信息网络安全 ›› 2023, Vol. 23 ›› Issue (3): 1-12.doi: 10.3969/j.issn.1671-1122.2023.03.001

• 等级保护 • 上一篇    下一篇

工业物联网环境下可外包的策略隐藏属性基加密方案

郭瑞1,2, 魏鑫1,2(), 陈丽1,2   

  1. 1.西安邮电大学网络空间安全学院,西安 710121
    2.西安邮电大学无线网络安全技术国家工程实验室,西安 710121
  • 收稿日期:2022-10-27 出版日期:2023-03-10 发布日期:2023-03-14
  • 通讯作者: 魏鑫 E-mail:weixin1128211@163.com
  • 作者简介:郭瑞(1984—),男,河南,副教授,博士,主要研究方向为属性基加密、云计算及区块链安全|魏鑫(1997—),男,陕西,硕士研究生,主要研究方向为属性基加密、区块链|陈丽(1996—),女,江苏,硕士研究生,主要研究方向为属性基加密、区块链技术
  • 基金资助:
    国家自然科学基金(62072369);陕西省重点研发计划(2020ZDLGY08-04);陕西省创新能力支持计划(2020KJXX-052)

An Outsourceable and Policy-Hidden Attribute-Based Encryption Scheme in the IIoT System

GUO Rui1,2, WEI Xin1,2(), CHEN Li1,2   

  1. 1. School of Cyberspace Security, Xi’an University of Posts and Telecommunications, Xi’an 710121, China
    2. National Engineering Laboratory for Wireless Security, Xi’an University of Posts and Telecommunications, Xi’an 710121, China
  • Received:2022-10-27 Online:2023-03-10 Published:2023-03-14
  • Contact: WEI Xin E-mail:weixin1128211@163.com

摘要:

针对工业物联网环境下数据访问控制方案存在解密设备计算负担过重,无法保护解密设备隐私信息,以及不能追踪恶意设备等问题,文章提出一种工业物联网环境下可外包的策略隐藏属性基加密方案。该方案借助边缘计算技术将海量工业数据的大部分解密操作外包给边缘计算节点,极大减轻了解密设备的计算负担。该方案将属性基加密中的访问结构进行拆分,引入策略隐藏技术,在实现工业数据机密性的同时保护解密设备的隐私信息。此外,文章利用区块链技术对系统内设备进行监管和审计。安全性分析表明,该方案在选择明文攻击下是安全的。文章在PBC密码库和Hyperledger Fabric区块链平台上将该方案与同类方案进行模拟仿真,结果表明,该方案具有较高的计算效率,适用于工业物联网环境。

关键词: 工业物联网, 区块链, 边缘计算, 隐私保护, 属性基加密

Abstract:

The data access control scheme in the IIoT environment has some prominent problems, such as the heavy computing burden of the decryption device, failure to protect the private information of the decryption device, and failure to track illegal device. To solve the above problems, an outsourced policy-hidden attribute-based encryption scheme in the IIoT environment was proposed. In the scheme, with the help of edge computing technology, most of the decryption operations of massive industrial data were outsourced to edge computing nodes, thus significantly reducing the computational burden of decryption devices. The access structure in ABE was divided into two parts in the scheme, thus introducing the technology of policy hiding, which protected the privacy information of decryption devices while achieving the confidentiality of the industrial data. In addition, blockchain technology was used to achieve the supervision and audit of equipment in the system. Through formal analysis, it is proven to be secure in a selectively chosen-plaintext attack(CPA). By using the PBC cryptographic library and Hyperledger Fabric blockchain platform, simulations of this scheme with existing schemes are performed. The experiment results show that this scheme has high computational efficiency and is suitable for IIoT environments.

Key words: IIoT, blockchain, edge computing, privacy protection, ABE

中图分类号: