Netinfo Security ›› 2023, Vol. 23 ›› Issue (3): 1-12.doi: 10.3969/j.issn.1671-1122.2023.03.001

Previous Articles     Next Articles

An Outsourceable and Policy-Hidden Attribute-Based Encryption Scheme in the IIoT System

GUO Rui1,2, WEI Xin1,2(), CHEN Li1,2   

  1. 1. School of Cyberspace Security, Xi’an University of Posts and Telecommunications, Xi’an 710121, China
    2. National Engineering Laboratory for Wireless Security, Xi’an University of Posts and Telecommunications, Xi’an 710121, China
  • Received:2022-10-27 Online:2023-03-10 Published:2023-03-14
  • Contact: WEI Xin E-mail:weixin1128211@163.com

Abstract:

The data access control scheme in the IIoT environment has some prominent problems, such as the heavy computing burden of the decryption device, failure to protect the private information of the decryption device, and failure to track illegal device. To solve the above problems, an outsourced policy-hidden attribute-based encryption scheme in the IIoT environment was proposed. In the scheme, with the help of edge computing technology, most of the decryption operations of massive industrial data were outsourced to edge computing nodes, thus significantly reducing the computational burden of decryption devices. The access structure in ABE was divided into two parts in the scheme, thus introducing the technology of policy hiding, which protected the privacy information of decryption devices while achieving the confidentiality of the industrial data. In addition, blockchain technology was used to achieve the supervision and audit of equipment in the system. Through formal analysis, it is proven to be secure in a selectively chosen-plaintext attack(CPA). By using the PBC cryptographic library and Hyperledger Fabric blockchain platform, simulations of this scheme with existing schemes are performed. The experiment results show that this scheme has high computational efficiency and is suitable for IIoT environments.

Key words: IIoT, blockchain, edge computing, privacy protection, ABE

CLC Number: