Blockchain-Aided Searchable Encryption-Based Two-Way Attribute Access Control Research

نویسندگان

چکیده

In the Internet of Things (IoT), data sharing security is important to social security. It a huge challenge enable more accurate and secure access by authorized users. Blockchain control schemes are mostly one-way control, which cannot meet need for ciphertext search, two-way confirmation users data, transmission. Thus, this paper proposes blockchain-aided searchable encryption-based attribute scheme (STW-ABE). The combines key search. particular, meets requirement mutual between data. search avoids information leakage during transmission, thus improving overall efficiency sharing. Moreover, user keys generated coalition blockchain. Besides, pre-decryption outsourced cloud servers, reducing computing pressure on adapting needs lightweight in IoT. Security analysis proves that our under chosen-plaintext attack chosen keyword attack. Simulations show cost encryption decryption, token generation, preferable.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Privacy-preserving Attribute Based Searchable Encryption

Attribute Based Encryption (ABE) is a promising public-key cryptographic primitive that can be used for cryptographically enforced access control in untrusted storage. Storing data on untrusted storage not only requires data security for data owners but also poses data protection from untrusted storage server. To address this important requirement, Anonymous Attribute Based Encryption (AABE) is...

متن کامل

Cryptanalysis of Searchable Anonymous Attribute Based Encryption

Ciphertext Policy Attribute Based Encryption (CP ABE) is a public key primitive in which a user is only able to decrypt a ciphertext if the attributes associated with secret key and the access policy connected with ciphertext matches. CP-ABE provides both confidentiality and access control to the data stored in public cloud. Anonymous CP-ABE is an adaptation of ABE where in addition to data con...

متن کامل

Searchable Encryption with Access Control ∗ Nils Löken

Outsourcing data to the cloud is becoming increasingly prevalent. To ensure data confidentiality, encrypting the data before outsourcing it is advised. While encryption protects the secrets in the data, it also prevents operations on the data. For example in a multi-user setting, data is often accessed via search, but encryption prevents search. Searchable encryption solves this dilemma. Howeve...

متن کامل

A Searchable Symmetric Encryption Scheme using BlockChain

At present, the cloud storage used in searchable symmetric encryption schemes (SSE) is provided in a private way, which cannot be seen as a true cloud. Moreover, the cloud server is thought to be credible, because it always returns the search result to the user, even they are not correct. In order to really resist this malicious adversary and accelerate the usage of the data, it is necessary to...

متن کامل

Blockchain Based Access Control

Access Control systems are used in computer security to regulate the access to critical or valuable resources. The rights of subjects to access such resources are typically expressed through access control policies, which are evaluated at access request time against the current access context. This paper proposes a new approach based on blockchain technology to publish the policies expressing t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Security and Communication Networks

سال: 2022

ISSN: ['1939-0122', '1939-0114']

DOI: https://doi.org/10.1155/2022/2410455