A group key-policy attribute-based encryption with partial outsourcing decryption in wireless sensor networks

Outsourcing decryption that enables the authorized users to obtain the original data without decryption computation is crucially important for wireless sensor networks in public data center. The existing outsourcing decryption schemes have been designed based on key-policy attribute-based encryption. The security of outsourcing decryption cannot be guaranteed, because the data center is not loyal, and existing schemes have high computational complexity and energy consumption. In this work, a novel partially outsourcing decryption scheme is proposed to guarantee data security and computational efficiency for resource-constrained sensor nodes and terminal equipments. According to the attributes of cluster nodes in the proposed scheme, the encryption secret key is encrypted based on group key-policy attribute-based encryption and sent to data center, and authorized users who satisfy the attributes of the ciphertext can obtain the secret key to decrypt the ciphertext. Furthermore, in order to reduce the decryption overhead for users, the authorized users can simply decrypt the transformation ciphertext that is partially decrypted by the data center using token key. Compared with the previous decryption schemes, the proposed scheme efficiently decrypts ciphertext and enhances security of the data. The simulation results also indicate that the proposed scheme is efficient in terms of energy consumption and computation by comparing to previous work. Copyright © 2016 John Wiley & Sons, Ltd.

[1]  Yacine Challal,et al.  Secure Medical Architecture on the Cloud Using Wireless Sensor Networks for Emergency Management , 2013, 2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications.

[2]  Wenjing Lou,et al.  FDAC: Toward Fine-Grained Distributed Data Access Control in Wireless Sensor Networks , 2011 .

[3]  Jing Liu,et al.  Attribute-Based Ring Signcryption Scheme and Its Application in Wireless Body Area Networks , 2015, ICA3PP.

[4]  Josep Domingo-Ferrer,et al.  FRR: Fair remote retrieval of outsourced private medical records in electronic health networks , 2014, J. Biomed. Informatics.

[5]  Jianfeng Ma,et al.  Key Pre-distribution Scheme with Node Revocation for Wireless Sensor Networks , 2010, Ad Hoc Sens. Wirel. Networks.

[6]  Junbeom Hur,et al.  Fine-grained data access control for distributed sensor networks , 2011, Wirel. Networks.

[7]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[8]  Sandip Roy,et al.  Cryptanalysis and enhancement of a distributed fine-grained access control in wireless sensor networks , 2014, 2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[9]  Anantha P. Chandrakasan,et al.  An application-specific protocol architecture for wireless microsensor networks , 2002, IEEE Trans. Wirel. Commun..

[10]  Amos Beimel,et al.  Secret-Sharing Schemes: A Survey , 2011, IWCC.

[11]  Su Jin,et al.  Attribute-Based Encryption Schemes , 2011 .

[12]  Brent Waters,et al.  Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.

[13]  Robert H. Deng,et al.  Attribute-Based Encryption With Verifiable Outsourced Decryption , 2013, IEEE Transactions on Information Forensics and Security.

[14]  Hua Ma,et al.  Outsourcing Decryption of Multi-Authority ABE Ciphertexts , 2014, Int. J. Netw. Secur..

[15]  Kyung-Ah Shim,et al.  ${\cal CPAS}$: An Efficient Conditional Privacy-Preserving Authentication Scheme for Vehicular Sensor Networks , 2012, IEEE Transactions on Vehicular Technology.

[16]  Brent Waters,et al.  Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.

[17]  Chunhua Jin,et al.  Practical Signcryption for Secure Communication of Wireless Sensor Networks , 2016, Wireless Personal Communications.

[18]  Ivan Stojmenovic,et al.  Distributed Fine-Grained Access Control in Wireless Sensor Networks , 2011, 2011 IEEE International Parallel & Distributed Processing Symposium.

[19]  Liusheng Huang,et al.  Security of a Biometric Identity-based Encryption Scheme , 2012, Int. J. Netw. Secur..

[20]  Shilpashree Srinivasamurthy,et al.  Survey on Cloud Computing Security , 2010 .

[21]  Wensheng Zhang,et al.  Securing distributed data storage and retrieval in sensor networks , 2007, Pervasive Mob. Comput..

[22]  Chunhua Jin,et al.  Certificateless online/offline signcryption for the Internet of Things , 2015, Wireless Networks.

[23]  Xiao-Feng Wang,et al.  Attribute-Based Encryption Schemes: Attribute-Based Encryption Schemes , 2011 .

[24]  Yaowei Zhou,et al.  Key-insulated encryption based group key management for wireless sensor network , 2013 .

[25]  Brent Waters,et al.  Online/Offline Attribute-Based Encryption , 2014, IACR Cryptol. ePrint Arch..

[26]  Junbeom Hur,et al.  Attribute-Based Secure Data Sharing with Hidden Policies in Smart Grid , 2013, IEEE Transactions on Parallel and Distributed Systems.