Blockchain-Aided Searchable Encryption-Based Two-Way Attribute Access Control Research
نویسندگان
چکیده
In the Internet of Things (IoT), data sharing security is important to social security. It a huge challenge enable more accurate and secure access by authorized users. Blockchain control schemes are mostly one-way control, which cannot meet need for ciphertext search, two-way confirmation users data, transmission. Thus, this paper proposes blockchain-aided searchable encryption-based attribute scheme (STW-ABE). The combines key search. particular, meets requirement mutual between data. search avoids information leakage during transmission, thus improving overall efficiency sharing. Moreover, user keys generated coalition blockchain. Besides, pre-decryption outsourced cloud servers, reducing computing pressure on adapting needs lightweight in IoT. Security analysis proves that our under chosen-plaintext attack chosen keyword attack. Simulations show cost encryption decryption, token generation, preferable.
منابع مشابه
Privacy-preserving Attribute Based Searchable Encryption
Attribute Based Encryption (ABE) is a promising public-key cryptographic primitive that can be used for cryptographically enforced access control in untrusted storage. Storing data on untrusted storage not only requires data security for data owners but also poses data protection from untrusted storage server. To address this important requirement, Anonymous Attribute Based Encryption (AABE) is...
متن کاملCryptanalysis of Searchable Anonymous Attribute Based Encryption
Ciphertext Policy Attribute Based Encryption (CP ABE) is a public key primitive in which a user is only able to decrypt a ciphertext if the attributes associated with secret key and the access policy connected with ciphertext matches. CP-ABE provides both confidentiality and access control to the data stored in public cloud. Anonymous CP-ABE is an adaptation of ABE where in addition to data con...
متن کاملSearchable Encryption with Access Control ∗ Nils Löken
Outsourcing data to the cloud is becoming increasingly prevalent. To ensure data confidentiality, encrypting the data before outsourcing it is advised. While encryption protects the secrets in the data, it also prevents operations on the data. For example in a multi-user setting, data is often accessed via search, but encryption prevents search. Searchable encryption solves this dilemma. Howeve...
متن کاملA Searchable Symmetric Encryption Scheme using BlockChain
At present, the cloud storage used in searchable symmetric encryption schemes (SSE) is provided in a private way, which cannot be seen as a true cloud. Moreover, the cloud server is thought to be credible, because it always returns the search result to the user, even they are not correct. In order to really resist this malicious adversary and accelerate the usage of the data, it is necessary to...
متن کاملBlockchain Based Access Control
Access Control systems are used in computer security to regulate the access to critical or valuable resources. The rights of subjects to access such resources are typically expressed through access control policies, which are evaluated at access request time against the current access context. This paper proposes a new approach based on blockchain technology to publish the policies expressing t...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Security and Communication Networks
سال: 2022
ISSN: ['1939-0122', '1939-0114']
DOI: https://doi.org/10.1155/2022/2410455