4.8 Article

R2PEDS: A Recoverable and Revocable Privacy-Preserving Edge Data Sharing Scheme

Journal

IEEE INTERNET OF THINGS JOURNAL
Volume 7, Issue 9, Pages 8077-8089

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JIOT.2020.2997389

Keywords

Servers; Data privacy; Encryption; Internet of Things; Resists; Data models; Data sharing; privacy preserving; recoverable; revocable

Funding

  1. National Key Research and Development Project [2019YFB2102600]
  2. Fundamental Research Funds for the Central Universities [2019CDQYRJ006]
  3. National Natural Science Foundation of China [61702062, 61932006, 61672119, U1836114]
  4. Chongqing Research Program of Basic Research and Frontier Technology [cstc2018jcyjAX0334, cstc2017jcyjB0305]
  5. Key Project of Technology Innovation and Application Development of Chongqing [cstc2019jscx-mbdxX0044]
  6. Overseas Returnees Innovation and Entrepreneurship Support Program of Chongqing [cx2018015]
  7. Deanship of Scientific Research at Prince Sattam Bin Abdulaziz University [2019/01/1041]

Ask authors/readers for more resources

Edge servers (ESs) are utilized to achieve the storage and sharing of IoT data. However, even if ES brings us much benefit, it also leads to many serious privacy leakage issues because users' data in ESs are out of control. Moreover, ES providers may also disclose user's private-sensitive data. Hence, in this article, we present a privacy-preserving, recoverable, and revocable edge data sharing scheme. In this scheme, we propose a novel attribute revocation chain based on the blockchain technology to achieve attribute revocation in ciphertext-policy attribute-based encryption (CP-ABE). Meanwhile, a secret sharing scheme (SSS) is introduced to assist the data recovery. Especially, for the situation that a single ES is hijacked, we also propose a corresponding efficient detection mechanism and key updating policy to promise the subsequent security of the whole system. Moreover, this scheme also resists Economic Denial-of-Sustainability (EDoS) attacks which are launched by some malicious users. The analysis shows that the proposed scheme can protect user's privacy and resist many attacks. Additionally, relevant experimental results demonstrate that our scheme has low computational overhead on the user side.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.8
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available