skip to main content
10.1145/3559795.3559801acmotherconferencesArticle/Chapter ViewAbstractPublication PagesbiotcConference Proceedingsconference-collections
research-article

A Trustworthy Ciphertext-Policy Attribute-Based Encryption Access Control Method Based on FAME and Blockchain

Published: 29 October 2022 Publication History

Abstract

Ciphertext-policy attribute-based encryption (CP-ABE) has been extensively applied in various types of conditional access control systems since its introduction because of its ability to provide fine-grained and flexible access control to confidential data, thus offering a safe and effective data sharing environment. However, while developing rapidly, the existing CP-ABE access schemes also face some problems, such as trustworthiness issues involving third-party intermediary entities, secret key management problems brought by single attribute authorization centers, and privacy leakage of attributes. How to achieve safe and effective decentralized access control has been a problem to be explored and solved. In this paper, a trustworthy, secure, and efficient ABE(TSE ABE) based on blockchain and fast attribute-based message encryption (FAME) is proposed by us. First, we combine blockchain and FAME and optimize them to make CP-ABE perform better. Second, we implement a trusted authorization model with multiple entities based on the BLS signature and smart contracts to address key privacy issues. Finally, we protect the privacy of attributes in the authorization matching process by RSA encryption algorithm. Through the experimental results, it can be found that the scheme not only has good security and execution performance but also achieves effective protection of user privacy.

References

[1]
Sahai A, Waters B . Fuzzy identity-based encryption[C]// Advances in Cryptoloty-EUROCRYPT 2005. 2005.
[2]
Goyal V, Pandey O, Sahai A, Attribute-based encryption for fine-grained access control of encrypted data[J]. ACM, 2006.
[3]
Suqing L . Verifiable outsourced attribute-based encryption with access update[J]. Chinese Journal of Network and Information Security, 2016.
[4]
Goyal V, Pandey O, Sahai A, Attribute-based encryption for fine-grained access control of encrypted data[J]. ACM, 2006.
[5]
Bethencourt J, Sahai A, Waters B . Ciphertext-Policy Attribute-Based Encryption[C]// IEEE Symposium on Security & Privacy. IEEE, 2007.
[6]
Zhang J, Xin Y, Gao Y, Secure ABE Scheme for Access Management in Blockchain-based IoT[J]. IEEE Access, 2021, PP(99):1-1.
[7]
Li H, Yi Y, Dai Y, Achieving Secure and Efficient Dynamic Searchable Symmetric Encryption over Medical Cloud Data[J]. IEEE Transactions on Cloud Computing, 2020, 8(2):484-494.
[8]
Li H, Liu D, Dai Y, Personalized Search Over Encrypted Data With Efficient and Secure Updates in Mobile Clouds[J]. IEEE Transactions on Emerging Topics in Computing, 2018, 6(99):97-109.
[9]
Miao Y, Ma J, Liu X, Lightweight Fine-Grained Search over Encrypted Data in Fog Computing[J]. IEEE Transactions on Services Computing, 2018:1-1.
[10]
Zhang, J., Chen, J., Meng, W. (2021). Efficient Attribute-Based Signature for Monotone Predicates. In: Huang, Q., Yu, Y. (eds) Provable and Practical Security. ProvSec 2021. Lecture Notes in Computer Science(), vol 13059.
[11]
Xu, G., Li, H., Dai, Y., Yang, K., & Lin, X. (2018). Enabling efficient and geometric range query with access control over encrypted spatial data. IEEE Transactions on Information Forensics and Security, 14(4), 870-885.
[12]
H. Ren, H. Li, Y . Dai, K. Y ang, and X. Lin, “Querying in internet of things with privacy preserving: Challenges, solutions, and opportunities,”IEEE Netw., vol. 32, no. 6, pp. 144–151, Nov./Dec. 2018.
[13]
S. Wang, Y . Zhang, and Y . Zhang, “A blockchain-based framework for data sharing with fine-grained access control in decentralized storage systems,”IEEE Access, vol. 6, pp. 38437–38450, 2018.
[14]
D. Di Francesco Maesa, P . Mori, and L. Ricci, “A blockchain based approach for the definition of auditable access control systems,” Comput.Secur ., vol. 84, pp. 93–119, 2019.
[15]
R. Li, T. Song, B. Mei, H. Li, X. Cheng, and L. Sun, “Blockchain for large-scale internet of things data storage and protection,” IEEE Trans. Services Comput., vol. 12, no. 5, pp. 762–771, 1 Sep./Oct. 2019.
[16]
A. Dorri, S. S. Kanhere, R. Jurdak, and P . Gauravaram, “Blockchain for IoT security and privacy: The case study of a smart home,” in Proc. IEEE Int. Conf. Pervasive Comput. Commun. Workshops, 2017, pp. 618–623.
[17]
S. Ding, J. Cao, C. Li, K. Fan, and H. Li, “A novel attribute-based access control scheme using blockchain for IoT, ”IEEE Access, vol. 7, pp. 38431–38441, 2019.
[18]
Agrawal, S., & Chase, M. (2017, October). FAME: fast attribute-based message encryption. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (pp. 665-682).
[19]
B. Dan, B. Lynn, and H. Shacham, “Short signatures from thWeilil pairing,” Springer, Berlin, Heidelberg, 2001.
[20]
Gao, S., Piao, G., Zhu, J., Ma, X., & Ma, J. (2020). Trustaccess: A trustworthy secure ciphertext-policy and attribute hiding access control scheme based on blockchain. IEEE Transactions on Vehicular Technology, 69(6), 5784-5798
[21]
Waters. Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization. In D. Catalano, N. Fazio, R. Gennaro, and A. Nicolosi, editors,PKC 2011, volume 6571 of LNCS, pages 53–70. Springer, Heidelberg, Mar. 2011.

Cited By

View all
  • (2023)DKSM: A Decentralized Kerberos Secure Service-Management Protocol for Internet of ThingsInternet of Things10.1016/j.iot.2023.10087123(100871)Online publication date: Oct-2023

Index Terms

  1. A Trustworthy Ciphertext-Policy Attribute-Based Encryption Access Control Method Based on FAME and Blockchain

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    BIOTC '22: Proceedings of the 2022 4th Blockchain and Internet of Things Conference
    July 2022
    143 pages
    ISBN:9781450396622
    DOI:10.1145/3559795
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 29 October 2022

    Permissions

    Request permissions for this article.

    Check for updates

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Funding Sources

    • Major Scientific and Technological Projects in Yunnan Province
    • Yunnan Key Laboratory of Blockchain Application Technology

    Conference

    BIOTC 2022

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)20
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 20 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)DKSM: A Decentralized Kerberos Secure Service-Management Protocol for Internet of ThingsInternet of Things10.1016/j.iot.2023.10087123(100871)Online publication date: Oct-2023

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format.

    HTML Format

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media