Strategy-hidden attribute-based encryption scheme for industrial Internet of Things
An attribute-based encryption(ABE)scheme supporting policy hiding is proposed to eliminate the production and regulatory data leakage and data acquisition interruption in the industrial Internet of Things(IIoT).The attribute information is categorized into attribute names and attribute values for scheme construction.The attribute values are not exposed during the process of construction,and the access policy uploaded to the cloud server only consists of attribute names.The IIoT devices do not have complete access policies when obtaining production information,which prevents unauthorized elements from stealing device information and causing the leakage of access policies and production information.Multiple semi-trusted cloud servers are authorized.When a semi-trusted cloud server fails to function properly,the user private key can be quickly updated based on the server key,which allows other semi-trusted cloud servers to take over its work,so as to ensure the continuity of data read by IoT devices.In addition,the introduction of attribute authentication eliminates the need to update the ciphertext during the process of revocation,making it suitable for revocation in the IoT environments that generate a large amount of data.After security and performance analysis,the scheme can resist plaintext attacks and has high operational efficiency in system initialization,user key generation,encryption,and decryption.
IIoTdata securitystrategy hidingfailure of single pointattribute authenticationattribute revocation