A Novel Hierarchical Key Assignment Scheme for Data Access Control in IoT
Hierarchical key assignment scheme is an efficient cryptographic method for hierarchical access control, in which the encryption keys of lower classes can be derived by the higher classes. Such a property is an effective way to ensure the access control security of Internet of Things data markets. H...
Gespeichert in:
Veröffentlicht in: | Security and communication networks 2021-12, Vol.2021, p.1-12 |
---|---|
Hauptverfasser: | , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 12 |
---|---|
container_issue | |
container_start_page | 1 |
container_title | Security and communication networks |
container_volume | 2021 |
creator | Li, Xiaoyu Ye, Min Chen, Jiahui Chen, Jianhui Chen, Yeh-Cheng |
description | Hierarchical key assignment scheme is an efficient cryptographic method for hierarchical access control, in which the encryption keys of lower classes can be derived by the higher classes. Such a property is an effective way to ensure the access control security of Internet of Things data markets. However, many researchers on this field cannot avoid potential single point of failure in key distribution, and some key assignment schemes are insecure against collusive attack or sibling attack or collaborative attack. In this paper, we propose a hierarchical key assignment scheme based on multilinear map to solve the multigroup access control in Internet of Things data markets. Compared with previous hierarchical key assignment schemes, our scheme can avoid potential single point of failure in key distribution. Also the central authority of our scheme (corresponding to the data owner in IoT data markets) does not need to assign the corresponding encryption keys to each user directly, and users in each class can obtain the encryption key via only a one-round key agreement protocol. We then show that our scheme satisfies the security of key indistinguishability under decisional multilinear Diffie-Hellman assumption. Finally, comparisons show the efficiency of our scheme and indicates that our proposed scheme can not only resist the potential attacks, but also guarantee the forward and backward security. |
doi_str_mv | 10.1155/2021/6174506 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2611359979</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2611359979</sourcerecordid><originalsourceid>FETCH-LOGICAL-c337t-90c98174000d7e08ec3819375f66474bc8555a35c852055ad48a4f8e06b09b963</originalsourceid><addsrcrecordid>eNp9kD1PwzAURS0EEqWw8QMsMULocxw78RiVj1ZUMFBmy3Ec4iqNi52C-u9x1YqR6d7h6L2ji9A1gXtCGJukkJIJJ3nGgJ-gERFUJEDS9PSvk-wcXYSwAuAky7MRmpf41X2bDs-s8crr1mrV4Rezw2UI9rNfm37A77o1a4Mb5_GDGhQutTYh4KnrB-86bHs8d8tLdNaoLpirY47Rx9PjcjpLFm_P82m5SDSl-ZAI0KKIigBQ5wYKo2kR5XLWcB6NKl0wxhRlMVOIrc4KlTWFAV6BqASnY3RzuLvx7mtrwiBXbuv7-FKmnBDKhMhFpO4OlPYuBG8aufF2rfxOEpD7seR-LHkcK-K3B7y1fa1-7P_0L9C4ZY4</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2611359979</pqid></control><display><type>article</type><title>A Novel Hierarchical Key Assignment Scheme for Data Access Control in IoT</title><source>EZB-FREE-00999 freely available EZB journals</source><source>Wiley Online Library (Open Access Collection)</source><source>Alma/SFX Local Collection</source><creator>Li, Xiaoyu ; Ye, Min ; Chen, Jiahui ; Chen, Jianhui ; Chen, Yeh-Cheng</creator><contributor>Xue, Xingsi ; Xingsi Xue</contributor><creatorcontrib>Li, Xiaoyu ; Ye, Min ; Chen, Jiahui ; Chen, Jianhui ; Chen, Yeh-Cheng ; Xue, Xingsi ; Xingsi Xue</creatorcontrib><description>Hierarchical key assignment scheme is an efficient cryptographic method for hierarchical access control, in which the encryption keys of lower classes can be derived by the higher classes. Such a property is an effective way to ensure the access control security of Internet of Things data markets. However, many researchers on this field cannot avoid potential single point of failure in key distribution, and some key assignment schemes are insecure against collusive attack or sibling attack or collaborative attack. In this paper, we propose a hierarchical key assignment scheme based on multilinear map to solve the multigroup access control in Internet of Things data markets. Compared with previous hierarchical key assignment schemes, our scheme can avoid potential single point of failure in key distribution. Also the central authority of our scheme (corresponding to the data owner in IoT data markets) does not need to assign the corresponding encryption keys to each user directly, and users in each class can obtain the encryption key via only a one-round key agreement protocol. We then show that our scheme satisfies the security of key indistinguishability under decisional multilinear Diffie-Hellman assumption. Finally, comparisons show the efficiency of our scheme and indicates that our proposed scheme can not only resist the potential attacks, but also guarantee the forward and backward security.</description><identifier>ISSN: 1939-0114</identifier><identifier>EISSN: 1939-0122</identifier><identifier>DOI: 10.1155/2021/6174506</identifier><language>eng</language><publisher>London: Hindawi</publisher><subject>Access control ; Collaboration ; Confidentiality ; Cryptography ; Cybersecurity ; Information sharing ; Internet of Things ; Protocol ; Security management ; Sensors ; User groups ; User needs</subject><ispartof>Security and communication networks, 2021-12, Vol.2021, p.1-12</ispartof><rights>Copyright © 2021 Xiaoyu Li et al.</rights><rights>Copyright © 2021 Xiaoyu Li et al. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c337t-90c98174000d7e08ec3819375f66474bc8555a35c852055ad48a4f8e06b09b963</citedby><cites>FETCH-LOGICAL-c337t-90c98174000d7e08ec3819375f66474bc8555a35c852055ad48a4f8e06b09b963</cites><orcidid>0000-0002-0561-2028 ; 0000-0001-7128-9778</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27924,27925</link.rule.ids></links><search><contributor>Xue, Xingsi</contributor><contributor>Xingsi Xue</contributor><creatorcontrib>Li, Xiaoyu</creatorcontrib><creatorcontrib>Ye, Min</creatorcontrib><creatorcontrib>Chen, Jiahui</creatorcontrib><creatorcontrib>Chen, Jianhui</creatorcontrib><creatorcontrib>Chen, Yeh-Cheng</creatorcontrib><title>A Novel Hierarchical Key Assignment Scheme for Data Access Control in IoT</title><title>Security and communication networks</title><description>Hierarchical key assignment scheme is an efficient cryptographic method for hierarchical access control, in which the encryption keys of lower classes can be derived by the higher classes. Such a property is an effective way to ensure the access control security of Internet of Things data markets. However, many researchers on this field cannot avoid potential single point of failure in key distribution, and some key assignment schemes are insecure against collusive attack or sibling attack or collaborative attack. In this paper, we propose a hierarchical key assignment scheme based on multilinear map to solve the multigroup access control in Internet of Things data markets. Compared with previous hierarchical key assignment schemes, our scheme can avoid potential single point of failure in key distribution. Also the central authority of our scheme (corresponding to the data owner in IoT data markets) does not need to assign the corresponding encryption keys to each user directly, and users in each class can obtain the encryption key via only a one-round key agreement protocol. We then show that our scheme satisfies the security of key indistinguishability under decisional multilinear Diffie-Hellman assumption. Finally, comparisons show the efficiency of our scheme and indicates that our proposed scheme can not only resist the potential attacks, but also guarantee the forward and backward security.</description><subject>Access control</subject><subject>Collaboration</subject><subject>Confidentiality</subject><subject>Cryptography</subject><subject>Cybersecurity</subject><subject>Information sharing</subject><subject>Internet of Things</subject><subject>Protocol</subject><subject>Security management</subject><subject>Sensors</subject><subject>User groups</subject><subject>User needs</subject><issn>1939-0114</issn><issn>1939-0122</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><sourceid>RHX</sourceid><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNp9kD1PwzAURS0EEqWw8QMsMULocxw78RiVj1ZUMFBmy3Ec4iqNi52C-u9x1YqR6d7h6L2ji9A1gXtCGJukkJIJJ3nGgJ-gERFUJEDS9PSvk-wcXYSwAuAky7MRmpf41X2bDs-s8crr1mrV4Rezw2UI9rNfm37A77o1a4Mb5_GDGhQutTYh4KnrB-86bHs8d8tLdNaoLpirY47Rx9PjcjpLFm_P82m5SDSl-ZAI0KKIigBQ5wYKo2kR5XLWcB6NKl0wxhRlMVOIrc4KlTWFAV6BqASnY3RzuLvx7mtrwiBXbuv7-FKmnBDKhMhFpO4OlPYuBG8aufF2rfxOEpD7seR-LHkcK-K3B7y1fa1-7P_0L9C4ZY4</recordid><startdate>20211206</startdate><enddate>20211206</enddate><creator>Li, Xiaoyu</creator><creator>Ye, Min</creator><creator>Chen, Jiahui</creator><creator>Chen, Jianhui</creator><creator>Chen, Yeh-Cheng</creator><general>Hindawi</general><general>Hindawi Limited</general><scope>RHU</scope><scope>RHW</scope><scope>RHX</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><orcidid>https://orcid.org/0000-0002-0561-2028</orcidid><orcidid>https://orcid.org/0000-0001-7128-9778</orcidid></search><sort><creationdate>20211206</creationdate><title>A Novel Hierarchical Key Assignment Scheme for Data Access Control in IoT</title><author>Li, Xiaoyu ; Ye, Min ; Chen, Jiahui ; Chen, Jianhui ; Chen, Yeh-Cheng</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c337t-90c98174000d7e08ec3819375f66474bc8555a35c852055ad48a4f8e06b09b963</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Access control</topic><topic>Collaboration</topic><topic>Confidentiality</topic><topic>Cryptography</topic><topic>Cybersecurity</topic><topic>Information sharing</topic><topic>Internet of Things</topic><topic>Protocol</topic><topic>Security management</topic><topic>Sensors</topic><topic>User groups</topic><topic>User needs</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Li, Xiaoyu</creatorcontrib><creatorcontrib>Ye, Min</creatorcontrib><creatorcontrib>Chen, Jiahui</creatorcontrib><creatorcontrib>Chen, Jianhui</creatorcontrib><creatorcontrib>Chen, Yeh-Cheng</creatorcontrib><collection>Hindawi Publishing Complete</collection><collection>Hindawi Publishing Subscription Journals</collection><collection>Hindawi Publishing Open Access Journals</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><jtitle>Security and communication networks</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Li, Xiaoyu</au><au>Ye, Min</au><au>Chen, Jiahui</au><au>Chen, Jianhui</au><au>Chen, Yeh-Cheng</au><au>Xue, Xingsi</au><au>Xingsi Xue</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Novel Hierarchical Key Assignment Scheme for Data Access Control in IoT</atitle><jtitle>Security and communication networks</jtitle><date>2021-12-06</date><risdate>2021</risdate><volume>2021</volume><spage>1</spage><epage>12</epage><pages>1-12</pages><issn>1939-0114</issn><eissn>1939-0122</eissn><abstract>Hierarchical key assignment scheme is an efficient cryptographic method for hierarchical access control, in which the encryption keys of lower classes can be derived by the higher classes. Such a property is an effective way to ensure the access control security of Internet of Things data markets. However, many researchers on this field cannot avoid potential single point of failure in key distribution, and some key assignment schemes are insecure against collusive attack or sibling attack or collaborative attack. In this paper, we propose a hierarchical key assignment scheme based on multilinear map to solve the multigroup access control in Internet of Things data markets. Compared with previous hierarchical key assignment schemes, our scheme can avoid potential single point of failure in key distribution. Also the central authority of our scheme (corresponding to the data owner in IoT data markets) does not need to assign the corresponding encryption keys to each user directly, and users in each class can obtain the encryption key via only a one-round key agreement protocol. We then show that our scheme satisfies the security of key indistinguishability under decisional multilinear Diffie-Hellman assumption. Finally, comparisons show the efficiency of our scheme and indicates that our proposed scheme can not only resist the potential attacks, but also guarantee the forward and backward security.</abstract><cop>London</cop><pub>Hindawi</pub><doi>10.1155/2021/6174506</doi><tpages>12</tpages><orcidid>https://orcid.org/0000-0002-0561-2028</orcidid><orcidid>https://orcid.org/0000-0001-7128-9778</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1939-0114 |
ispartof | Security and communication networks, 2021-12, Vol.2021, p.1-12 |
issn | 1939-0114 1939-0122 |
language | eng |
recordid | cdi_proquest_journals_2611359979 |
source | EZB-FREE-00999 freely available EZB journals; Wiley Online Library (Open Access Collection); Alma/SFX Local Collection |
subjects | Access control Collaboration Confidentiality Cryptography Cybersecurity Information sharing Internet of Things Protocol Security management Sensors User groups User needs |
title | A Novel Hierarchical Key Assignment Scheme for Data Access Control in IoT |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-27T10%3A13%3A12IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Novel%20Hierarchical%20Key%20Assignment%20Scheme%20for%20Data%20Access%20Control%20in%20IoT&rft.jtitle=Security%20and%20communication%20networks&rft.au=Li,%20Xiaoyu&rft.date=2021-12-06&rft.volume=2021&rft.spage=1&rft.epage=12&rft.pages=1-12&rft.issn=1939-0114&rft.eissn=1939-0122&rft_id=info:doi/10.1155/2021/6174506&rft_dat=%3Cproquest_cross%3E2611359979%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2611359979&rft_id=info:pmid/&rfr_iscdi=true |