KEYWORDS: Internet of things, Blockchain, Symmetric-key encryption, Clouds, Data modeling, Databases, Data storage, Control systems, Matrices, Data storage servers
The integration of Internet of Things (IoT) technology in everyday life has significantly improved convenience, particularly through the provision of various services and the monitoring of patients' vital signs. However, as IoT devices collect sensitive user information and transmit it to remote servers, privacy and security concerns have become a major issue. Therefore, there is an urgent need for data access control and data security sharing in IoT environments. To address these challenges, this study proposes a CP-ABE access control scheme based on blockchain technology and Supporting Data Permissions Management. The scheme supports data access control and management, using plaintext partitioning and data access control policies to manage data access effectively. Access control processes are executed through smart contracts, and data units are hashed and uploaded to the blockchain for secure storage. Homomorphic encryption technology is also utilized for outsourcing encryption, while proxy private key technology is used for outsourcing decryption. In conclusion, this scheme effectively resolves data access control and tampering issues in IoT environments, and has high practical value and application prospects.
KEYWORDS: Internet of things, Clouds, Data storage, Computer security, Data modeling, Network security, Bismuth, Systems modeling, Control systems, Data transmission
With the flourishing development of the Internet of Things (IoT), IoT devices are becoming increasingly connected with people. IoT devices are constantly collecting and transmitting large amounts of private information, and there is a need for data access control and secure data sharing. Since Ciphertext Policy Attribute-Based Encryption (CP-ABE) is an end-to-end encryption solution, CP-ABE-based access control methods can effectively meet the data security sharing requirements in the IoT environment. However, existing CP-ABE access control methods are difficult to implement data access control. There are no standardized data access control solutions, and redundant storage of data can occur. This study addresses the issue that existing CP-ABE access control methods have difficulty in achieving data permission management. A CP-ABE access control scheme that supports data permission management is designed. To support data permission management, the data is partitioned into key-value pairs. A data permission management policy is designed based on the access control policy, which not only sets the access policy but also specifies the data unit scope of authorized users. The CP-ABE algorithm is used to encrypt the set of encrypted data unit keys in the policy, replacing the redundant storage of data units with keys. This study formulates a standardized data permission management scheme based on the CP-ABE access control scheme, effectively reducing data redundancy storages.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.