A Combination of Attribute-Based Encryption and Blockchain Access Control Scheme in Smart Home Environment
DOI:
https://doi.org/10.62051/ijcsit.v4n1.37Keywords:
Smart home, Attribute-based encryption, Access control, BlockchainAbstract
In response to the problems of excessive decryption computation burden on users, inability to protect users' privacy information, and the inability of traditional cloud storage methods to meet users' faster file upload and download speed requirements and track malicious users, this paper proposes an attribute-based encryption and blockchain-based trusted data access control scheme for smart home environments. The scheme combines symmetric encryption algorithms and attribute-based encryption algorithms to achieve fine-grained access control of data. At the same time, it leverages edge computing technology to outsource most of the decryption and computation operations to edge computing nodes, reducing the user's decryption and computation burden. Furthermore, the introduction of blockchain technology enables the monitoring and auditing of users within the system, achieving full traceability of access control. Finally, the proposed scheme was analyzed and validated through simulation experiments, which showed that the scheme is safe and effective, protecting users' security and privacy, and enabling secure data sharing.
Downloads
References
[1] RICQUEBOURG V, MENGA D, DURAND D, et al. The Smart Home Concept: Our Immediate Future[C]//IEEE. 2006 1ST IEEE International Conference on E-Learning in Industrial Electronics, December 18-20, 2006, Hammamet, Tunisia. New York: IEEE, 2007: 23-28.
[2] HAN D M, LIM J H, et al. Design and Implementation of Smart Home Energy Management Systems Based on Zigbee [J]. IEEE Transactions on Consumer Electronics, 2010(3): 1417-1425.
[3] STOJKOSKA B L R, TRIVODALIEY K V, et al. A Review of Internet of Things for Smart Home: Challenges and Solutions [J]. Journal of Cleaner Production, 2017, 140(3): 1454-1464.
[4] DORRI A, KANHERE SS, JURDAK R, et al. Blockchain for IoT Security and Privacy: The Case Study of a Smart Home[C]//IEEE. 2017 IEEE International Conference on Pervasive Computing and Communications Workshops, March 13-17,2017, Kona, HI, USA. New Yark: IEEE, 2017: 618-623.
[5] FERNANDES E, JUNG J, PRAKASH A, et al. Security Analysis of Emerging Smart Home Applications[C]//IEEE. 2016 IEEE Symposium on Security and Privacy (SP), May 22-26, 2016, San Jose, CA, USA. New Yark: IEEE, 2016: 636-654.
[6] BOTTICELLI M, MORETTI F, PIZZUTI S, et al. Challenges and Opportunities of Blockchain Technology in The Energy Sector[C]//IEEE. 2020 AEIT International Annual Conference (AEIT), September 23-25, 2020, Catania, Italy. New Yark: IEEE, 2020: 1-6.
[7] SHAO Qifeng, JIN Cheqing, ZHANG Shao, et al. Blockchain Technology: Architecture and Progress [J]. Journal of Computer Science, 2018, 41(5): 969-988.
[8] SAHAI A, WATERS B. Fuzzy Identity-Based Encryption[C]//Springer. Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques, May 22-26, 2005, Aarhus, Denmark. Berlin Heidelberg: Springer, 2005: 457-473.
[9] GOYAL V, PANDEY O, SAHAI A, et al. Attribute-based encryption for fine-grained access control of encrypted data[C]//ACM. Proceedings of the 13th ACM Conference on Computer and Communications Security, November 1-3, 2006, Alexandria, VA, USA. New Yark: ACM, 2005: 89-98.
[10] BETHENCOURT J, SAHAI A, WATERS B. Ciphertext-Policy Attribute-Based Encryption[C]//IEEE. 2007 IEEE Symposium on Security and Privacy (SP '07), May 20-23, 2007, Berkeley, CA, USA. New Yark: IEEE, 2007: 321-334.
[11] LI Wei, XUE Kaiping, et al. TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage [J]. IEEE, 2016, 27(5): 1484-1496.
[12] SINGH P, RAMAN B, AGARWAL N, et al. Secure Cloud-Based Image Tampering Detection and Localization Using POB Number System [J]. ACM Transactions on Multimedia Computing Communications and Applications, 2017, 13(3): 1-23.
[13] GE Chunpeng, LIU Zhe, FANG Liming. A blockchain based decentralized data security mechanism for the Internet of Things [J]. Journal of Parallel and Distributed Computing, 2020, 141(7): 1-9.
[14] WATERS B. Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization [J]. Springer, 2011: 53-70.
[15] ZHANG Yinghui, ZHENG Dong, DENG R H. Security and Privacy in Smart Health: Efficient Policy-Hiding Attribute-Based Access Control [J]. IEEE, 2018, 5(3): 2130-2145.
[16] LIU Zhenhua, XU Jing, LIU Yan, et al. Updatable Ciphertext-Policy Attribute-Based Encryption Scheme with Traceability and Revocability [J]. IEEE Access, 2019, 7: 66832-66844.
[17] LAI Junzuo, DENG R H, GUAN Chaowen, et al. Attribute-Based Encryption with Verifiable Outsourced Decryption [J]. IEEE, 2013, 8(8): 1343-1354.
[18] LAI Junzuo, DENG R H, LI Yingjiu. Expressive CP-ABE with partially hidden access structures[C]// ACM. 7th ACM Symposium on Information, Computer and Communications Security (ASIACCS), May 2-4, 2012, Seoul, Korea. New Yark: ACM, 2012.
[19] LI Jin, ZHANG Yinghui, CHEN Xiaofeng, et al. Secure attribute-based data sharing for resource-limited users in cloud computing [J]. Computers & Security, 2018, 72: 1-12.
[20] ZHENG Qingji, XU Shouhuai, ATENIESE G. VABKS: Verifiable attribute-based keyword search over outsourced encrypted data[C]//IEEE. IEEE INFOCOM 2014 - IEEE Conference on Computer Communications, April 27, 2014-May 2, 2014, Toronto, ON, Canada. New Yark: IEEE, 2014: 522-530.
[21] LI Jiguo, YAO Wei, HAN Jinguang, et al. User Collusion Avoidance CP-ABE With Efficient Attribute Revocation for Cloud Storage [J]. IEEE Systems Journal, 2018, 12(2): 1767-1777.
[22] LI Jiguo, LIN Xiaonan, ZHANG Yichen, et al. KSF-OABE: Outsourced Attribute-Based Encryption with Keyword Search Function for Cloud Storage [J]. IEEE, 2017, 10(5): 715-725.
[23] MIAO Yinbin, MA Jianfeng, Liu Ximeng, et al. Lightweight Fine-Grained Search Over Encrypted Data in Fog Computing [J]. IEEE, 2019, 12(5): 772-785.
[24] XU Shengmin, NING Jianting, LI Yingjiu, et al. Match in My Way: Fine-Grained Bilateral Access Control for Secure Cloud-Fog Computing [J]. IEEE, 2022, 19(2): 1064-1077.
[25] ZUO Cong, SHAO Jun, et al. CCA-secure ABE with outsourced decryption for fog computing [J]. Future Generation Computer Systems-The International Journal of eScience, 2018, 78: 730-738.
[26] WANG Hao, SONG Yujiao. Secure Cloud-Based EHR System Using Attribute-Based Cryptosystem and Blockchain [J]. Journal of Medical Systems, 2018, 42(8): 152.
[27] DING Sheng, CAO Jin, LI Chen, et al. A Novel Attribute-Based Access Control Scheme Using Blockchain for IoT [J]. IEEE Access, 2019, 7: 38431-38441.
[28] ZHANG Guochao, WANG Ruijin. Blockchain shard storage model based on threshold secret sharing [J]. Journal of Computer Applications, 2019, 39(9): 2617-2622.
[29] GUORui, SHI Huixian, ZHAO Qinglan, et al. Secure Attribute-Based Signature Scheme with Multiple Authorities for Blockchain in Electronic Health Records Systems [J]. IEEE Access, 2018, 6: 11676-11686.
[30] SETHI K, PRADHAN A, BERA P. PMTER-ABE: a practical multi-authority CP-ABE with traceability, revocation and outsourcing decryption for secure access control in cloud systems [J]. Cluster Computing-The Journal of Networks Software Tools and Applications, 2021, 24(2): 1525-1550.
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.







