A Policy-Hiding Attribute-Based Access Control Scheme in Decentralized Trust Management

11Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Internet of Medical Things (IoMT) technologies significantly improve the quality of health care, especially at the time when COVID-19 is becoming a worldwide pandemic. Due to the complexity of devices and user nodes in the IoMT system, there should be some ways to ensure the security and quality of the service or information. Decentralized trust management techniques are efficient means of promoting application security and reliability in these cases. However, the majority of currently utilized access control schemes cannot be applied in decentralized trust management systems or perform poorly owing to the numerous restrictions of decentralized systems. In this article, we present a policy-hiding and multiauthority key generation CP-ABE scheme (PM-CPABE) for decentralized trust management systems, which could provide fine-grained access control capabilities. Meanwhile, the proposed scheme does not require any fully trusted entity, thus it can be well adapted to decentralized trust management systems. The scheme also implements policy hiding to protect user privacy. In addition, it supports large universe and outsourced decryption. The security analyses and performance comparisons give evidence of our scheme is secure and efficient.

References Powered by Scopus

Internet of Things (IoT): A vision, architectural elements, and future directions

9341Citations
N/AReaders
Get full text

Ciphertext-policy attribute-based encryption

4538Citations
N/AReaders
Get full text

Attribute-based encryption for fine-grained access control of encrypted data

4409Citations
N/AReaders
Get full text

Cited by Powered by Scopus

Proxy Re-Encryption for Secure Data Sharing with Blockchain in Internet of Medical Things

7Citations
N/AReaders
Get full text

DCI-PFGL: Decentralized Cross-Institutional Personalized Federated Graph Learning for IoT Service Recommendation

4Citations
N/AReaders
Get full text

Traffic anomaly detection algorithm for CAN bus using similarity analysis

3Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Ruan, C., Hu, C., Zhao, R., Liu, Z., Huang, H., & Yu, J. (2023). A Policy-Hiding Attribute-Based Access Control Scheme in Decentralized Trust Management. IEEE Internet of Things Journal, 10(20), 17656–17665. https://doi.org/10.1109/JIOT.2023.3280751

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 1

100%

Readers' Discipline

Tooltip

Computer Science 1

100%

Article Metrics

Tooltip
Mentions
News Mentions: 1

Save time finding and organizing research with Mendeley

Sign up for free