Skip to main content
Top
Published in: Peer-to-Peer Networking and Applications 2/2024

11-01-2024

CIM: CP-ABE-based identity management framework for collaborative edge storage

Authors: Chunjiao Li, Liangmin Wang, Jiayi Li, Yue Fei

Published in: Peer-to-Peer Networking and Applications | Issue 2/2024

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Collaborative edge storage (CES) can provide high-quality data sharing for end users through the collaborative use of edge storage resources. However, due to the lack of trust between different edge storage servers, satisfying data authenticity, storage reliability, and identity privacy protection simultaneously become the main research challenge in the field of CES. While the emerging blockchain-based collaborative storage solutions (BBCES) can solve the problems of data authenticity and storage reliability, the transparency of blockchain makes privacy become the main issue. In this paper, we propose a CP-ABE-based identity management framework (CIM), which can effectively protect the identity information of edge entities in the BBCES. On CIM, we design a CP-ABE scheme to protect the identity privacy of edge entities by encrypting classified identity information. The encrypted identity information of a new joining entity will be recorded in the blockchain. When edge entities participate in CES, the identification number of their encrypted identity information will be recorded in the blockchain. Besides, via the tracing algorithm, the system entity can get the authorized identity information of these edge entities participating in a specific CES, which can realize identity traceability while protecting identity privacy. Further, theoretical analysis and extensive experiments have demonstrated the effectiveness and performance of this scheme in the identity privacy protection of CES.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Li J, Ma J, Miao Y, Chen L, Wang Y, Liu X, Choo K-KR (2021) Verifiable semantic-aware ranked keyword search in cloud-assisted edge computing. IEEE Trans Serv Comput 15(6):3591–3605CrossRef Li J, Ma J, Miao Y, Chen L, Wang Y, Liu X, Choo K-KR (2021) Verifiable semantic-aware ranked keyword search in cloud-assisted edge computing. IEEE Trans Serv Comput 15(6):3591–3605CrossRef
2.
go back to reference Xia X, Chen F, He Q, Grundy JC, Abdelrazek M, Jin H (2020) Cost-effective app data distribution in edge computing. IEEE Trans Parallel Distrib Syst 32(1):31–44CrossRef Xia X, Chen F, He Q, Grundy JC, Abdelrazek M, Jin H (2020) Cost-effective app data distribution in edge computing. IEEE Trans Parallel Distrib Syst 32(1):31–44CrossRef
3.
go back to reference Yuan L, He Q, Chen F, Zhang J, Qi L, Xu X, Xiang Y, Yang Y (2021) Csedge: Enabling collaborative edge storage for multi-access edge computing based on blockchain. IEEE Trans Parallel Distrib Syst 33(8):1873–1887CrossRef Yuan L, He Q, Chen F, Zhang J, Qi L, Xu X, Xiang Y, Yang Y (2021) Csedge: Enabling collaborative edge storage for multi-access edge computing based on blockchain. IEEE Trans Parallel Distrib Syst 33(8):1873–1887CrossRef
4.
go back to reference Ren J, Wang H, Hou T, Zheng S, Tang C (2020) Collaborative edge computing and caching with deep reinforcement learning decision agents. IEEE Access 8:120604–120612CrossRef Ren J, Wang H, Hou T, Zheng S, Tang C (2020) Collaborative edge computing and caching with deep reinforcement learning decision agents. IEEE Access 8:120604–120612CrossRef
5.
go back to reference Sharma A, Kaur P (2022) Tamper-proof multitenant data storage using blockchain. Peer Peer Netw Appl 1–19 Sharma A, Kaur P (2022) Tamper-proof multitenant data storage using blockchain. Peer Peer Netw Appl 1–19
6.
go back to reference Yuan L, He Q, Tan S, Li B, Yu J, Chen F, Jin H, Yang Y (2021) Coopedge: A decentralized blockchain-based platform for cooperative edge computing. In: Proceedings of the Web Conference 2021, pp. 2245–2257 Yuan L, He Q, Tan S, Li B, Yu J, Chen F, Jin H, Yang Y (2021) Coopedge: A decentralized blockchain-based platform for cooperative edge computing. In: Proceedings of the Web Conference 2021, pp. 2245–2257
7.
go back to reference Li B, He Q, Yuan L, Chen F, Lyu L, Yang Y (2022) Edgewatch: Collaborative investigation of data integrity at the edge based on blockchain. In: Proceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, pp. 3208–3218 Li B, He Q, Yuan L, Chen F, Lyu L, Yang Y (2022) Edgewatch: Collaborative investigation of data integrity at the edge based on blockchain. In: Proceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, pp. 3208–3218
8.
go back to reference Cheng G, Chen Y, Deng S, Gao H, Yin J (2021) A blockchain-based mutual authentication scheme for collaborative edge computing. IEEE Trans Comput Soc Syst 9(1):146–158CrossRef Cheng G, Chen Y, Deng S, Gao H, Yin J (2021) A blockchain-based mutual authentication scheme for collaborative edge computing. IEEE Trans Comput Soc Syst 9(1):146–158CrossRef
9.
go back to reference Yue K, Zhang Y, Chen Y, Li Y, Zhao L, Rong C, Chen L (2021) A survey of decentralizing applications via blockchain: The 5g and beyond perspective. IEEE Commun Surv Tutorials 23(4):2191–2217CrossRef Yue K, Zhang Y, Chen Y, Li Y, Zhao L, Rong C, Chen L (2021) A survey of decentralizing applications via blockchain: The 5g and beyond perspective. IEEE Commun Surv Tutorials 23(4):2191–2217CrossRef
10.
go back to reference McGhin T, Choo K-KR, Liu CZ, He D (2019) Blockchain in healthcare applications: Research challenges and opportunities. J Netw Comput Appl 135:62–75CrossRef McGhin T, Choo K-KR, Liu CZ, He D (2019) Blockchain in healthcare applications: Research challenges and opportunities. J Netw Comput Appl 135:62–75CrossRef
11.
go back to reference Rivera AV, Refaey A, Hossain E (2020) A blockchain framework for secure task sharing in multi-access edge computing. IEEE Netw 35(3):176–183CrossRef Rivera AV, Refaey A, Hossain E (2020) A blockchain framework for secure task sharing in multi-access edge computing. IEEE Netw 35(3):176–183CrossRef
12.
go back to reference Yang R, Yu FR, Si P, Yang Z, Zhang Y (2019) Integrated blockchain and edge computing systems: A survey, some research issues and challenges. IEEE Commun Surv Tutorials 21(2):1508–1532CrossRef Yang R, Yu FR, Si P, Yang Z, Zhang Y (2019) Integrated blockchain and edge computing systems: A survey, some research issues and challenges. IEEE Commun Surv Tutorials 21(2):1508–1532CrossRef
13.
go back to reference Bai F, Shen T, Yu Z, Zeng K, Gong B (2021) Trustworthy blockchain-empowered collaborative edge computing-as-a-service scheduling and data sharing in the iioe. IEEE Internet Things J 9(16):14752–14766CrossRef Bai F, Shen T, Yu Z, Zeng K, Gong B (2021) Trustworthy blockchain-empowered collaborative edge computing-as-a-service scheduling and data sharing in the iioe. IEEE Internet Things J 9(16):14752–14766CrossRef
14.
go back to reference Xu X, Zhang X, Gao H, Xue Y, Qi L, Dou W (2019) Become: Blockchain-enabled computation offloading for iot in mobile edge computing. IEEE Trans Industr Inf 16(6):4187–4195CrossRef Xu X, Zhang X, Gao H, Xue Y, Qi L, Dou W (2019) Become: Blockchain-enabled computation offloading for iot in mobile edge computing. IEEE Trans Industr Inf 16(6):4187–4195CrossRef
15.
go back to reference Liu H, Zhang S, Zhang P, Zhou X, Shao X, Pu G, Zhang Y (2021) Blockchain and federated learning for collaborative intrusion detection in vehicular edge computing. IEEE Trans Veh Technol 70(6):6073–6084CrossRef Liu H, Zhang S, Zhang P, Zhou X, Shao X, Pu G, Zhang Y (2021) Blockchain and federated learning for collaborative intrusion detection in vehicular edge computing. IEEE Trans Veh Technol 70(6):6073–6084CrossRef
16.
go back to reference Nguyen DC, Ding M, Pham Q-V, Pathirana PN, Le LB, Seneviratne A, Li J, Niyato D, Poor HV (2021) Federated learning meets blockchain in edge computing: Opportunities and challenges. IEEE Internet Things J 8(16):12806–12825CrossRef Nguyen DC, Ding M, Pham Q-V, Pathirana PN, Le LB, Seneviratne A, Li J, Niyato D, Poor HV (2021) Federated learning meets blockchain in edge computing: Opportunities and challenges. IEEE Internet Things J 8(16):12806–12825CrossRef
17.
go back to reference Yang H, Liang Y, Yuan J, Yao Q, Yu A, Zhang J (2020) Distributed blockchain-based trusted multidomain collaboration for mobile edge computing in 5g and beyond. IEEE Trans Industr Inf 16(11):7094–7104CrossRef Yang H, Liang Y, Yuan J, Yao Q, Yu A, Zhang J (2020) Distributed blockchain-based trusted multidomain collaboration for mobile edge computing in 5g and beyond. IEEE Trans Industr Inf 16(11):7094–7104CrossRef
18.
go back to reference Wang Q, Chen S, Wu M (2023) Incentive-aware blockchain-assisted intelligent edge caching and computation offloading for IOT. Engineering Wang Q, Chen S, Wu M (2023) Incentive-aware blockchain-assisted intelligent edge caching and computation offloading for IOT. Engineering
19.
go back to reference Liu Y, Li D, Li R, Zhao Z, Zhu Y, Zhang H (2023) Secure and efficient stigmergy-empowered blockchain framework for heterogeneous collaborative services in the internet of vehicles. IEEE Commun Mag Liu Y, Li D, Li R, Zhao Z, Zhu Y, Zhang H (2023) Secure and efficient stigmergy-empowered blockchain framework for heterogeneous collaborative services in the internet of vehicles. IEEE Commun Mag
20.
go back to reference He Q, Tan S, Chen F, Xu X, Qi L, Hei X, Jin H, Yang Y (2023) Edindex: Enabling fast data queries in edge storage systems. In: Proceedings of the 46th International ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 675–685 He Q, Tan S, Chen F, Xu X, Qi L, Hei X, Jin H, Yang Y (2023) Edindex: Enabling fast data queries in edge storage systems. In: Proceedings of the 46th International ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 675–685
21.
go back to reference Zhang M, Cao J, Sahni Y, Chen Q, Jiang S, Yang L (2022) Blockchain-based collaborative edge intelligence for trustworthy and real-time video surveillance. IEEE Trans Industr Inf 19(2):1623–1633CrossRef Zhang M, Cao J, Sahni Y, Chen Q, Jiang S, Yang L (2022) Blockchain-based collaborative edge intelligence for trustworthy and real-time video surveillance. IEEE Trans Industr Inf 19(2):1623–1633CrossRef
22.
go back to reference Latif Z, Lee C, Sharif K, Helal S (2022) Sdblockedge: Sdn-blockchain enabled multihop task offloading in collaborative edge computing. IEEE Sens J 22(15):15537–15548CrossRef Latif Z, Lee C, Sharif K, Helal S (2022) Sdblockedge: Sdn-blockchain enabled multihop task offloading in collaborative edge computing. IEEE Sens J 22(15):15537–15548CrossRef
23.
go back to reference Chonka A, Xiang Y, Zhou W, Bonti A (2011) Cloud security defence to protect cloud computing against http-dos and xml-dos attacks. J Netw Comput Appl 34(4):1097–1107CrossRef Chonka A, Xiang Y, Zhou W, Bonti A (2011) Cloud security defence to protect cloud computing against http-dos and xml-dos attacks. J Netw Comput Appl 34(4):1097–1107CrossRef
24.
go back to reference Li J, Ma J, Miao Y, Yang R, Liu X, Choo K-KR (2020) Practical multi-keyword ranked search with access control over encrypted cloud data. IEEE Trans Cloud Comput 10(3):2005–2019CrossRef Li J, Ma J, Miao Y, Yang R, Liu X, Choo K-KR (2020) Practical multi-keyword ranked search with access control over encrypted cloud data. IEEE Trans Cloud Comput 10(3):2005–2019CrossRef
25.
go back to reference Liu Y, Wang T, Zhang S, Liu X, Liu X (2020) Artificial intelligence aware and security-enhanced traceback technique in mobile edge computing. Comput Commun 161:375–386CrossRef Liu Y, Wang T, Zhang S, Liu X, Liu X (2020) Artificial intelligence aware and security-enhanced traceback technique in mobile edge computing. Comput Commun 161:375–386CrossRef
26.
go back to reference Nie L, Wu Y, Wang X, Guo L, Wang G, Gao X, Li S (2021) Intrusion detection for secure social internet of things based on collaborative edge computing: A generative adversarial network-based approach. IEEE Trans Comput Soc Syst 9(1):134–145CrossRef Nie L, Wu Y, Wang X, Guo L, Wang G, Gao X, Li S (2021) Intrusion detection for secure social internet of things based on collaborative edge computing: A generative adversarial network-based approach. IEEE Trans Comput Soc Syst 9(1):134–145CrossRef
27.
go back to reference Zhang P, Wang Y, Kumar N, Jiang C, Shi G (2021) A security-and privacy-preserving approach based on data disturbance for collaborative edge computing in social iot systems. IEEE Trans Comput Soc Syst 9(1):97–108CrossRef Zhang P, Wang Y, Kumar N, Jiang C, Shi G (2021) A security-and privacy-preserving approach based on data disturbance for collaborative edge computing in social iot systems. IEEE Trans Comput Soc Syst 9(1):97–108CrossRef
28.
go back to reference Zhang Q, Cui J, Zhong H, Liu L (2022) Toward data transmission security based on proxy broadcast re-encryption in edge collaboration. ACM Transactions on Sensor Networks (TOSN) 18(3):1–27 Zhang Q, Cui J, Zhong H, Liu L (2022) Toward data transmission security based on proxy broadcast re-encryption in edge collaboration. ACM Transactions on Sensor Networks (TOSN) 18(3):1–27
29.
go back to reference Fan K, Pan Q, Wang J, Liu T, Li H, Yang Y (2018) Cross-domain based data sharing scheme in cooperative edge computing. In: 2018 IEEE International Conference on Edge Computing (EDGE), pp. 87–92. IEEE Fan K, Pan Q, Wang J, Liu T, Li H, Yang Y (2018) Cross-domain based data sharing scheme in cooperative edge computing. In: 2018 IEEE International Conference on Edge Computing (EDGE), pp. 87–92. IEEE
30.
go back to reference Li J, Lv H, Lei B (2022) A cross-domain data security sharing approach for edge computing based on cp-abe. In: 2022 23rd Asia-Pacific Network Operations and Management Symposium (APNOMS), pp. 1–6. IEEE Li J, Lv H, Lei B (2022) A cross-domain data security sharing approach for edge computing based on cp-abe. In: 2022 23rd Asia-Pacific Network Operations and Management Symposium (APNOMS), pp. 1–6. IEEE
31.
go back to reference Zheng W, Chen B, He D (2022) An adaptive access control scheme based on trust degrees for edge computing. Comput Stand Interfaces 82:103640CrossRef Zheng W, Chen B, He D (2022) An adaptive access control scheme based on trust degrees for edge computing. Comput Stand Interfaces 82:103640CrossRef
32.
go back to reference Fang H, Wang X, Tomasin S, Al-Dhahir N (2022) Lightweight group authentication for decentralized edge collaboration. IEEE Commun Mag 60(12):124–129CrossRef Fang H, Wang X, Tomasin S, Al-Dhahir N (2022) Lightweight group authentication for decentralized edge collaboration. IEEE Commun Mag 60(12):124–129CrossRef
33.
go back to reference Ma Z, Wang J, Gai K, Duan P, Zhang Y, Luo S (2023) Fully homomorphic encryption-based privacy-preserving scheme for cross edge blockchain network. J Syst Archit 134:102782CrossRef Ma Z, Wang J, Gai K, Duan P, Zhang Y, Luo S (2023) Fully homomorphic encryption-based privacy-preserving scheme for cross edge blockchain network. J Syst Archit 134:102782CrossRef
34.
go back to reference Li J, Ma J, Miao Y, Yang F, Liu X, Choo K-KR (2021) Secure semantic-aware search over dynamic spatial data in vanets. IEEE Trans Veh Technol 70(9):8912–8925CrossRef Li J, Ma J, Miao Y, Yang F, Liu X, Choo K-KR (2021) Secure semantic-aware search over dynamic spatial data in vanets. IEEE Trans Veh Technol 70(9):8912–8925CrossRef
35.
go back to reference Zhang J, Zhong H, Cui J, Tian M, Xu Y, Liu L (2020) Edge computing-based privacy-preserving authentication framework and protocol for 5g-enabled vehicular networks. IEEE Trans Veh Technol 69(7):7940–7954CrossRef Zhang J, Zhong H, Cui J, Tian M, Xu Y, Liu L (2020) Edge computing-based privacy-preserving authentication framework and protocol for 5g-enabled vehicular networks. IEEE Trans Veh Technol 69(7):7940–7954CrossRef
36.
go back to reference Liang X, Li X, Zhang K, Lu R, Lin X, Shen XS (2013) Fully anonymous profile matching in mobile social networks. IEEE J Sel Areas Commun 31(9):641–655CrossRef Liang X, Li X, Zhang K, Lu R, Lin X, Shen XS (2013) Fully anonymous profile matching in mobile social networks. IEEE J Sel Areas Commun 31(9):641–655CrossRef
37.
go back to reference Wang H, Wang Z, Domingo-Ferrer J (2018) Anonymous and secure aggregation scheme in fog-based public cloud computing. Futur Gener Comput Syst 78:712–719CrossRef Wang H, Wang Z, Domingo-Ferrer J (2018) Anonymous and secure aggregation scheme in fog-based public cloud computing. Futur Gener Comput Syst 78:712–719CrossRef
38.
go back to reference Gai K, Wu Y, Zhu L, Xu L, Zhang Y (2019) Permissioned blockchain and edge computing empowered privacy-preserving smart grid networks. IEEE Internet Things J 6(5):7992–8004CrossRef Gai K, Wu Y, Zhu L, Xu L, Zhang Y (2019) Permissioned blockchain and edge computing empowered privacy-preserving smart grid networks. IEEE Internet Things J 6(5):7992–8004CrossRef
40.
go back to reference Hoang VH, Lehtihet E, Ghamri-Doudane Y (2019) Forward-secure data outsourcing based on revocable attribute-based encryption. In: 2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC), pp. 1839–1846. IEEE Hoang VH, Lehtihet E, Ghamri-Doudane Y (2019) Forward-secure data outsourcing based on revocable attribute-based encryption. In: 2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC), pp. 1839–1846. IEEE
41.
go back to reference Zhang P, Chen Z, Liu JK, Liang K, Liu H (2018) An efficient access control scheme with outsourcing capability and attribute update for fog computing. Futur Gener Comput Syst 78:753–762CrossRef Zhang P, Chen Z, Liu JK, Liang K, Liu H (2018) An efficient access control scheme with outsourcing capability and attribute update for fog computing. Futur Gener Comput Syst 78:753–762CrossRef
42.
go back to reference Jiang Y, Xu X, Xiao F (2022) Attribute-based encryption with blockchain protection scheme for electronic health records. IEEE Trans Netw Serv Manag 19(4):3884–3895CrossRef Jiang Y, Xu X, Xiao F (2022) Attribute-based encryption with blockchain protection scheme for electronic health records. IEEE Trans Netw Serv Manag 19(4):3884–3895CrossRef
Metadata
Title
CIM: CP-ABE-based identity management framework for collaborative edge storage
Authors
Chunjiao Li
Liangmin Wang
Jiayi Li
Yue Fei
Publication date
11-01-2024
Publisher
Springer US
Published in
Peer-to-Peer Networking and Applications / Issue 2/2024
Print ISSN: 1936-6442
Electronic ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-023-01606-6

Other articles of this Issue 2/2024

Peer-to-Peer Networking and Applications 2/2024 Go to the issue

Premium Partner