A Data Security Hosting Scheme Based on Attribute-Based Encryption for Trusted Data Space[J/OL]. Telecommunications Science, 2026.
DOI:
A Data Security Hosting Scheme Based on Attribute-Based Encryption for Trusted Data Space[J/OL]. Telecommunications Science, 2026. DOI: 10.11959/j.issn.1000-0801.170.
A Data Security Hosting Scheme Based on Attribute-Based Encryption for Trusted Data Space
The trusted data space is an important infrastructure for promoting data circulation and utilization
and fully releasing the value of data elements. The construction of trusted data spaces faces issues such as coordination among multiple participants including trusted data space operators
data custodians
data providers and data users; privacy protection in the process of data circulation through outsourcing; and the implementation of “the separation of three rights” (right to hold data resources
right to use and process data
right to operate data products) of data in trusted data spaces. To address the above issues
this paper proposes an attribute-based encryption (ABE)-based data security custody scheme for trusted data spaces. The scheme designs an authorization mechanism for trusted data operators to data custodians
and embeds the data custodian's authorization certificate into the access control process based on ABE
thereby realizing the authentication of data custodians during access control. In addition
on the basis of attribute-based access control
a permission-based access control structure is added to realize the separation of three rights in the trusted data space. Security analysis and experiments show that the proposed scheme has low implementation overhead
can provide security not lower than that of CP-ABE
and has good application value in trusted data spaces.
M. Chase , “ Multi-authority attribute based encryption ,” Theory of Cryptography ,pp. 515 – 534 , 2007
M. Chase and S. Chow , “ Improving privacy and security in multiauthority attribute-based encryption ,” in Proceedings of the 16th ACM conference on Computer and communications security , 2009, pp. 121 – 130 .
Ming Li , Shucheng Yu , Yao Zheng , Kui Ren , and Wenjing Lou , “ Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption ,” IEEE Transactions on parallel and distributed systems , Volume 24, No. 1 , 2013.
Thakur A , Ranga V , Agarwal R . Revocable and Privacy‐Preserving CP‐ABE Scheme for Secure mHealth Data Access in Blockchain [J]. Concurrency & Computation: Practice & Experience , 2025 , 37 . DOI: 10.1002/cpe.70064 http://dx.doi.org/10.1002/cpe.70064 .
Luo W , Lv Z , Yang L , et al . FOC-PH-CP-ABE: An Efficient CP-ABE Scheme With Fully Outsourced Computation and Policy Hidden in the Industrial Internet of Things [J]. IEEE sensors journal , 2024 ( 18 ): 24 . DOI: 10.1109/JSEN.2024.3432276 http://dx.doi.org/10.1109/JSEN.2024.3432276 .
Zhou T , Tang Z , Zeng S , et al . Deduplication-enabled CP-ABE with revocation [J]. Peer-to-Peer Networking and Applications , 2025 , 18 ( 2 ). DOI: 10.1007/s12083-024-01863-z http://dx.doi.org/10.1007/s12083-024-01863-z .
Sensors , Journal of . Retracted: Efficient and Secure Key Management and Authentication Scheme for WBSNs Using CP-ABE and Consortium Blockchain [J]. Journal of Sensors , 2023 . DOI: 10.1155/2023/9865746 http://dx.doi.org/10.1155/2023/9865746 .
徐小龙 , 张栖桐 , 周静岚 . NC-MACPABE: Non-centered multi-authority proxy re-encryption based on CP-ABE for cloud storage systems [J]. 中南大学学报:英文版 , 2017 , 24 ( 4 ): 12 . DOI: 10.1007/s11771-017-3483-z http://dx.doi.org/10.1007/s11771-017-3483-z .
Li J , Yao W , Han J , et al . User Collusion Avoidance CP-ABE With Efficient Attribute Revocation for Cloud Storage [J]. IEEE Systems Journal , 2017 : 1 - 11 . DOI: 10.1109/JSYST.2017.2667679 http://dx.doi.org/10.1109/JSYST.2017.2667679 .
Wang H , He D , Shen J , et al . Fuzzy matching and direct revocation: a new CP-ABE scheme from multilinear maps [J]. Soft Computing , 2017 . DOI: 10.1007/s00500-017-2488-8 http://dx.doi.org/10.1007/s00500-017-2488-8 .