Attribute-based Verifiable Outsourcing Decryption Encryption Scheme in IIoT

Yang Li,Qingyang Zhang,Jun Cheng,Yiyuan Zhou,Jie Cui,Hong Zhong
DOI: https://doi.org/10.1109/NaNA60121.2023.00062
2023-01-01
Abstract:With the continuous development of the Industrial Internet of Things (IIoT), more and more private data from IIoT devices is being outsourced to the cloud, and ensuring data privacy is becoming increasingly urgent. Attribute-based additive technology is gradually used in IIoT. However, attribute-based encryption technology will produce a lot of computing costs, which can not be satisfied by resource-constrained devices. Therefore, in the environment of edge support, some operations of encryption and decryption can be outsourced to edge nodes to reduce the computing cost of data owners. In this paper, we propose a verification-supported outsourcing attribute-based encryption scheme, which outsources part of the encryption operation and part of the decryption operation to the edge node, and adds the verifiable function to ensure that the ciphertext returned by the edge node is correct. And we analyze the security of the scheme. Experimental results show that the proposed scheme is more effective than the traditional scheme for resource-constrained IIoT devices.
What problem does this paper attempt to address?