• KSII Transactions on Internet and Information Systems
    Monthly Online Journal (eISSN: 1976-7277)

Data Access Control Scheme Based on Blockchain and Outsourced Verifiable Attribute-Based Encryption in Edge Computing

Vol. 17, No. 7, July 31, 2023
10.3837/tiis.2023.07.011, Download Paper (Free):

Abstract

The arrival of the Internet of Things and 5G technology enables users to rely on edge computing platforms to process massive data. Data sharing based on edge computing refines the efficiency of data collection and analysis, saves the communication cost of data transmission back and forth, but also causes the privacy leakage of a lot of user data. Based on attribute-based encryption and blockchain technology, we design a fine-grained access control scheme for data in edge computing, which has the characteristics of verifiability, support for outsourcing decryption and user attribute revocation. User attributes are authorized by multi-attribute authorization, and the calculation of outsourcing decryption in attribute encryption is completed by edge server, which reduces the computing cost of end users. Meanwhile, We implemented the user's attribute revocation process through the dual encryption process of attribute authority and blockchain. Compared with other schemes, our scheme can manage users' attributes more flexibly. Blockchain technology also ensures the verifiability in the process of outsourcing decryption, which reduces the space occupied by ciphertext compared with other schemes. Meanwhile, the user attribute revocation scheme realizes the dynamic management of user attribute and protects the privacy of user attribute.


Statistics

Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2015)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article

[IEEE Style]
C. Ma, X. Jin, S. Luo, Y. Wei, X. Wang, "Data Access Control Scheme Based on Blockchain and Outsourced Verifiable Attribute-Based Encryption in Edge Computing," KSII Transactions on Internet and Information Systems, vol. 17, no. 7, pp. 1935-1950, 2023. DOI: 10.3837/tiis.2023.07.011.

[ACM Style]
Chao Ma, Xiaojun Jin, Song Luo, Yifei Wei, and Xiaojun Wang. 2023. Data Access Control Scheme Based on Blockchain and Outsourced Verifiable Attribute-Based Encryption in Edge Computing. KSII Transactions on Internet and Information Systems, 17, 7, (2023), 1935-1950. DOI: 10.3837/tiis.2023.07.011.

[BibTeX Style]
@article{tiis:54627, title="Data Access Control Scheme Based on Blockchain and Outsourced Verifiable Attribute-Based Encryption in Edge Computing", author="Chao Ma and Xiaojun Jin and Song Luo and Yifei Wei and Xiaojun Wang and ", journal="KSII Transactions on Internet and Information Systems", DOI={10.3837/tiis.2023.07.011}, volume={17}, number={7}, year="2023", month={July}, pages={1935-1950}}