A Novel Hierarchical Key Assignment Scheme for Data Access Control in IoT

Hierarchical key assignment scheme is an efficient cryptographic method for hierarchical access control, in which the encryption keys of lower classes can be derived by the higher classes. Such a property is an effective way to ensure the access control security of Internet of Things data markets. H...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Security and communication networks 2021-12, Vol.2021, p.1-12
Hauptverfasser: Li, Xiaoyu, Ye, Min, Chen, Jiahui, Chen, Jianhui, Chen, Yeh-Cheng
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 12
container_issue
container_start_page 1
container_title Security and communication networks
container_volume 2021
creator Li, Xiaoyu
Ye, Min
Chen, Jiahui
Chen, Jianhui
Chen, Yeh-Cheng
description Hierarchical key assignment scheme is an efficient cryptographic method for hierarchical access control, in which the encryption keys of lower classes can be derived by the higher classes. Such a property is an effective way to ensure the access control security of Internet of Things data markets. However, many researchers on this field cannot avoid potential single point of failure in key distribution, and some key assignment schemes are insecure against collusive attack or sibling attack or collaborative attack. In this paper, we propose a hierarchical key assignment scheme based on multilinear map to solve the multigroup access control in Internet of Things data markets. Compared with previous hierarchical key assignment schemes, our scheme can avoid potential single point of failure in key distribution. Also the central authority of our scheme (corresponding to the data owner in IoT data markets) does not need to assign the corresponding encryption keys to each user directly, and users in each class can obtain the encryption key via only a one-round key agreement protocol. We then show that our scheme satisfies the security of key indistinguishability under decisional multilinear Diffie-Hellman assumption. Finally, comparisons show the efficiency of our scheme and indicates that our proposed scheme can not only resist the potential attacks, but also guarantee the forward and backward security.
doi_str_mv 10.1155/2021/6174506
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2611359979</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2611359979</sourcerecordid><originalsourceid>FETCH-LOGICAL-c337t-90c98174000d7e08ec3819375f66474bc8555a35c852055ad48a4f8e06b09b963</originalsourceid><addsrcrecordid>eNp9kD1PwzAURS0EEqWw8QMsMULocxw78RiVj1ZUMFBmy3Ec4iqNi52C-u9x1YqR6d7h6L2ji9A1gXtCGJukkJIJJ3nGgJ-gERFUJEDS9PSvk-wcXYSwAuAky7MRmpf41X2bDs-s8crr1mrV4Rezw2UI9rNfm37A77o1a4Mb5_GDGhQutTYh4KnrB-86bHs8d8tLdNaoLpirY47Rx9PjcjpLFm_P82m5SDSl-ZAI0KKIigBQ5wYKo2kR5XLWcB6NKl0wxhRlMVOIrc4KlTWFAV6BqASnY3RzuLvx7mtrwiBXbuv7-FKmnBDKhMhFpO4OlPYuBG8aufF2rfxOEpD7seR-LHkcK-K3B7y1fa1-7P_0L9C4ZY4</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2611359979</pqid></control><display><type>article</type><title>A Novel Hierarchical Key Assignment Scheme for Data Access Control in IoT</title><source>EZB-FREE-00999 freely available EZB journals</source><source>Wiley Online Library (Open Access Collection)</source><source>Alma/SFX Local Collection</source><creator>Li, Xiaoyu ; Ye, Min ; Chen, Jiahui ; Chen, Jianhui ; Chen, Yeh-Cheng</creator><contributor>Xue, Xingsi ; Xingsi Xue</contributor><creatorcontrib>Li, Xiaoyu ; Ye, Min ; Chen, Jiahui ; Chen, Jianhui ; Chen, Yeh-Cheng ; Xue, Xingsi ; Xingsi Xue</creatorcontrib><description>Hierarchical key assignment scheme is an efficient cryptographic method for hierarchical access control, in which the encryption keys of lower classes can be derived by the higher classes. Such a property is an effective way to ensure the access control security of Internet of Things data markets. However, many researchers on this field cannot avoid potential single point of failure in key distribution, and some key assignment schemes are insecure against collusive attack or sibling attack or collaborative attack. In this paper, we propose a hierarchical key assignment scheme based on multilinear map to solve the multigroup access control in Internet of Things data markets. Compared with previous hierarchical key assignment schemes, our scheme can avoid potential single point of failure in key distribution. Also the central authority of our scheme (corresponding to the data owner in IoT data markets) does not need to assign the corresponding encryption keys to each user directly, and users in each class can obtain the encryption key via only a one-round key agreement protocol. We then show that our scheme satisfies the security of key indistinguishability under decisional multilinear Diffie-Hellman assumption. Finally, comparisons show the efficiency of our scheme and indicates that our proposed scheme can not only resist the potential attacks, but also guarantee the forward and backward security.</description><identifier>ISSN: 1939-0114</identifier><identifier>EISSN: 1939-0122</identifier><identifier>DOI: 10.1155/2021/6174506</identifier><language>eng</language><publisher>London: Hindawi</publisher><subject>Access control ; Collaboration ; Confidentiality ; Cryptography ; Cybersecurity ; Information sharing ; Internet of Things ; Protocol ; Security management ; Sensors ; User groups ; User needs</subject><ispartof>Security and communication networks, 2021-12, Vol.2021, p.1-12</ispartof><rights>Copyright © 2021 Xiaoyu Li et al.</rights><rights>Copyright © 2021 Xiaoyu Li et al. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c337t-90c98174000d7e08ec3819375f66474bc8555a35c852055ad48a4f8e06b09b963</citedby><cites>FETCH-LOGICAL-c337t-90c98174000d7e08ec3819375f66474bc8555a35c852055ad48a4f8e06b09b963</cites><orcidid>0000-0002-0561-2028 ; 0000-0001-7128-9778</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27924,27925</link.rule.ids></links><search><contributor>Xue, Xingsi</contributor><contributor>Xingsi Xue</contributor><creatorcontrib>Li, Xiaoyu</creatorcontrib><creatorcontrib>Ye, Min</creatorcontrib><creatorcontrib>Chen, Jiahui</creatorcontrib><creatorcontrib>Chen, Jianhui</creatorcontrib><creatorcontrib>Chen, Yeh-Cheng</creatorcontrib><title>A Novel Hierarchical Key Assignment Scheme for Data Access Control in IoT</title><title>Security and communication networks</title><description>Hierarchical key assignment scheme is an efficient cryptographic method for hierarchical access control, in which the encryption keys of lower classes can be derived by the higher classes. Such a property is an effective way to ensure the access control security of Internet of Things data markets. However, many researchers on this field cannot avoid potential single point of failure in key distribution, and some key assignment schemes are insecure against collusive attack or sibling attack or collaborative attack. In this paper, we propose a hierarchical key assignment scheme based on multilinear map to solve the multigroup access control in Internet of Things data markets. Compared with previous hierarchical key assignment schemes, our scheme can avoid potential single point of failure in key distribution. Also the central authority of our scheme (corresponding to the data owner in IoT data markets) does not need to assign the corresponding encryption keys to each user directly, and users in each class can obtain the encryption key via only a one-round key agreement protocol. We then show that our scheme satisfies the security of key indistinguishability under decisional multilinear Diffie-Hellman assumption. Finally, comparisons show the efficiency of our scheme and indicates that our proposed scheme can not only resist the potential attacks, but also guarantee the forward and backward security.</description><subject>Access control</subject><subject>Collaboration</subject><subject>Confidentiality</subject><subject>Cryptography</subject><subject>Cybersecurity</subject><subject>Information sharing</subject><subject>Internet of Things</subject><subject>Protocol</subject><subject>Security management</subject><subject>Sensors</subject><subject>User groups</subject><subject>User needs</subject><issn>1939-0114</issn><issn>1939-0122</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><sourceid>RHX</sourceid><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNp9kD1PwzAURS0EEqWw8QMsMULocxw78RiVj1ZUMFBmy3Ec4iqNi52C-u9x1YqR6d7h6L2ji9A1gXtCGJukkJIJJ3nGgJ-gERFUJEDS9PSvk-wcXYSwAuAky7MRmpf41X2bDs-s8crr1mrV4Rezw2UI9rNfm37A77o1a4Mb5_GDGhQutTYh4KnrB-86bHs8d8tLdNaoLpirY47Rx9PjcjpLFm_P82m5SDSl-ZAI0KKIigBQ5wYKo2kR5XLWcB6NKl0wxhRlMVOIrc4KlTWFAV6BqASnY3RzuLvx7mtrwiBXbuv7-FKmnBDKhMhFpO4OlPYuBG8aufF2rfxOEpD7seR-LHkcK-K3B7y1fa1-7P_0L9C4ZY4</recordid><startdate>20211206</startdate><enddate>20211206</enddate><creator>Li, Xiaoyu</creator><creator>Ye, Min</creator><creator>Chen, Jiahui</creator><creator>Chen, Jianhui</creator><creator>Chen, Yeh-Cheng</creator><general>Hindawi</general><general>Hindawi Limited</general><scope>RHU</scope><scope>RHW</scope><scope>RHX</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><orcidid>https://orcid.org/0000-0002-0561-2028</orcidid><orcidid>https://orcid.org/0000-0001-7128-9778</orcidid></search><sort><creationdate>20211206</creationdate><title>A Novel Hierarchical Key Assignment Scheme for Data Access Control in IoT</title><author>Li, Xiaoyu ; Ye, Min ; Chen, Jiahui ; Chen, Jianhui ; Chen, Yeh-Cheng</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c337t-90c98174000d7e08ec3819375f66474bc8555a35c852055ad48a4f8e06b09b963</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Access control</topic><topic>Collaboration</topic><topic>Confidentiality</topic><topic>Cryptography</topic><topic>Cybersecurity</topic><topic>Information sharing</topic><topic>Internet of Things</topic><topic>Protocol</topic><topic>Security management</topic><topic>Sensors</topic><topic>User groups</topic><topic>User needs</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Li, Xiaoyu</creatorcontrib><creatorcontrib>Ye, Min</creatorcontrib><creatorcontrib>Chen, Jiahui</creatorcontrib><creatorcontrib>Chen, Jianhui</creatorcontrib><creatorcontrib>Chen, Yeh-Cheng</creatorcontrib><collection>Hindawi Publishing Complete</collection><collection>Hindawi Publishing Subscription Journals</collection><collection>Hindawi Publishing Open Access Journals</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><jtitle>Security and communication networks</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Li, Xiaoyu</au><au>Ye, Min</au><au>Chen, Jiahui</au><au>Chen, Jianhui</au><au>Chen, Yeh-Cheng</au><au>Xue, Xingsi</au><au>Xingsi Xue</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Novel Hierarchical Key Assignment Scheme for Data Access Control in IoT</atitle><jtitle>Security and communication networks</jtitle><date>2021-12-06</date><risdate>2021</risdate><volume>2021</volume><spage>1</spage><epage>12</epage><pages>1-12</pages><issn>1939-0114</issn><eissn>1939-0122</eissn><abstract>Hierarchical key assignment scheme is an efficient cryptographic method for hierarchical access control, in which the encryption keys of lower classes can be derived by the higher classes. Such a property is an effective way to ensure the access control security of Internet of Things data markets. However, many researchers on this field cannot avoid potential single point of failure in key distribution, and some key assignment schemes are insecure against collusive attack or sibling attack or collaborative attack. In this paper, we propose a hierarchical key assignment scheme based on multilinear map to solve the multigroup access control in Internet of Things data markets. Compared with previous hierarchical key assignment schemes, our scheme can avoid potential single point of failure in key distribution. Also the central authority of our scheme (corresponding to the data owner in IoT data markets) does not need to assign the corresponding encryption keys to each user directly, and users in each class can obtain the encryption key via only a one-round key agreement protocol. We then show that our scheme satisfies the security of key indistinguishability under decisional multilinear Diffie-Hellman assumption. Finally, comparisons show the efficiency of our scheme and indicates that our proposed scheme can not only resist the potential attacks, but also guarantee the forward and backward security.</abstract><cop>London</cop><pub>Hindawi</pub><doi>10.1155/2021/6174506</doi><tpages>12</tpages><orcidid>https://orcid.org/0000-0002-0561-2028</orcidid><orcidid>https://orcid.org/0000-0001-7128-9778</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1939-0114
ispartof Security and communication networks, 2021-12, Vol.2021, p.1-12
issn 1939-0114
1939-0122
language eng
recordid cdi_proquest_journals_2611359979
source EZB-FREE-00999 freely available EZB journals; Wiley Online Library (Open Access Collection); Alma/SFX Local Collection
subjects Access control
Collaboration
Confidentiality
Cryptography
Cybersecurity
Information sharing
Internet of Things
Protocol
Security management
Sensors
User groups
User needs
title A Novel Hierarchical Key Assignment Scheme for Data Access Control in IoT
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-27T10%3A13%3A12IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Novel%20Hierarchical%20Key%20Assignment%20Scheme%20for%20Data%20Access%20Control%20in%20IoT&rft.jtitle=Security%20and%20communication%20networks&rft.au=Li,%20Xiaoyu&rft.date=2021-12-06&rft.volume=2021&rft.spage=1&rft.epage=12&rft.pages=1-12&rft.issn=1939-0114&rft.eissn=1939-0122&rft_id=info:doi/10.1155/2021/6174506&rft_dat=%3Cproquest_cross%3E2611359979%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2611359979&rft_id=info:pmid/&rfr_iscdi=true