1. Introduction
The construction of smart ocean management has become an important trend of smart ocean field. With the increasing requirements for the quality of management, a large number of problems have emerged. On the one hand, it is very significant to structure a secure memory space to ensure the data security (nautical data, ship position data, and ocean resources data, etc.). On the other hand, it is a problem that how to access these data safely and efficiently to meet the needs of navigation department, radar department, electromechanical department, and other departments on the warship. Especially, it has become an urgent problem that access to public data, such as computer rooms, conference rooms, control rooms, and other public resources. However, it is difficult to solve such thorny problems with traditional data processing schemes. Therefore, information and communication technologies to tackle the problem of smart ocean management emerge at a historic moment [
1,
2].
Because smart ocean management involves a large amount of complex data, for instance, confidential navigation roadmaps, high-dimensional remote sensing satellite image, and marine resource distribution maps, therefore, cloud computing technology is usually applied to shipboard server (SS). Cloud computing is an innovative change in smart ocean management. Compared with traditional computing technology, cloud computing has a lot of advantages in terms of storage and calculation of ocean data, therefore, it has received extensive interest from the academic community [
3,
4,
5]. By using cloud computing technology in smart ocean management, users can not only get limitless storage space, but also get limitless computing resources [
6]. Server data storage [
7,
8,
9] is a branch of distributed storage model, which is one of the most significant applications in smart ocean management. SS storage has many advantages, and the most extensive thing is data availability. However, the research on public data access is not too comprehensive, which refers to the situation where many users access public data. An occasion is smart ocean management as mentioned above. When acquiring important public resources, for example, crew and captain read confidential documents, security equipment and secret keys (two factors) are essential for users. Security equipment and secret keys are distributed by the central authority (CA) which communicates with the ship through a secure node transmission channel.
To prevent data from being stolen, researchers mostly design single public key encryption schemes [
10,
11,
12]. In general public key encryption schemes, the secret key required for decryption is often related to the public key. The key is generally stored in a private device or a trusted third party (TTP). If there is no malicious attack, this kind of secret key storage scheme is secure enough. Unfortunately, it often goes against one’s wishes. When being accessed through the Internet, private devices, and TTP are most likely to be attacked by illegal hackers, resulting in the secret key being stolen. But for all these, the users know nothing. In addition, please consider the following two real-life work occasions: Personal computers that store a user’s secret key may be used by others in cockpits, laboratories, and offices, public computers that record users’ login information will be shared by different users. Under these circumstances, the secret keys are able to be compromised by some malicious attackers who use technical or non technical means. Therefore, single secret key encryption scheme no longer satisfies certain security requirements in smart ocean management, and the two-factor data protection scheme arises at the historic moment.
We note that there are some other research works on two factors, such as [
13]. Nevertheless, the two factors in their works are different from ours, they leverage different technologies to design different systems. Here, we will not compare them with our present scheme.
As far as we know, ref. [
14], for the first time, provides two-factor data protection to support security device revocability. While the shceme in [
14] is actually an identity-based scheme, and ciphertext can be decrypted by only one user rather than a group of users. Therefore, ref. [
14] is only a solution to the storage problem of single user data, but it is not suitable for protecting public data in smart ocean management. In the era of shared economy, it is more worthwhile to study the privacy protection of public data.
1.1. Our Contribution
Inspired by [
14], we propose a two-factor public data protection scheme in smart ocean management. Note that message validation is presented to verify the correctness of the message after decrypting. The contributions of our research are as follows:
A practical attribute-based encryption (ABE) data protection scheme is proposed. In practical applications, public resources are more likely to be shared by many users. The security of these public resources is of great significance. In our scheme, we take advantage of an efficient ABE to address this problem. Ensure that only users who satisfy specific attributes can access public data.
A two-factor-based data protection scheme that supports revocation in smart ocean management is proposed. We apply this kind of data protection scheme to smart ocean management for the first time. Ocean-related data is often highly confidential, however, a single factor scheme does not meet the security requirements of the application layer. Therefore, we design a two-factor-based data protection scheme. In addition, when performing missions in the ocean environment, the sensor cards of the crew will inevitably be lost, for example slipping into the sea. Here, the revocation of the sensor cards is particularly important. Therefore, the revocation and redistribution of security equipment is also supported by our scheme.
A scheme that security equipment is independent of secret key is proposed. In our scheme, the distribution and update of security equipment is separated from secret key. Therefore, the threat to secret key due to the loss of the security equipment can be effectively reduced.
A SS security scheme is proposed. As is known to all, SS is a semi-trusted entity. However, in our scheme, SS cannot decrypt any ciphertext. At the same time, users can also complete the correctness verification of decrypted message.
More formal and complete security and performance analysis are proposed. According to the designed security model, descriptive language and rigorous mathematical proof are used in security analysis. The attacker’s success is reduced to the resolution of difficult problems. The security of the scheme is proved probabilistically. In performance analysis, similar schemes are compared with ours from different phases, thus achieving a more fine-grained comparison.
1.2. Related Works
In recent years, emerging technologies are booming and are reflected in many fields. In particular, the application and development of space and ocean. In 2018, Kim and Ben-Othman [
15] proposed a surveillance model for multi domain IoT environment, which is supported by reinforced barriers with collision-avoidance using heterogeneous smart unmanned aerial vehicles. In the field of oceans, in order to solve some problems in data collection of underwater acoustic sensor networks (UASNS), Han et al. [
16] proposed a stratification-based data collection scheme for three-dimensional UASNs. In addition, to achieve accurate and energy efficient trust evaluation in UASNs, an attack-resistant trust model based on multidimensional trust metrics is also proposed by Han et al. [
17].
In addition to the research directions mentioned above, research on SS also attracts the attention of academic groups at home and abroad. Among them, storage is a major research hotspot in SS. Various sub fields of storage, for instance, data encryption [
18], location detection [
19], privacy protection, and data sharing [
20,
21] are the subjects of intense discussion as well.
In 2005, Sahai and Waters [
22] first put forward fuzzy identity-based encryption (IBE) and further discussed in [
23], which are the original work of ABE. After that, two variants of ABE were proposed. They are key-policy ABE (KP-ABE) [
24] and ciphertext-policy ABE (CP-ABE) [
25,
26] respectively. The difference between them is that a given policy is associated with a key or a ciphertext. While the CP-ABE is the opposite of KP-ABE, and CP-ABE has a more important practical value. Later, lots of CP-ABE schemes with specific features are introduced by researchers. In 2008, Boldyreva et al. [
27] proposed an identity-based encryption scheme that supports efficient revocation operation. Now, the scheme has been applied in KP-ABE. In 2010, Yu et al. [
28] provided a CP-ABE scheme with attribute revocation. However, the length of private key and ciphertext are positively related to the number of required attributes. In addition, all attributes must be involved in key generation, encryption and decryption. Therefore, the scheme greatly increases overhead of computing and communication. Of course, in addition to revocability, there are many ABE scheme with other features. For example, schemes [
24,
25,
26,
29,
30,
31,
32] that require a fully trusted authority. Nevertheless, by leveraging above schemes can only achieve access control but not two-factor data protection, let alone revocation of factor in public data occasion.
In 2017, Shivanna et al. [
33] presented a double encryption privacy protection scheme. However, double encryption has a lot of defects. Loss of security equipment causes ciphertext to never be decrypted. Furthermore, this scheme makes the encryption process more complicated. In 2002, Dodis et al. [
34] first designed a key-insulated public key scheme to solve the problem of private key exposure. In 2003, Dodis et al. [
35] applied key insulated technology to digital signatures. However, in [
34], there is a great correlation between the master key and the public key. What is more, in [
35], frequent update of private key may lead to compromise of master secret key. For enhancing security of the master key, in 2006, Hanaoka et al. [
36] introduced the parallel key insulated public key encryption scheme. But the security of [
36] is proved under random oracle model. In 2007, Quisquater et al. [
37] proposed a parallel key-insulated public key encryption scheme in the standard model. In 2016, Wang et al. [
38] redesigned attribute-based data sharing mechanism to solve the key escrow problem. Simultaneously, weighted attributes in access policies are constructed by [
38] to improve the expression of scheme. However, the two-factor feature is not supported by [
38], let alone equipment revocation. In most of the above schemes, update of user’s private key requires the participation of security equipment. This is obviously not suitable for the protection of public data. Because we hope that the user’s private key is updated occasionally, and the security equipment is separated from the private key.
In contrast to the above schemes, we design a two-factor-based public data protection scheme in smart ocean management by utilizing an efficient ABE and public key encryption. Importantly, compared with [
14], the proposed scheme can achieve protection of public resources, not just personal data.
1.3. Organization
The rest of this paper is made up of the following sections.
Section 2 introduces some preliminary knowledge in cryptographic so that make it easier for readers to understand our works. The system model, notations, security model and system components are illustrated in
Section 3.
Section 4 describes our scheme in detail.
Section 5 and
Section 6 show the security and performance analyses, respectively. Finally,
Section 7 summarizes this paper.
2. Preliminaries
Before introducing our scheme in detail, it is inevitably to introduce some preliminaries in this section, including the bilinear maps, computational assumption, and attribute-based encryption.
2.1. Bilinear Maps
First, we define an algorithm, then input a security parameter k. Then, the algorithm outputs some parameters related to bilinear map, that is , where , are two multiplicative cyclic groups with prime order and , are generator of . A bilinear maps e: is efficient map when it satisfies the following three properties:
Bilinearity. For all , and , ;
Non-degeneracy. , , there is . Where represents the unit element of ;
Computability. , , there is at least an efficient algorithm to compute .
2.2. Computational Assumption
q-weak Decision Bilinear Diffie-Hellman Inversion (
q-wDBDHI) Assumption. For an algorithm
, the advantage of
decides the
q-wDBDHI is
. For the following equation:
there
.
q-wDBDHI assumption holds when
is negligible for any polynomial time algorithm.
2.3. Ciphertext-Policy Attribute-Based Encryption
CP-ABE is a cryptography technology for realizing one to many secure communication, where the DO shares message to specific users by constructing an access policy and embedding the policy into ciphertext. The most primitive CP-ABE consists of following four algorithms.
This algorithm takes a security parameter k as input. It outputs a public parameter and a master key .
This algorithm takes public parameter , the master key and an attribute set S as input. It outputs a private key related to the attribute S.
This algorithm takes the public parameter , a message M and an access policy as input. It outputs ciphertext such that only the user whose attribute set satisfies the access policy can decrypt.
This algorithm takes the public parameter , a ciphertext and a private key as input. If and only if the attribute set S of the user satisfies the access policy , the algorithm can decrypt the message M successfully.
3. Problem Statement
3.1. The System Model
As described in
Figure 1, the whole model contains four entities: Central Authority (CA), Data Owners (DOs), Users and Shipboard Server (SS).
Central Authority: A CA is considered to be a entity that possesses unlimited computing and storage capacity. Meanwhile, a CA is also a trusted party, and its tasks are to generate system parameters, manage users (i.e., enrolling users: distribuing the secret key to every user) and distribute security equipment (sensor cards). Furthermore, the update of the security equipment is also responsible for CA. In the process of updating, CA redistributes a security equipment to the user and informs SS to update the ciphertext.
Figure 2 shows the process of update.
Data Owners: DOs are owners of message stored in SS. All the message is encrypted by using ABE. Finally, DOs upload the generated ciphertext to SS.
Users: In smart ocean management, sailors, helmsman, managers and other crew are users. They can download the encrypted public data in SS. If the users want to get the message, they firstly do decrypt by using their security equipment and obtain the resulting primary ciphertext, then users with specific attributes can decrypt primary ciphertext by using their secret keys.
Shipboard Server (SS): It is not a credible entity in smart ocean management. Concretely, SS is honest-but-curious, which can honestly implement the assigned tasks and return corresponding results. However, it will also do its best to collect sensitive information. Generally, SS is regarded as a party with unlimited computing power and storage space. In this paper, the DOs upload the encrypted message (primary ciphertext) to SS, then SS uses the public information obtained from CA to encrypt primary ciphertext, resulting in secondary ciphertex. In addition, SS is responsible for updating ciphertext when users’ security equipment is redistributed.
3.2. Notations
As is shown in
Table 1, some primary notations used in our scheme are listed.
3.3. Security Model
In this paper, from the perspective of two factors, we mainly consider the following two threat models:
Type-1: Decrypt without security equipment. In this case, the adversary has the right secret key, however, it has no security equipment, or security equipment and secret keys do not match.
Type-2: Decrypt without secret key. This attack model is opposite to the previous model. In this situation, the adversary has a security equipment but no secret key, then it tries to decrypt the ciphertext.
3.4. System Components
The two-factor-based public data protection scheme in smart ocean management consists of six algorithms. The six algorithms are described separately as follows.
Setup: ()⟶(, ). The algorithm is run by CA. A security parameter k is taken as input. The algorithm outputs public parameters and master key .
Keygen and Security Equipment Distribution: (, , P)⟶(, , ). The algorithm is run by CA. On inputting the public parameters , the master secret key and the attribute P that users possess, the algorithm outputs secret key , public information , and secret information of security equipment.
Primary Encryption: (, A, m)⟶(). The algorithm is run by DOs. The input includes the public parameters , the message m and attribute set A. The output is the primary ciphertext .
Secondary Encryption: (, , )⟶(). The algorithm is run by SS. The public parameters, public information of security equipment and primary ciphertext are taken as input. The algorithm outputs secondary ciphertext .
Security Equipment Redistribution and Ciphertext Update: (, )⟶(). The algorithm is run by CA and SS. On inputting the public parameters and , the algorithm outputs the ciphertext .
Message Decryption: (, , or )⟶(m). The algorithm is run by users. The input includes secret information of security equipment, secret key and secondary ciphertext or . The output is message m.
4. Our Scheme
4.1. Setup
All public parameters and master key will be generated in the setup phase. These public parameters will be shared among all parties (including DOs, Users, SS, and CA). However, the master key can only be kept by CA. The specific process of setup is as follows.
- –
We define and as cyclic multiplicative groups of prime order p, and e: is the bilinear map.
- –
Choose , . Here k is a security parameter. Four collision resistant hash functions are chosen as follows: , , and . Meanwhile, setting .
- –
There are n attributes in our scheme. The attribute set can be denoted as . Each attribute has multiple attribute values . Each attribute value can be used as a user’s , but the pre N bits of the attribute value is used as a common attribute of the user, here N is a threshold. Give a simple example, 201801234 is a crew number of a crew, that is, the of the crew. 2018 is the crew’s year of admission, 01 is a department number, 234 is the sort number of the crew. When N is equal to 4, crew enrolled in 2018 can be identified. When N equals 6, the department can be identified. The public parameters is set to be .
4.2. Keygen and Security Equipment Distribution
Firstly, CA will distribute security equipment for every user according to the their . Secondly, CA is responsible for generating the secret keys for users which have specific attributes. Users can use their own security equipment and secret keys to decrypt ciphertext. The specific process is as follows.
- –
The CA chooses , and sets the public information of the security equipment as , and its corresponding secret information as . Finally, CA distributes a security equipment to a user and shares with the SS.
- –
The secret key is , where s is a mapping of the user’s attributes to strings. In addition, the set of attributes of each user is mapped to a unique string. P is a set of user-owned attributes.
4.3. Primary Encryption
DOs encrypt message based on attributes and send the encrypted messages to SS. Know public parameters , message and attributes set A. The process of primary encryption is as follows.
- –
Compute , , , , , and define , . Send the primary ciphertext to SS and broadcast M to all users.
4.4. Secondary Encryption
After receiving the primary ciphertext from DOs, SS will encrypt it second times, resulting in secondary ciphertext. Knowing public parameters , a primary ciphertext for the user and the information . The SS encrypts to secondary ciphertext as follows
- –
Choose , set . Compute , , , , . At this point, secondary ciphertext is .
4.5. Security Equipment Redistribution and Ciphertext Update Phase
Once the user’s security equipment is stolen or lost, user needs to report to CA, then CA redistributes a security equipment to the user. Here, the work done by CA is similar to the previous security equipment distribution process, so it is omitted.
At the same time, CA also sends information to inform SS to update ciphertext. The information is as follows
where
. After receiving
, the SS updates the ciphertext
as follows.
- –
- –
If the above equations are not set up, the scheme stops. Otherwise it continues to execute.
Finally, SS updates the ciphertext to .
4.6. Message Decryption
When users need to decrypt ciphertext, they can use security equipment and secret keys to decrypt. The two types of messages decryption are as follows:
- –
Security equipment and ciphertext are not updated.
Known
, so
. It is also known
. As a result, the following formula can be obtained
Because
and
are known, so users first use security equipment to compute
. The process is as follows
By decryption of the user’s security devices,
can be obtained. Next, CA checks whether the user’s
P can satisfy
A or not. If it is true, the CA computes
,
. The message can be decrypted as the following equation
Finally, users verify the correctness of the message by checking whether . If the computation result of the decryption, otherwise the message is wrong.
- –
Security equipment and ciphertext had been updated. In this case,
can be calculated by the following formula
The rest of the decryption process is similar to the above, so it is omitted.
4.7. Correctness Verification
If a user’s attributes set
P satisfies attribute sets
A in specific access structure, the user is able to decrypt the message correctly. Therefore, we have that
5. Security Analysis
In this section, security analysis consistent with previous security models is given.
For the Type-1 security model, here an adversary
can get the user’s secret key
, but it has no corresponding security equipment. Suppose
has got the secondary ciphertext
or updated ciphertext
, which are all stored in SS, where
,
,
,
,
,
,
,
,
.
tries to compute
. Of course,
first needs to be calculated, that is
From the above formula, it is easy to see that if correctly guesses the , it will be able to get successfully. Due to , the probability of guessing is . In addition, because of , is able to correctly guess the output of with probability . In summary, if wants to access the correct message, the probability of its guess is . As long as q and ∗ are big enough, the probability is ignorable.
Theorem 1. Suppose these hash function , and are all random oracles. Our scheme is secure against chosen plaintext attack under the security model if the 1-wDBDHI assumption holds.
Proof of Theorem 1. If just recovers the message with a secret key instead of a security equipment, then we can design an algorithm to break 1-wDBDHI the assumption.
Setup. is assigned an example of 1-wDBDHI problem. sets g, , , , chooses , and sends the public parameters to be to . Among them, are random oracles which is controlled by .
Phase 1. receives the following queries from .
Security equipment queries. randomly chooses , where the value of is 0 or 1. .
When . outputs randomly, and sends to .
When . if has already existed in . sends and to at the same time. Otherwise, chooses and set , . Finally, sends to , and returns to .
Secret key queries. sends a user’s to , which queries the secret key of this user. checks whether it has already owned and the corresponding . In this security model, sends to .
Message decryption queries. sends a ciphertext to . decrypts the message as follows.
For ciphertext . first checks whether there are tuples , then sets , , and . Finally, recovers and computes . For ciphertext . The process of the query is similar to the above, so it is omitted.
Challenge. outputs and . gets from the list . If , aborts and outputs . Else, proceeds.
For original ciphertext. chooses and . It sets , , , , , , , , . outputs .
For updated ciphertext. sets , here , , , , and .
Phase 2. guesses a bit . These simulated are perfect. If does not either send to or send E to before the challenge phase, the simulations of and also are perfect. and are denoted as events that has been issued to and T has been issued to , respectively.
We assume that as long as does not abort, the responses to the security equipment queries, secret key queries, and challenge phase are perfect. We denote as the event that aborts in the responses to the security equipment queries or in the challenge phase. Therefore, . The maximum of is . Where is the total number of security equipment queries. Thus, the minimum of probability is , here is the base of the natural logarithm.
As long as releases a valid original ciphertext with the help of , the simulation of ciphertext update queries is also considered to be perfect. The probability of the error in these events is , here is the number of ciphertext update queries.
As long as does not refuse the queries of some valid ciphertexts, the simulation of message decryption queries is perfect. , , and are these events that a valid ciphertext is returned, is issued to and is issued to , respectively. According to the above simulation, we can get and , here and are the numbers of querying and , respectively. is the probability that the event occurs. Therefore, we can get , here is the number of message decryption queries.
Based on the analysis of the above three simulations, the following probability relationships can be calculated.
Finally, we have that
as required, which completes the proof. □
For the Type-2 security model, according to the previous construction, although an has already owned security equipment, it has no secret key. Therefore, does not have enough attributes to satisfy the A, and it can’t decrypt the ciphertext to get message. Because SS is a semi-trusted entity, message m is encrypted and uploaded by the DO. Meanwhile, attribute sets and access policy formulated by DO are also incorporated into ciphertext.
In the process of ABE, a message m is obfuscated with the , here, is determined by the attribute sets and access policy A, the k is security parameter which is randomly generated in every oracle. From the above analysis, the is secure, and the message m is also secure.
In the process of decryption, does not have or has the wrong secret key, it can’t get the attribute set P which is granted by CA. CA is a trusted party, it won’t have a collusion attack with SS. From the above analysis, as long as is not easy to crack, the message m is secure.
6. Performance Analysis
In this section, the performance of proposed scheme is analyzed from different perspectives. Meanwhile, the comparison with [
14,
38] is also analyzed in terms of features, communication and computational cost. The results of the comparison reveal that our scheme is more suitable for the protection of public data resources and achieves more functions, but dosen’t require a great increase of cost. In general, our scheme is more suitable to be practically deployed
First of all, some notations used in efficiency analysis are defined as follows. and are utilized to denote the length of an element in groups and , l denotes the length of security parameter, denotes the key length of a symmetric encryption algorithm, denotes the length of an element in . and denote the length of message m and arbitrary 01 strings, respectively. , , , and H are utilized to denote the cost of a bilinear pairing, an exponentiation in , an exponentiation in and a one-way hash function, respectively. and are utilized to denote the cost of symmetric encryption and decryption, respectively. In our scheme, the calculation of the bilinear pairing and the exponentiation is over the supersingular elliptic curve, which is defined in preliminaries. Thus, the computational complexities of the bilinear pairing is . Here, m is the extension degree of the finite field . n denotes the number of users.
For features comparison. We compare our scheme with [
14,
38] in terms of access control policy, two-factor protection, equipment revocation and key and equipment separation. The results are shown in
Table 2. Compared with [
14,
38] respectively, it can be seen that only our scheme can achieve all the three functions at the same time. Compared with our scheme, ref. [
14] cannot simultaneously share data with a group of users, limited scope of application may be a major drawback. Especially, it is worth saying that since [
38] does not support the two-factor mechanism, which greatly reduces the security of this scheme. In short, refs. [
14,
38] only achieve partial design goal of our scheme.
For theoretical comparison. Communication, computational and time complexity comparison are demonstrated in
Table 3,
Table 4 and
Table 5, respectively. In
Table 4, KSED, PE, SE, SERCU, MDSC, and MDUC are initial capitalization of keygen and security equipment distribution, primary encryption, secondary encryption, security equipment redistribution and ciphertext update, message decryption (from secondary ciphertext) and message decryption (from updated ciphertext), respectively. In the rest of this paper, this abbreviation will also be used. Compared with [
38] which lacks two-factor data protection, it can be seen that our scheme requires increase a little computational cost in security equipment redistribution and ciphertext update phase. This is because the redistribution of security equipment is supported by our scheme. In the process of ciphertext generation, our scheme does not require a symmetric encryption operation. Furthermore, it is worth of mentioning that cost of secondary encryption can be outsourced to SS. A similar situation also exists in
Table 3, which is that our scheme needs extra communication cost in transmission of security equipment and updating ciphertext. However, the total cost of our scheme is less than [
38]. Compared with [
14] which lacks public data protection, the cost of our scheme is less than [
14] at all phases, this is mainly due to the fact that an efficient ABE is adopted by our scheme. In addition, under the premise of ensuring safety, the generation and redistribution of security equipment of our scheme is also more streamlined than [
14]. It can be seen from
Table 5 that the time complexity of our scheme is not higher than [
14,
38]. Moreover, the computational complexity of our scheme is linearly related with the number of users, which indicates that our scheme is suitable for a real time security guard scenario.
For practical comparison. In practical efficiency test, the test environment is set to be: Intel(R) Core(TM) i5-6500 CPU @ 3.2 GHz, 8 GB RAM, GNU Multiple Precision Arithmetic (GMP) library, Pairing-Based Cryptography (PBC) library, and C language are used on a Linux system with Ubuntu 16.04 TLS. Microsoft Office Excel 2016 and Matlab 2016a are used by us as tools for drawing statistical figures. As we all know, PBC library is a free and portable C language library. Through an abstract interface, programmers can implement pair-based cryptosystem without considering the specific mathematical details or even the knowledge of elliptic curve and theory. Ubuntu 16.04 TLS is a free open source desktop operating system based on Linux, which combines Windows visualization and Linux stability. The comparison results are shown in
Figure 3, as the number of users increases, the computational cost of the three schemes almost increases linearly, but the growth trend of our scheme is slow, and it is consistent with previous theoretical analysis.
In order to make a more comprehensive comparison, the computational cost of attributes is also introduced. As shown in
Figure 4, (a) is the three-dimensional experimental result of our scheme, (b) is the experimental result of [
38], and (c) is the experimental result of [
14]. We set the number of users varies from 0 to 10,000 and the number of attributes varies from 0 to 1,000,000. The computational cost increases when either the number of users or the number of attributes. It is easy to see that although upward trends of the three figures are similar, the trend of our scheme is more gentle. For example, when the number of users and the number of attributes are 1000 and 1,000,000 respectively, time less than 600 s is consumed in our scheme, whereas [
14,
38] take more than 600 s, which also indicates the high efficiency of our scheme.
Figure 5 compares computational cost of our scheme with [
14,
38] from different phases. Here, the number of attributes per user is set to 2. (a) shows the computational time for generating key and distributing security equipment. Apparently, the computational cost of [
14] is a little more than our scheme, however, the computational cost of [
38] is much greater than our scheme and grows faster. The main reason for this situation is that there are more bilinear pairing operations and hash functions in [
14,
38] at this phase. (c), (d) and (f) demonstrate the computational time of secondary encryption, security equipment redistribution, and ciphertext update and message decryption (from updated ciphertext) respectively. The analysis of them is similar to (a) and is not covered here. (b), and (e) show the computational cost of primary encryption and message decryption (from secondary ciphertext) respectively. In the above two phases, the computational cost of [
38] is less than our scheme. The main reason is that symmetric encryption and decryption algorithms are applied in [
38] at these two phases. It is well known that symmetric encryption algorithms are generally more efficient than public key encryption algorithms. However, the total computational cost of each phase of [
38] is still higher than our scheme.
In order to evaluate the performance more intuitively, the simulation experiment of our scheme, refs. [
14,
38] are deployed on a mobile device. The experiment is implemented on Nexus 5X Android virtual machine with Four-core CPU, 2 GB running memory, and 32 G body memory. Moreover, the codes are written in Android Studio with Java programming language to obtain the experimental results.
Figure 6 is one of experimental results of three different schemes obtained from the mobile device. It is easy to see from
Figure 6 that 1607.48 ms, 2221.67 ms, and 1977.32 ms are cost of our schme, [
14,
38] respectively when the number of attributes is 50. The simulation result for each phase is also consistent with
Figure 5. Obviously, our scheme is more suitable for deployment in a real-world application.
In short, through the above various performance analysis, it is not difficult to find that our scheme can achieve two-factor protection for public data and redistribution of security equipment with less overhead.
7. Conclusions
Various data resources are important objects of ocean management, which may involve navigation, mining, shipping, and even national security, secure and efficient data protection schemes are especially needed. At present, the research on two-factor data security protection scheme and smart ocean management is flourishing. Given the shortcomings of existing schemes, we propose a two-factor-based public data protection scheme in smart ocean management. In our scheme, DOs are allowed to encrypt the message with some attributes (including access policy), users who satisfy certain attributes can combine their own secret keys and security equipment to decrypt ciphertext. In addition, the revocation of security equipment is also an important advantage of our scheme, which solves the problem of equipment loss well and brings many conveniences to smart ocean management. The analysis of security and performance shows that our scheme is more efficient than similar schemes on the premise of ensuring security.
Although sufficient contributions have been included in our works, there are still several challenges that we will leave as a future work. Firstly, our scheme supports one-time equipment revocation that may be not sufficient enough in practice. Therefore, multiple revocation for equipment will be one of the next works to be completed. Secondly, the access policy in our scheme is only an abstract framework and does not involve specific access control structures, such as tree or matrix. Therefore, how to design a specific access control structure to better adapt to smart ocean management is one of the further works.