作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程 ›› 2025, Vol. 51 ›› Issue (7): 244-253. doi: 10.19678/j.issn.1000-3428.0069341

• 网络空间安全 • 上一篇    下一篇

边云辅助下的可撤销属性加密方案

张伟航, 钟永彦*(), 向元柱, 丁士旵   

  1. 南通大学电气与自动化学院, 江苏 南通 226019
  • 收稿日期:2024-02-01 出版日期:2025-07-15 发布日期:2024-06-13
  • 通讯作者: 钟永彦
  • 基金资助:
    国家自然科学基金(62273188)

Revocable Attribute-Based Encryption Scheme Assisted by Edge and Cloud

ZHANG Weihang, ZHONG Yongyan*(), XIANG Yuanzhu, DING Shichan   

  1. School of Electrical Engineering and Automation, Nantong University, Nantong 226019, Jiangsu, China
  • Received:2024-02-01 Online:2025-07-15 Published:2024-06-13
  • Contact: ZHONG Yongyan

摘要:

物联网(IoT)设备数据上云已成为主流数据管理方案, 但云端数据管理存在安全风险。为确保数据机密性并防止未授权访问, 属性访问控制(ABAC)被认为是一种有效的解决方案。然而, 现有加密方案负担重、撤销机制不完善, 不适用于动态的物联网环境, 为此提出了边云辅助下的可撤销属性加密方案(ECA-RABE)。该方案采用椭圆曲线加密(ECC)技术降低计算开销; 支持多属性机构分担属性管理减少单点故障问题; 引入边缘节点(EN)降低物联网设备的计算负载; 利用云计算预解密降低用户侧计算压力; 引入属性版本号以及系统版本号, 设计撤销机制实现用户属性撤销、系统全局属性撤销以及用户撤销。安全性分析与性能分析表明, 所提方案在决策双线性Diffie-Hellman (DBDH)假设下是安全的, 并且加、解密效率高, 更适用于物联网环境。

关键词: 属性加密, 边缘计算, 访问控制, 线性秘密共享方案, 加密外包, 解密外包

Abstract:

Uploading data from Internet of Things (IoT) devices to the cloud has become a mainstream data management solution. However, cloud-based data management is associated with security risks. Attribute-Based Access Control (ABAC) is considered an effective solution for safeguarding data confidentiality and preventing unauthorized access. However, existing encryption schemes are computationally burdensome and lack robust revocation mechanisms, rendering them unsuitable for dynamic IoT environments. To address these issues, this study proposes a Revocable Attribute-Based Encryption scheme Assisted by Edge and Cloud (ECA-RABE). The scheme utilizes Elliptic Curve Cryptography (ECC) to reduce computational overhead, supports decentralized attribute management among multiple authorities to eliminate single points of failure, and employs Edge Node (EN) to offload computational tasks from IoT devices. Additionally, cloud computing is leveraged for pre-decryption to reduce user-side computational pressure. The scheme incorporates both attribute and system version numbers and designs a revocation mechanism to achieve user-level attribute revocation, system-wide attribute revocation, and user revocation. Security and performance analyses demonstrate that the proposed scheme is secure under the Decisional Bilinear Diffie-Hellman (DBDH) assumption and exhibits high efficiency in encryption and decryption. Therefore, the proposed scheme is well-suited to IoT environments.

Key words: attribute-based encryption, edge computing, access control, linear secret sharing scheme, encryption outsourcing, decryption outsourcing