2021
DOI: 10.1109/access.2021.3071031
|View full text |Cite
|
Sign up to set email alerts
|

Secure ABE Scheme for Access Management in Blockchain-Based IoT

Abstract: Internet of Things (IoT) has been widely used in various fields of our daily life in the past years. Obviously, in the future, the significance of its security will be more evident and enormous. However, there are still many security issues in the IoT, which makes it vulnerable to be attacked easily by some potential factors. Targeting at these issue, in this paper, we propose a secure access management scheme in IoT based on blockchain. Firstly, in our work, by using the Decisional Learning with Error (DLWE) … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2025
2025

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(5 citation statements)
references
References 32 publications
0
5
0
Order By: Relevance
“…As a result, only medical users encrypt the message to the server and decrypt the message using access control technology. Jiansheng et al [158] propose two privacy-preserving technologies: attribute-based encryption (ABE) and blockchain-based access control data privacy schemes for IoT systems. The proposed scheme is more secure and efficient and solves authentication challenges.…”
Section: Countermeasures For Software and Data Link Layer Attacksmentioning
confidence: 99%
“…As a result, only medical users encrypt the message to the server and decrypt the message using access control technology. Jiansheng et al [158] propose two privacy-preserving technologies: attribute-based encryption (ABE) and blockchain-based access control data privacy schemes for IoT systems. The proposed scheme is more secure and efficient and solves authentication challenges.…”
Section: Countermeasures For Software and Data Link Layer Attacksmentioning
confidence: 99%
“…In [27], the authors proposed the Key-Policy Attribute-Based Encryption (KP-ABE) scheme using the Decisional Learning with Error (DLWE) problem and combined the KP-ABE with blockchain for secure access management. In KP-ABE, the researchers used Probabilistic Polynomial (PPT) algorithms including setup, keygen, encryption, and decryption.…”
Section: A Access Control Schemesmentioning
confidence: 99%
“…Blockchain equipped with smart contracts or chaincode, which can perform specific computing task, provides a feasible solution. Among the previous mentioned blockchain-based data sharing schemes, proposals in [20][21][22][23][24][25][26] ignored the huge data storage on chain. Wang et al [29] proposed an improved scheme by IPFS, but the user has to take huge computational costs, while Wang et al [12] put forward an ABE-OD scheme assisted by blockchain to reduce users' costs, but it ignored the security in practice.…”
Section: Motivationmentioning
confidence: 99%
“…e development of blockchain technology contributes to addressing issues in data sharing caused by traditional cloud storage system due to its transparency and tamper resistance. For better combination with practical applications, schemes in [20][21][22][23] proposed blockchain-based EHRs sharing models and schemes in [24][25][26] put forward blockchain-based sharing models in scenario of IoT (Internet of ings). Despite the sophisticated design of ABE schemes that can support traceable, searchable, and outsourced decryption, key leakage resistance, etc., none of them concentrates on the storage burden on chain caused by huge ABE ciphertext storage overheads.…”
Section: Blockchain-based Data Sharing Schemementioning
confidence: 99%
See 1 more Smart Citation