy-preserving data sharing based on blockchain. J. Comput. Sci. Technol. 33(3), 557–567 (2018)

    Article  MathSciNet  Google Scholar 

  3. Leng, J., Zhou, M., Zhao, J.L., et al.: Blockchain security: a survey of techniques and research directions. IEEE Trans. Serv. Comput. (2020). https://doi.org/10.1109/TSC.2020.3038641

    Article  Google Scholar 

  4. Leng, J., Ruan, G., Jiang, P., et al.: Blockchain-empowered sustainable manufacturing and product lifecycle management in industry 4.0: a survey. Renew. Sustain. Energy Rev. 132, 110112–110119 (2020)

    Article  Google Scholar 

  5. Leng, J., Ye, S., Zhou, M., et al.: Blockchain-secured smart manufacturing in industry 4.0: A survey. IEEE Trans. Syst. Man Cybern. 51(1), 237–252 (2020)

    Article  Google Scholar 

  6. Leng, J., Jiang, P., Xu, K., et al.: Makerchain: A blockchain with chemical signature for self-organizing process in social manufacturing. J. Clean. Prod. 234, 767–778 (2019)

    Article  Google Scholar 

  7. Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Annual international conference on the theory and applications of cryptographic techniques, pp. 457–473. Springer, Berlin (2005)

    Google Scholar 

  8. Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. IEEE symposium on security and privacy (SP’07) IEEE 2007, 321–334 (2007)

    Article  Google Scholar 

  9. Goyal, V., Pandey, O., Sahai, A., et al.: Attribute-based encryption for fine-grained access control of encrypted data. Proceedings of the 13th ACM Conference on Computer and Communications Security. 2006, pp. 89–98

  10. Chase, M., Chow, S.S.M.: Improving privacy and security in multi-authority attribute-based encryption. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, 2009, pp. 121–130

  11. Green, M., Hohenberger, S., Waters, B.: Outsourcing the decryption of abe ciphertexts. USENIX security symposium, 2011, 3

  12. Qin, B., Deng, R.H., Liu, S., et al.: Attribute-based encryption with efficient verifiable outsourced decryption. IEEE Trans. Inf. Forensics Secur. 10(7), 1384–1393 (2015)

    Article  Google Scholar 

  13. Liu, J.K., Au, M.H., Huang, X., et al.: Fine-grained two-factor access control for web-based cloud computing services. IEEE Trans. Inf. Forensics Secur. 11(3), 484–497 (2015)

    Article  Google Scholar 

  14. Li, J., Lin, X., Zhang, Y., et al.: KSF-OABE: Outsourced attribute-based encryption with keyword search function for cloud storage. IEEE Trans. Serv. Comput. 10(5), 715–725 (2016)

    Article  Google Scholar 

  15. Li, J., Wang, Y., Zhang, Y., et al.: Full verifiability for outsourced decryption in attribute based encryption. IEEE Trans. Serv. Comput. 13(3), 478–487 (2017)

    Article  Google Scholar 

  16. Li, J., Sha, F., Zhang, Y., et al.: Verifiable outsourced decryption of attribute-based encryption with constant ciphertext length. In: Security and Communication Networks, 2017, 2017

  17. Fan, K., Xu, H., Gao, L., et al.: Efficient and privacy preserving access control scheme for fog-enabled IoT. Futur. Gener. Comput. Syst. 99, 134–142 (2019)

    Article  Google Scholar 

  18. Zhong, H., Zhou, Y., Zhang, Q., et al.: An efficient and outsourcing-supported attribute-based access control scheme for edge-enabled smart healthcare. Futur. Gener. Comput. Syst. 115, 486–496 (2021)

    Article  Google Scholar 

  19. Li, W.M., Li, X.L., Wen, Q.Y., et al.: Flexible CP-ABE based access control on encrypted data for mobile users in hybrid cloud system. J. Comput. Sci. Technol. 32(5), 974–990 (2017)

    Article  MathSciNet  Google Scholar 

  20. Ostrovsky, R., Sahai, A., Waters, B.: Attribute-based encryption with non-monotonic access structures. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, 2007, pp. 195–203

  21. Sahai, A., Seyalioglu, H., Waters, B.: Dynamic credentials and ciphertext delegation for attribute-based encryption. In: Annual Cryptology Conference, pp. 199–217. Springer, Berlin (2012)

    Google Scholar 

  22. Liu, Q., Wang, G., Wu, J.: Time-based proxy re-encryption scheme for secure data sharing in a cloud environment. Inf. Sci. 258, 355–370 (2014)

    Article  Google Scholar 

  23. Jahid, S., Borisov, N.: Piratte: Proxy-based immediate revocation of attribute-based encryption. arXiv preprint arXiv:1208.4877, 2012

  24. Hur, J.: Improving security and efficiency in attribute-based data sharing. IEEE Trans. Knowl. Data Eng. 25(10), 2271–2282 (2011)

    Article  Google Scholar 

  25. Yu, G., Ma, X., Cao, Z., et al.: Server-aided directly revocable ciphertext-policy attribute-based encryption with verifiable delegation. In: International Conference on Information and Communications Security, pp. 172–179. Springer, Cham (2017)

    Google Scholar 

  26. Qin, B., Zhao, Q., Zheng, D., et al.: (Dual) server-aided revocable attribute-based encryption with decryption key exposure resistance. Inf. Sci. 490, 74–92 (2019)

    Article  MATH  Google Scholar 

  27. Xiong, H., Zhao, Y., Peng, L., et al.: Partially policy-hidden attribute-based broadcast encryption with secure delegation in edge computing. Futur. Gener. Comput. Syst. 97, 453–461 (2019)

    Article  Google Scholar 

  28. Cui, H., Hon Yuen, T., Deng, R.H., et al.: Server-aided revocable attribute-based encryption for cloud computing services. Concurr. Comput. 32(14), e5680 (2020)

    Article  Google Scholar 

  29. Ning, J., Cao, Z., Dong, X., et al.: CryptCloud +: secure and expressive data access control for cloud storage. IEEE Trans. Serv. Comput. 14(1), 111–124 (2018)

    Google Scholar 

  30. Li, J., Yao, W., Zhang, Y., et al.: Flexible and fine-grained attribute-based data storage in cloud computing. IEEE Trans. Serv. Comput. 10(5), 785–796 (2016)

    Article  Google Scholar 

  31. Li, J., Yao, W., Han, J., et al.: User collusion avoidance CP-ABE with efficient attribute revocation for cloud storage. IEEE Syst. J. 12(2), 1767–1777 (2017)

    Article  Google Scholar 

  32. Li, J., Shi, Y., Zhang, Y.: Searchable ciphertext-policy attribute-based encryption with revocation in cloud storage. Int. J. Commun Syst 30(1), e2942 (2017)

    Article  Google Scholar 

  33. Wang, H., Zheng, Z., Wu, L., et al.: New directly revocable attribute-based encryption scheme and its application in cloud storage environment. Clust. Comput. 20(3), 2385–2392 (2017)

    Article  Google Scholar 

  34. Zhang, R., Hui, L., Yiu, S., et al.: A traceable outsourcing cp-abe scheme with attribute revocation. IEEE Trustcom/BigDataSE/ICESS IEEE 2017, 363–370 (2017)

    Article  Google Scholar 

  35. Hur, J., Noh, D.K.: Attribute-based access control with efficient revocation in data outsourcing systems. IEEE Trans. Parallel Distrib. Syst. 22(7), 1214–1221 (2010)

    Article  Google Scholar 

  36. Islam, M.A., Madria, S.: Attribute-based encryption scheme for secure multi-group data sharing in cloud. IEEE Trans. Serv. Comput. (2020). https://doi.org/10.1109/TSC.2020.3038836

    Article  Google Scholar 

  37. Gennaro, R., Jarecki, S., Krawczyk, H., et al.: Secure distributed key generation for discrete-log based cryptosystems. In: International Conference on the Theory and Applications of Cryptographic Techniques, pp. 295–310. Springer, Berlin (1999)

    Google Scholar 

Download references

Acknowledgements

This work was supported by National Natural Science Foundation of China (No. 61772001).

Author information

Authors and Affiliations

Authors

Contributions

ZW: Conceptualization, Methodology, Formal analysis, Visualization, Writing—Original Draft, Writing—Review & Editing. RS: Conceptualization, Methodology, Writing—Review & Editing. KL: Writing – Review, Software, Visualization. YY: Software, Visualization.

Corresponding author

Correspondence to Run-hua Shi.

Ethics declarations

Conflict of interest

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

Research involving human and animal participants

The conducted research did not include humans or animal participants.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wu, Z., Shi, Rh., Li, K. et al. Attribute-based data access control scheme with secure revocation in fog computing for smart grid. Cluster Comput 25, 3899–3913 (2022). https://doi.org/10.1007/s10586-022-03616-0

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-022-03616-0

Keywords

Navigation