首页 > 最新文献

Journal of Information Security and Applications最新文献

英文 中文
Beyond Reinforcement Learning for network security: A comprehensive survey and tutorial 超越强化学习的网络安全:一个全面的调查和教程
IF 3.7 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-01-01 Epub Date: 2025-11-12 DOI: 10.1016/j.jisa.2025.104294
Amir Javadpour , Forough Ja’fari , Tarik Taleb , Fatih Turkmen , Chafika Benzaïd
Maintaining strong security is a complex yet vital challenge in the rapidly evolving landscape of modern digital networks. The risks and consequences of security breaches make neglecting network protection unacceptable. Fortunately, ongoing advances in computer science have equipped researchers with powerful tools to reinforce network defenses. Among these, Reinforcement Learning (RL), a branch of machine learning, has gained significant attention for its versatility and effectiveness in strengthening security mechanisms. This paper presents a comprehensive survey and tutorial on the role of RL in network security. It provides background information, a step-by-step tutorial for training RL models, and systematically categorizes research efforts based on the targeted cyber threats. Leveraging recent advances and real-world applications, this survey elucidates how RL enables the development of adaptive and intelligent systems that autonomously learn and respond to evolving threats. Through in-depth analysis, we provide a comprehensive view of the current landscape and the future potential of RL in safeguarding digital assets. The main contributions of this survey are: (1) a systematic and up-to-date review of RL approaches for network security; (2) a unified taxonomy for classifying RL-based solutions; (3) a comparison of the latest advances from 2019 to 2024 across mainstream and emerging research areas; (4) identification of open challenges and future research directions; and (5) a comparative analysis of state-of-the-art models, offering practical insights for both researchers and practitioners. Furthermore, this survey emphasizes the practical translation of RL advances into real-world deployments. By focusing on hands-on implementation guidelines and comparative analyses of deployment scenarios, it bridges the gap between academic research and operational practice. The comprehensive evaluation of RL-based models across different network environments provides actionable insights for practitioners seeking adaptive and scalable security solutions in dynamic and heterogeneous settings.
在快速发展的现代数字网络环境中,保持强大的安全性是一项复杂而又至关重要的挑战。安全漏洞的风险和后果使得忽视网络保护是不可接受的。幸运的是,计算机科学的不断进步为研究人员提供了强大的工具来加强网络防御。其中,强化学习(RL)作为机器学习的一个分支,因其在加强安全机制方面的多功能性和有效性而受到广泛关注。本文对RL在网络安全中的作用进行了全面的综述和介绍。它提供了背景信息、训练强化学习模型的分步教程,并根据目标网络威胁系统地对研究工作进行了分类。利用最新的进展和现实世界的应用,本调查阐明了强化学习如何使自适应和智能系统的开发能够自主学习和响应不断变化的威胁。通过深入分析,我们全面了解了RL在保护数字资产方面的现状和未来潜力。本调查的主要贡献是:(1)对网络安全的RL方法进行了系统和最新的回顾;(2)基于rl的解决方案的统一分类;(3) 2019 - 2024年主流与新兴研究领域的最新进展对比;(4)确定开放性挑战和未来研究方向;(5)对最先进的模型进行了比较分析,为研究人员和实践者提供了实践见解。此外,本调查强调了将强化学习的进步实际转化为现实世界的部署。通过关注实际的实现指南和部署场景的比较分析,它弥合了学术研究和操作实践之间的差距。跨不同网络环境的基于rl的模型的综合评估为从业者在动态和异构设置中寻求自适应和可扩展的安全解决方案提供了可操作的见解。
{"title":"Beyond Reinforcement Learning for network security: A comprehensive survey and tutorial","authors":"Amir Javadpour ,&nbsp;Forough Ja’fari ,&nbsp;Tarik Taleb ,&nbsp;Fatih Turkmen ,&nbsp;Chafika Benzaïd","doi":"10.1016/j.jisa.2025.104294","DOIUrl":"10.1016/j.jisa.2025.104294","url":null,"abstract":"<div><div>Maintaining strong security is a complex yet vital challenge in the rapidly evolving landscape of modern digital networks. The risks and consequences of security breaches make neglecting network protection unacceptable. Fortunately, ongoing advances in computer science have equipped researchers with powerful tools to reinforce network defenses. Among these, Reinforcement Learning (RL), a branch of machine learning, has gained significant attention for its versatility and effectiveness in strengthening security mechanisms. This paper presents a comprehensive survey and tutorial on the role of RL in network security. It provides background information, a step-by-step tutorial for training RL models, and systematically categorizes research efforts based on the targeted cyber threats. Leveraging recent advances and real-world applications, this survey elucidates how RL enables the development of adaptive and intelligent systems that autonomously learn and respond to evolving threats. Through in-depth analysis, we provide a comprehensive view of the current landscape and the future potential of RL in safeguarding digital assets. The main contributions of this survey are: (1) a systematic and up-to-date review of RL approaches for network security; (2) a unified taxonomy for classifying RL-based solutions; (3) a comparison of the latest advances from 2019 to 2024 across mainstream and emerging research areas; (4) identification of open challenges and future research directions; and (5) a comparative analysis of state-of-the-art models, offering practical insights for both researchers and practitioners. Furthermore, this survey emphasizes the practical translation of RL advances into real-world deployments. By focusing on hands-on implementation guidelines and comparative analyses of deployment scenarios, it bridges the gap between academic research and operational practice. The comprehensive evaluation of RL-based models across different network environments provides actionable insights for practitioners seeking adaptive and scalable security solutions in dynamic and heterogeneous settings.</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"96 ","pages":"Article 104294"},"PeriodicalIF":3.7,"publicationDate":"2026-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145520862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reversible data hiding in encrypted images using adaptive block-level pixel difference encoding 可逆数据隐藏在加密图像使用自适应块级像素差异编码
IF 3.7 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-01-01 Epub Date: 2025-11-18 DOI: 10.1016/j.jisa.2025.104316
Hua Ren, Zhen Yue, Ming Li
The blooming cloud storage has brought great convenience for users to upload multimedia data on remote cloud servers and efficiently access the uploaded data through terminals. With the accumulation of user data, how to effectively manage cloud user data while ensuring security becomes particularly important. Reversible Data Hiding in Encrypted Images (RDHEI) is an effective privacy-preserving technology that can embed user identity information, tags, time stamps or other data into encrypted images to facilitate the management of multi-user data. However, the capacity of existing RDHEI methods is not ideal due to the less redundancy in encrypted images. In this paper, a high-capacity RDHEI method using Adaptive Block-level Pixel Difference Encoding (ABPDE) is proposed. Firstly, the content owner uses the block modulation and permutation to encrypt the original image to preserve some redundant space. Secondly, the data hider counts the frequency of occurrence of pixel differences and uses adaptive Huffman encoding to mark the encrypted pixels as embeddable and non-embeddable pixels. The generated Huffman table is embedded into some reference pixels, the side information consisting of the replaced reference pixels and non-embeddable bits is embedded into some embeddable pixels, and the remaining embeddable pixels are used to carry additional data. Finally, a receiver holding the relevant keys can extract the embedded data without errors and reversibly recover the original image. Extensive simulations illustrate that the proposed method is superior to state-of-the-art methods in capacity and security, and the average embedding rates are at least 0.2845 bpp and 0.2900 bpp higher than other state-of-the-art methods on the BOSSbase and BOWS-2 databases, respectively.
蓬勃发展的云存储为用户在远程云服务器上上传多媒体数据以及通过终端高效访问上传的数据带来了极大的便利。随着用户数据的积累,如何在保证安全的同时对云用户数据进行有效管理显得尤为重要。加密图像中的可逆数据隐藏(rdhi)是一种有效的隐私保护技术,它可以将用户身份信息、标签、时间戳或其他数据嵌入到加密图像中,以方便多用户数据的管理。然而,由于加密图像的冗余较少,现有的rdhi方法的容量并不理想。本文提出了一种基于自适应块级像素差编码(ABPDE)的大容量rdhi方法。首先,内容所有者使用分组调制和排列对原始图像进行加密,以保留冗余空间;其次,数据隐藏器计算像素差异出现的频率,并使用自适应霍夫曼编码将加密像素标记为可嵌入像素和不可嵌入像素。将生成的霍夫曼表嵌入到一些参考像素中,将替换的参考像素和不可嵌入位组成的边信息嵌入到一些可嵌入像素中,剩余的可嵌入像素用于携带附加数据。最后,接收器持有相应的密钥,可以准确无误地提取嵌入的数据,并可逆地恢复原始图像。大量的仿真结果表明,该方法在容量和安全性方面都优于目前最先进的方法,并且在bosssbase和BOWS-2数据库上的平均嵌入率分别比其他最先进的方法高0.2845 bpp和0.2900 bpp。
{"title":"Reversible data hiding in encrypted images using adaptive block-level pixel difference encoding","authors":"Hua Ren,&nbsp;Zhen Yue,&nbsp;Ming Li","doi":"10.1016/j.jisa.2025.104316","DOIUrl":"10.1016/j.jisa.2025.104316","url":null,"abstract":"<div><div>The blooming cloud storage has brought great convenience for users to upload multimedia data on remote cloud servers and efficiently access the uploaded data through terminals. With the accumulation of user data, how to effectively manage cloud user data while ensuring security becomes particularly important. Reversible Data Hiding in Encrypted Images (RDHEI) is an effective privacy-preserving technology that can embed user identity information, tags, time stamps or other data into encrypted images to facilitate the management of multi-user data. However, the capacity of existing RDHEI methods is not ideal due to the less redundancy in encrypted images. In this paper, a high-capacity RDHEI method using Adaptive Block-level Pixel Difference Encoding (ABPDE) is proposed. Firstly, the content owner uses the block modulation and permutation to encrypt the original image to preserve some redundant space. Secondly, the data hider counts the frequency of occurrence of pixel differences and uses adaptive Huffman encoding to mark the encrypted pixels as embeddable and non-embeddable pixels. The generated Huffman table is embedded into some reference pixels, the side information consisting of the replaced reference pixels and non-embeddable bits is embedded into some embeddable pixels, and the remaining embeddable pixels are used to carry additional data. Finally, a receiver holding the relevant keys can extract the embedded data without errors and reversibly recover the original image. Extensive simulations illustrate that the proposed method is superior to state-of-the-art methods in capacity and security, and the average embedding rates are at least 0.2845 bpp and 0.2900 bpp higher than other state-of-the-art methods on the BOSSbase and BOWS-2 databases, respectively.</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"96 ","pages":"Article 104316"},"PeriodicalIF":3.7,"publicationDate":"2026-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145569600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PER-AE-DRL: A malicious traffic detection model based on prioritized experience replay and adversarial mechanism PER-AE-DRL:一种基于优先体验重放和对抗机制的恶意流量检测模型
IF 3.7 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-01-01 Epub Date: 2025-11-18 DOI: 10.1016/j.jisa.2025.104298
Peihao Liu, Yuntao Zhao, Yongxin Feng
With the rapid advancement of information technology, cybersecurity threats have become more sophisticated, making network intrusion detection vital for ensuring network security. Although existing detection methods have made significant progress in identifying malicious traffic, data class imbalance remains a key challenge. This paper proposes a deep reinforcement learning-based malicious traffic detection model that integrates an adversarial mechanism and Prioritized Experience Replay (PER). First, an environment agent is introduced into the Dueling Double Deep Q-Network (Dueling DDQN) framework to address the data imbalance by resampling the training set. Then, a TD-error-based prioritized experience replay mechanism is introduced, which prioritizes samples with larger TD errors during neural network updates, thereby accelerating model convergence and enhancing learning ability for minority class samples. Finally, through multi-class classification experiments on the NSL-KDD and CIC-IDS2017 datasets, the proposed model achieved an accuracy of 83.41% and an F1 score of 83.39% on the NSL-KDD dataset. On the CIC-IDS2017 dataset, the model achieved both an accuracy and an F1 score exceeding 99%.
随着信息技术的飞速发展,网络安全威胁日趋复杂,网络入侵检测对于保障网络安全至关重要。尽管现有的检测方法在识别恶意流量方面取得了重大进展,但数据类不平衡仍然是一个关键挑战。本文提出了一种基于深度强化学习的恶意流量检测模型,该模型集成了对抗机制和优先体验重放(PER)。首先,在Dueling Double Deep Q-Network (Dueling DDQN)框架中引入环境代理,通过对训练集进行重采样来解决数据不平衡问题。然后,引入一种基于TD误差的优先经验重放机制,在神经网络更新时优先考虑TD误差较大的样本,从而加快模型收敛速度,增强对少数类样本的学习能力。最后,通过在NSL-KDD和CIC-IDS2017数据集上的多类分类实验,该模型在NSL-KDD数据集上的准确率达到83.41%,F1分数达到83.39%。在CIC-IDS2017数据集上,该模型的准确率和F1得分均超过99%。
{"title":"PER-AE-DRL: A malicious traffic detection model based on prioritized experience replay and adversarial mechanism","authors":"Peihao Liu,&nbsp;Yuntao Zhao,&nbsp;Yongxin Feng","doi":"10.1016/j.jisa.2025.104298","DOIUrl":"10.1016/j.jisa.2025.104298","url":null,"abstract":"<div><div>With the rapid advancement of information technology, cybersecurity threats have become more sophisticated, making network intrusion detection vital for ensuring network security. Although existing detection methods have made significant progress in identifying malicious traffic, data class imbalance remains a key challenge. This paper proposes a deep reinforcement learning-based malicious traffic detection model that integrates an adversarial mechanism and Prioritized Experience Replay (PER). First, an environment agent is introduced into the Dueling Double Deep Q-Network (Dueling DDQN) framework to address the data imbalance by resampling the training set. Then, a TD-error-based prioritized experience replay mechanism is introduced, which prioritizes samples with larger TD errors during neural network updates, thereby accelerating model convergence and enhancing learning ability for minority class samples. Finally, through multi-class classification experiments on the NSL-KDD and CIC-IDS2017 datasets, the proposed model achieved an accuracy of 83.41% and an F1 score of 83.39% on the NSL-KDD dataset. On the CIC-IDS2017 dataset, the model achieved both an accuracy and an F1 score exceeding 99%.</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"96 ","pages":"Article 104298"},"PeriodicalIF":3.7,"publicationDate":"2026-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145569601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A privacy-preserving information sharing scheme in online social networks 在线社交网络中保护隐私的信息共享方案
IF 3.7 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-01-01 Epub Date: 2025-11-21 DOI: 10.1016/j.jisa.2025.104304
Yehong Luo , Nafei Zhu , Jingsha He , Anca Delia Jurcut , Yuzi Yi , Xiangjun Ma , Juan Fang
Information leakage during sharing among users is a critical concern for individuals in online social networks (OSNs). The key to addressing the concern is to align privacy protection policies with the subjective willingness of privacy subjects to maximize the utility of information while achieving privacy protection. In this paper, we propose a new framework that can be used to dynamically modulate the extent of information sharing and privacy protection by regulating the scale of propagation of privacy information. In the proposed framework, we firstly define privacy information propagation conditions (PPCs) and then design a PPC-based privacy-preserving information sharing scheme. This scheme performs privacy risk assessment according to the subjective willingness and the consensus on the sensitivity of privacy information as the basis for trade-offs between privacy protection and information sharing. We introduce PPC-TD3, a variant of Twin Delayed Deep Deterministic policy gradient (TD3) integrated with our PPC framework, to identify decision points that maximize information-sharing utility while ensuring robust privacy protection. Theoretical analysis and extensive experiment show that the proposed framework can optimally balance privacy protection and information sharing through identifying the point where the utility of information is maximized.
在线社交网络(online social network, OSNs)中,用户共享过程中的信息泄露是个人关注的一个重要问题。解决这一问题的关键是使隐私保护政策符合隐私主体的主观意愿,在实现隐私保护的同时实现信息效用最大化。在本文中,我们提出了一个新的框架,可以通过调节隐私信息的传播规模来动态调节信息共享和隐私保护的程度。在该框架中,我们首先定义了隐私信息传播条件(PPCs),然后设计了一个基于PPCs的隐私信息共享方案。该方案根据隐私信息的主观意愿和对隐私信息敏感性的共识进行隐私风险评估,作为隐私保护与信息共享之间权衡的基础。我们引入了PPC-TD3,这是双延迟深度确定性策略梯度(TD3)的一种变体,与我们的PPC框架集成在一起,以确定最大限度地提高信息共享效用的决策点,同时确保强大的隐私保护。理论分析和大量实验表明,该框架通过识别信息效用最大化的点,可以实现隐私保护和信息共享的最优平衡。
{"title":"A privacy-preserving information sharing scheme in online social networks","authors":"Yehong Luo ,&nbsp;Nafei Zhu ,&nbsp;Jingsha He ,&nbsp;Anca Delia Jurcut ,&nbsp;Yuzi Yi ,&nbsp;Xiangjun Ma ,&nbsp;Juan Fang","doi":"10.1016/j.jisa.2025.104304","DOIUrl":"10.1016/j.jisa.2025.104304","url":null,"abstract":"<div><div>Information leakage during sharing among users is a critical concern for individuals in online social networks (OSNs). The key to addressing the concern is to align privacy protection policies with the subjective willingness of privacy subjects to maximize the utility of information while achieving privacy protection. In this paper, we propose a new framework that can be used to dynamically modulate the extent of information sharing and privacy protection by regulating the scale of propagation of privacy information. In the proposed framework, we firstly define privacy information propagation conditions (PPCs) and then design a PPC-based privacy-preserving information sharing scheme. This scheme performs privacy risk assessment according to the subjective willingness and the consensus on the sensitivity of privacy information as the basis for trade-offs between privacy protection and information sharing. We introduce PPC-TD3, a variant of Twin Delayed Deep Deterministic policy gradient (TD3) integrated with our PPC framework, to identify decision points that maximize information-sharing utility while ensuring robust privacy protection. Theoretical analysis and extensive experiment show that the proposed framework can optimally balance privacy protection and information sharing through identifying the point where the utility of information is maximized.</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"96 ","pages":"Article 104304"},"PeriodicalIF":3.7,"publicationDate":"2026-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145569602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Revocable multi-authority attribute-based keyword search scheme for enhanced security in multi-owner settings 可撤销的基于多授权机构属性的关键字搜索方案,用于增强多所有者设置中的安全性
IF 3.7 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-01-01 Epub Date: 2025-11-20 DOI: 10.1016/j.jisa.2025.104315
Zongmin Wang, Qiang Wang, Fucai Zhou, Jian Xu
Attribute-based keyword search (ABKS) has emerged as an effective approach for secure, fine-grained data retrieval in encrypted cloud environments. Although traditional ABKS effectively enforces access policies, it suffers from significant limitations in multi-owner settings, where decentralized control and collaborative governance are required. In addition, existing ABKS schemes encounter several unresolved security challenges. First, as ABKS is built upon attribute-based encryption (ABE), it inevitably inherits its shortcomings, including key escrow and single points of failure. Second, it lacks the ability to detect servers that intentionally return incorrect results, while existing verification mechanisms risk exposing sensitive information. Third, misbehaving cloud service providers face no penalty and may continue to provide services without restriction.
To address these challenges, we propose a revocable multi-authority attribute-based keyword search (RMA-ABKS) scheme tailored for multi-owner environments. RMA-ABKS integrates multi-authority ABE with searchable encryption to decentralize trust and eliminate key escrow, while enabling collaborative access policy formulation across multiple owners. For the remaining challenges, we incorporate a blockchain-based blind verification mechanism to ensure result integrity without privacy leakage, and a cryptographic revocation mechanism to disable malicious cloud servers. Formal security proofs demonstrate selective security and resilience, while experimental evaluations confirm computational efficiency comparable to advanced schemes.
基于属性的关键字搜索(ABKS)已经成为加密云环境中安全、细粒度数据检索的有效方法。尽管传统的ABKS有效地执行了访问策略,但它在多所有者设置中存在显着的局限性,其中需要分散控制和协作治理。此外,现有的ABKS方案遇到了一些未解决的安全挑战。首先,由于ABKS建立在基于属性的加密(ABE)之上,它不可避免地继承了它的缺点,包括密钥托管和单点故障。其次,它缺乏检测故意返回错误结果的服务器的能力,而现有的验证机制有暴露敏感信息的风险。第三,行为不端的云服务提供商不会受到处罚,可以继续不受限制地提供服务。为了解决这些挑战,我们提出了一种针对多所有者环境量身定制的可撤销的多权威基于属性的关键字搜索(RMA-ABKS)方案。RMA-ABKS将多权威ABE与可搜索加密集成在一起,以分散信任并消除密钥托管,同时实现跨多个所有者的协作访问策略制定。对于剩下的挑战,我们采用了基于区块链的盲验证机制来确保结果的完整性而不会泄露隐私,并采用了加密撤销机制来禁用恶意云服务器。正式的安全证明证明了选择性安全性和弹性,而实验评估证实了与高级方案相当的计算效率。
{"title":"Revocable multi-authority attribute-based keyword search scheme for enhanced security in multi-owner settings","authors":"Zongmin Wang,&nbsp;Qiang Wang,&nbsp;Fucai Zhou,&nbsp;Jian Xu","doi":"10.1016/j.jisa.2025.104315","DOIUrl":"10.1016/j.jisa.2025.104315","url":null,"abstract":"<div><div>Attribute-based keyword search (ABKS) has emerged as an effective approach for secure, fine-grained data retrieval in encrypted cloud environments. Although traditional ABKS effectively enforces access policies, it suffers from significant limitations in multi-owner settings, where decentralized control and collaborative governance are required. In addition, existing ABKS schemes encounter several unresolved security challenges. First, as ABKS is built upon attribute-based encryption (ABE), it inevitably inherits its shortcomings, including key escrow and single points of failure. Second, it lacks the ability to detect servers that intentionally return incorrect results, while existing verification mechanisms risk exposing sensitive information. Third, misbehaving cloud service providers face no penalty and may continue to provide services without restriction.</div><div>To address these challenges, we propose a revocable multi-authority attribute-based keyword search (RMA-ABKS) scheme tailored for multi-owner environments. RMA-ABKS integrates multi-authority ABE with searchable encryption to decentralize trust and eliminate key escrow, while enabling collaborative access policy formulation across multiple owners. For the remaining challenges, we incorporate a blockchain-based blind verification mechanism to ensure result integrity without privacy leakage, and a cryptographic revocation mechanism to disable malicious cloud servers. Formal security proofs demonstrate selective security and resilience, while experimental evaluations confirm computational efficiency comparable to advanced schemes.</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"96 ","pages":"Article 104315"},"PeriodicalIF":3.7,"publicationDate":"2026-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145569603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain-based threshold proxy re-encryption scheme with zero-knowledge proofs for confidential and verifiable IoT networks 基于区块链的阈值代理再加密方案,具有零知识证明,用于机密和可验证的物联网网络
IF 3.7 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-01-01 Epub Date: 2025-11-13 DOI: 10.1016/j.jisa.2025.104300
Vinay Rishiwal , Ved Prakash Mishra , A. Jayanthiladevi , Vinay Maurya , Udit Agarwal , Mano Yadav
The rapid proliferation of interconnected devices within the Internet of Things (IoT) continues to generate vast amounts of sensitive, context-rich data, raising significant concerns regarding data confidentiality, verifiability, trust management, and systemic resilience. Traditional IoT network architectures typically rely on centralised third-party entities. This reliance creates single points of failure and elevates the risk of unauthorised data access. To address these limitations, this paper proposes a confidential and verifiable IoT network based on a decentralised security architecture that integrates blockchain with proxy re-encryption. The framework uses threshold cryptography and zero-knowledge proofs to enable privacy-preserving transformations of ciphertext across consensus nodes. This design protects sensitive data while preserving transaction verifiability and integrity. As a result, the system effectively counters threats such as node collusion, Sybil attacks, and metadata leakage. Comprehensive simulations and performance evaluations underscore that the presented model substantially diminishes dependence on centralised proxies while delivering enhanced scalability, robust security, and increased trustworthiness, making it particularly well-suited for practical implementation in confidential IoT environments.
物联网(IoT)中互连设备的快速扩散继续产生大量敏感的、上下文丰富的数据,引起了对数据机密性、可验证性、信任管理和系统弹性的重大关注。传统的物联网网络架构通常依赖于集中式第三方实体。这种依赖造成了单点故障,并增加了未经授权访问数据的风险。为了解决这些限制,本文提出了一个基于分散安全架构的机密和可验证的物联网网络,该架构将区块链与代理重新加密集成在一起。该框架使用阈值密码学和零知识证明来实现跨共识节点的密文隐私保护转换。这种设计保护敏感数据,同时保持事务的可验证性和完整性。有效应对节点合谋、Sybil攻击、元数据泄露等威胁。综合模拟和性能评估强调,所提出的模型大大减少了对集中式代理的依赖,同时提供了增强的可扩展性、强大的安全性和更高的可信度,使其特别适合在机密物联网环境中实际实施。
{"title":"Blockchain-based threshold proxy re-encryption scheme with zero-knowledge proofs for confidential and verifiable IoT networks","authors":"Vinay Rishiwal ,&nbsp;Ved Prakash Mishra ,&nbsp;A. Jayanthiladevi ,&nbsp;Vinay Maurya ,&nbsp;Udit Agarwal ,&nbsp;Mano Yadav","doi":"10.1016/j.jisa.2025.104300","DOIUrl":"10.1016/j.jisa.2025.104300","url":null,"abstract":"<div><div>The rapid proliferation of interconnected devices within the Internet of Things (IoT) continues to generate vast amounts of sensitive, context-rich data, raising significant concerns regarding data confidentiality, verifiability, trust management, and systemic resilience. Traditional IoT network architectures typically rely on centralised third-party entities. This reliance creates single points of failure and elevates the risk of unauthorised data access. To address these limitations, this paper proposes a confidential and verifiable IoT network based on a decentralised security architecture that integrates blockchain with proxy re-encryption. The framework uses threshold cryptography and zero-knowledge proofs to enable privacy-preserving transformations of ciphertext across consensus nodes. This design protects sensitive data while preserving transaction verifiability and integrity. As a result, the system effectively counters threats such as node collusion, Sybil attacks, and metadata leakage. Comprehensive simulations and performance evaluations underscore that the presented model substantially diminishes dependence on centralised proxies while delivering enhanced scalability, robust security, and increased trustworthiness, making it particularly well-suited for practical implementation in confidential IoT environments.</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"96 ","pages":"Article 104300"},"PeriodicalIF":3.7,"publicationDate":"2026-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145520861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intervalmapping and QR code based multi-stage reversible watermarking scheme for vector map distribution and source tracing 基于间隔映射和QR码的矢量图分布和源跟踪多阶段可逆水印方案
IF 3.7 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-01-01 Epub Date: 2025-11-24 DOI: 10.1016/j.jisa.2025.104303
Xu Xi, Mingkang Wu, Jie Zhang, Huimin Tian, Jinglong Du
Digital watermarking is crucial for vector map safeguard, yet current applications focus on watermark response mechanisms targeted at thieves and unauthorized users, existing studies presume data protection in the context of harmful propagation and unlawful use, while ignoring the responsibility tracing of data distributors. To address this issue, this study designs a secure distribution scheme of vector maps using QR codes and a reversible watermarking algorithm to trace and identify both distributor and propagation paths. During watermark encoding, QR codes carry watermark information, recording distributor and recipient details at each distribution stage. By leveraging the high payload capacity and error-correction capability of QR codes, the data distribution path is effectively recorded. With each data distribution, watermark extraction and re-embedding are executed. In terms of algorithm design, a reversible watermarking algorithm based on interval mapping is designed based on quantitative index modulation. The algorithm defines sub-intervals according to embedding strength, modulates coordinate points using grouped watermark information, and uses the average coordinates of all vertices as a key for watermark extraction and data recovery. The experimental results show that the proposed scheme can successfully extract the QR codes and recover the embedded information even after ten consecutive cycles of embedding and extraction. This is achieved while maintaining high robustness and controlled perturbations, even when the scheme undergoes to strong geometric and vertex-editing attacks like rotation, vertex deletion, and cropping.
数字水印对矢量图安全至关重要,但目前的应用主要集中在针对窃贼和未经授权用户的水印响应机制上,现有研究将数据保护假设在有害传播和非法使用的背景下,而忽略了数据分发者的责任追踪。为了解决这个问题,本研究设计了一个安全的矢量地图分发方案,使用QR码和可逆水印算法来跟踪和识别分发和传播路径。在水印编码过程中,QR码携带水印信息,记录每个分发阶段的分发者和接收者的详细信息。利用二维码的高载荷能力和纠错能力,有效记录数据分发路径。在每一次数据分布中,都进行水印提取和重新嵌入。在算法设计方面,设计了一种基于定量指标调制的区间映射可逆水印算法。该算法根据嵌入强度定义子区间,利用分组水印信息调制坐标点,并以所有顶点的平均坐标作为水印提取和数据恢复的关键。实验结果表明,在连续10个周期的嵌入和提取后,该方法仍能成功提取出嵌入的信息。这是在保持高鲁棒性和可控扰动的同时实现的,即使该方案经历了强烈的几何和顶点编辑攻击,如旋转、顶点删除和裁剪。
{"title":"Intervalmapping and QR code based multi-stage reversible watermarking scheme for vector map distribution and source tracing","authors":"Xu Xi,&nbsp;Mingkang Wu,&nbsp;Jie Zhang,&nbsp;Huimin Tian,&nbsp;Jinglong Du","doi":"10.1016/j.jisa.2025.104303","DOIUrl":"10.1016/j.jisa.2025.104303","url":null,"abstract":"<div><div>Digital watermarking is crucial for vector map safeguard, yet current applications focus on watermark response mechanisms targeted at thieves and unauthorized users, existing studies presume data protection in the context of harmful propagation and unlawful use, while ignoring the responsibility tracing of data distributors. To address this issue, this study designs a secure distribution scheme of vector maps using QR codes and a reversible watermarking algorithm to trace and identify both distributor and propagation paths. During watermark encoding, QR codes carry watermark information, recording distributor and recipient details at each distribution stage. By leveraging the high payload capacity and error-correction capability of QR codes, the data distribution path is effectively recorded. With each data distribution, watermark extraction and re-embedding are executed. In terms of algorithm design, a reversible watermarking algorithm based on interval mapping is designed based on quantitative index modulation. The algorithm defines sub-intervals according to embedding strength, modulates coordinate points using grouped watermark information, and uses the average coordinates of all vertices as a key for watermark extraction and data recovery. The experimental results show that the proposed scheme can successfully extract the QR codes and recover the embedded information even after ten consecutive cycles of embedding and extraction. This is achieved while maintaining high robustness and controlled perturbations, even when the scheme undergoes to strong geometric and vertex-editing attacks like rotation, vertex deletion, and cropping.</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"96 ","pages":"Article 104303"},"PeriodicalIF":3.7,"publicationDate":"2026-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145615158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An efficient certificateless authentication scheme based on RSA accumulator for smart healthcare 基于RSA累加器的智能医疗高效无证书认证方案
IF 3.7 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-01-01 Epub Date: 2025-11-27 DOI: 10.1016/j.jisa.2025.104319
Zhuowei Shen , Xiao Kou , Taiyao Yang
With the growing prevalence of smart healthcare applications in hospitals, certificateless cryptography has become one of the widely used methods to achieve secure communications. To reduce the heavy overhead caused by bilinear pairing operations, schemes based on elliptic curve cryptography (ECC) have been proposed to improve efficiency. However, many of these certificateless aggregate signature (CLAS) schemes focus solely on authenticity and integrity, neglecting the dynamic nature of inpatient membership. For instance, upon the discharge of inpatients from the ward following recovery, it becomes necessary to revoke their corresponding identities. Meanwhile, existing solutions, such as the time period key or the cuckoo filter, have failed to meet the demand due to the lack of timely membership changes and computational determinism individually. To address the dynamic requirement of real-world environments, we introduce an ECC-based CLAS scheme with an efficient membership update mechanism. By integrating the RSA accumulator into the CLAS framework and transmitting the auxiliary information via broadcasting, our proposed scheme facilitates efficient and timely membership updates with low overhead. Through comprehensive evaluations, our scheme outperforms comparable schemes regarding computational and communication overheads during the signing-verification and membership update phases.
随着智能医疗应用在医院的日益普及,无证加密已成为实现安全通信的广泛方法之一。为了减少双线性配对运算带来的繁重开销,提出了基于椭圆曲线密码术(ECC)的方案来提高效率。然而,许多无证书聚合签名(CLAS)方案只关注真实性和完整性,而忽略了住院会员的动态特性。例如,住院病人康复出院后,需要撤销其相应的身份。同时,现有的解决方案,如时间段密钥或杜鹃过滤器,由于缺乏及时的成员变化和单独的计算确定性而无法满足需求。为了满足现实环境的动态需求,我们引入了一种基于ecc的CLAS方案,该方案具有高效的成员更新机制。通过将RSA累加器集成到CLAS框架中,并通过广播传输辅助信息,我们提出的方案以低开销实现了高效、及时的成员更新。通过综合评估,我们的方案在签名验证和成员更新阶段的计算和通信开销方面优于可比方案。
{"title":"An efficient certificateless authentication scheme based on RSA accumulator for smart healthcare","authors":"Zhuowei Shen ,&nbsp;Xiao Kou ,&nbsp;Taiyao Yang","doi":"10.1016/j.jisa.2025.104319","DOIUrl":"10.1016/j.jisa.2025.104319","url":null,"abstract":"<div><div>With the growing prevalence of smart healthcare applications in hospitals, certificateless cryptography has become one of the widely used methods to achieve secure communications. To reduce the heavy overhead caused by bilinear pairing operations, schemes based on elliptic curve cryptography (ECC) have been proposed to improve efficiency. However, many of these certificateless aggregate signature (CLAS) schemes focus solely on authenticity and integrity, neglecting the dynamic nature of inpatient membership. For instance, upon the discharge of inpatients from the ward following recovery, it becomes necessary to revoke their corresponding identities. Meanwhile, existing solutions, such as the time period key or the cuckoo filter, have failed to meet the demand due to the lack of timely membership changes and computational determinism individually. To address the dynamic requirement of real-world environments, we introduce an ECC-based CLAS scheme with an efficient membership update mechanism. By integrating the RSA accumulator into the CLAS framework and transmitting the auxiliary information via broadcasting, our proposed scheme facilitates efficient and timely membership updates with low overhead. Through comprehensive evaluations, our scheme outperforms comparable schemes regarding computational and communication overheads during the signing-verification and membership update phases.</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"96 ","pages":"Article 104319"},"PeriodicalIF":3.7,"publicationDate":"2026-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145615159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Protocol design of non-linear function in secure multi-party computation based on secret sharing 基于秘密共享的安全多方计算非线性函数协议设计
IF 3.7 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-01-01 Epub Date: 2025-11-10 DOI: 10.1016/j.jisa.2025.104293
Zhongkai Li, Shuyang Fan, Lingfei Jin
Secure Multi-Party Computation (MPC) enables a group of untrusted parties to collaboratively compute the output of a specified function, while ensuring that each party’s private input remains confidential. Coupled with secret sharing, MPC facilitates privacy-preserving computations, a technique increasingly utilized in diverse fields, such as machine learning. While efficient protocols exist within MPC for linear functions, the evaluation of non-linear functions presents a significant challenge. Existing methods for non-linear functions are often either inefficient or lack the generality for widespread adoption, making them a major impediment in both the design and practical implementation of MPC schemes.
In this study, we explore the development of a generic protocol for non-linear function computation in MPC, grounded in secret sharing. We have devised a series of protocols to compute fundamental non-linear functions in a three-party setting under a semi-honest security model, representing secret-shared decimal numbers in fixed-point format. These protocols include Πexp for exponential functions, Πlog for logarithmic functions, and ΠInv for inverse proportion functions. By integrating these basic functions, we can formulate protocols for a broad spectrum of non-linear functions. Specifically, we have developed the ΠSigmoid and ΠTanh protocols based on the aforementioned methods. Throughout this paper, unless otherwise specified, comparisons refer exclusively to secret-sharing-based (SS-based) MPC protocols in the three-party, semi-honest setting; constant-round garbled-circuit (GC) approaches are outside our comparison scope due to different cost trade-offs. Within this SS-based literature, our protocols offer the lowest online communication rounds. Furthermore, Πexp and Πinv support an extended range of inputs, and Πlog represents the first protocol capable of handling logarithmic functions with fixed-point inputs. This paper provides a thorough analysis of the security and performance of these innovative protocols.
安全多方计算(MPC)使一组不受信任的各方能够协作计算指定函数的输出,同时确保每一方的私有输入保持机密。再加上秘密共享,MPC促进了隐私保护计算,这是一种越来越多地应用于不同领域的技术,如机器学习。虽然MPC中存在用于线性函数的有效协议,但非线性函数的评估提出了一个重大挑战。非线性函数的现有方法往往效率低下或缺乏广泛采用的通用性,使它们成为MPC方案设计和实际实施的主要障碍。在本研究中,我们探索了基于秘密共享的MPC非线性函数计算通用协议的开发。我们设计了一系列协议,在半诚实的安全模型下计算三方设置中的基本非线性函数,以定点格式表示秘密共享的十进制数。这些协议包括用于指数函数的Πexp,用于对数函数的Πlog和用于反比函数的ΠInv。通过整合这些基本函数,我们可以为广泛的非线性函数制定协议。具体来说,我们基于上述方法开发了ΠSigmoid和ΠTanh协议。在本文中,除非另有说明,比较只指在三方、半诚实设置中基于秘密共享(SS-based)的MPC协议;由于不同的成本权衡,恒圆乱码电路(GC)方法超出了我们的比较范围。在这个基于ss的文献中,我们的协议提供了最低的在线通信回合。此外,Πexp和Πinv支持扩展的输入范围,Πlog代表了第一个能够处理具有定点输入的对数函数的协议。本文对这些创新协议的安全性和性能进行了全面的分析。
{"title":"Protocol design of non-linear function in secure multi-party computation based on secret sharing","authors":"Zhongkai Li,&nbsp;Shuyang Fan,&nbsp;Lingfei Jin","doi":"10.1016/j.jisa.2025.104293","DOIUrl":"10.1016/j.jisa.2025.104293","url":null,"abstract":"<div><div>Secure Multi-Party Computation (MPC) enables a group of untrusted parties to collaboratively compute the output of a specified function, while ensuring that each party’s private input remains confidential. Coupled with secret sharing, MPC facilitates privacy-preserving computations, a technique increasingly utilized in diverse fields, such as machine learning. While efficient protocols exist within MPC for linear functions, the evaluation of non-linear functions presents a significant challenge. Existing methods for non-linear functions are often either inefficient or lack the generality for widespread adoption, making them a major impediment in both the design and practical implementation of MPC schemes.</div><div>In this study, we explore the development of a generic protocol for non-linear function computation in MPC, grounded in secret sharing. We have devised a series of protocols to compute fundamental non-linear functions in a three-party setting under a semi-honest security model, representing secret-shared decimal numbers in fixed-point format. These protocols include <span><math><msub><mrow><mi>Π</mi></mrow><mrow><mo>exp</mo></mrow></msub></math></span> for exponential functions, <span><math><msub><mrow><mi>Π</mi></mrow><mrow><mo>log</mo></mrow></msub></math></span> for logarithmic functions, and <span><math><msub><mrow><mi>Π</mi></mrow><mrow><mtext>Inv</mtext></mrow></msub></math></span> for inverse proportion functions. By integrating these basic functions, we can formulate protocols for a broad spectrum of non-linear functions. Specifically, we have developed the <span><math><msub><mrow><mi>Π</mi></mrow><mrow><mtext>Sigmoid</mtext></mrow></msub></math></span> and <span><math><msub><mrow><mi>Π</mi></mrow><mrow><mtext>Tanh</mtext></mrow></msub></math></span> protocols based on the aforementioned methods. Throughout this paper, unless otherwise specified, comparisons refer exclusively to secret-sharing-based (SS-based) MPC protocols in the three-party, semi-honest setting; constant-round garbled-circuit (GC) approaches are outside our comparison scope due to different cost trade-offs. Within this SS-based literature, our protocols offer the lowest online communication rounds. Furthermore, <span><math><msub><mrow><mi>Π</mi></mrow><mrow><mo>exp</mo></mrow></msub></math></span> and <span><math><msub><mrow><mi>Π</mi></mrow><mrow><mtext>inv</mtext></mrow></msub></math></span> support an extended range of inputs, and <span><math><msub><mrow><mi>Π</mi></mrow><mrow><mo>log</mo></mrow></msub></math></span> represents the first protocol capable of handling logarithmic functions with fixed-point inputs. This paper provides a thorough analysis of the security and performance of these innovative protocols.</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"96 ","pages":"Article 104293"},"PeriodicalIF":3.7,"publicationDate":"2026-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145520879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain-based access control model for smart grids using peak hour and privilege level attributes (BACS-HP) 基于区块链的智能电网峰值小时和特权级别属性访问控制模型(bac - hp)
IF 3.7 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-01-01 Epub Date: 2025-11-10 DOI: 10.1016/j.jisa.2025.104261
Sarra Namane , Imed Ben Dhaou
The increasing reliance on smart plugs and smart meters in modern electricity grids introduces significant security vulnerabilities, as unauthorized access can compromise grid reliability and stability. Traditional access control models are ill-suited for smart grids’ decentralized and dynamic nature. This paper introduces BACS-HP, a novel Blockchain-Based Access Control Model for Smart Grids that enhances security by incorporating privilege levels and peak hour attributes. Privilege levels prioritize access to critical devices during energy constraints, while the peak hour attribute enables adaptive decision-making to optimize energy allocation during periods of high demand. Unlike existing blockchain-based access control solutions, BACS-HP uniquely combines these context-aware attributes to provide fine-grained access control tailored to the specific needs of smart grids. The model leverages blockchain technology to ensure the secure and decentralized storage of access rights and enforces policies via smart contracts, mitigating single points of failure. Empirical results demonstrate that BACS-HP achieves low-latency security rule updates (between 42 ms and 46 ms), rapid access request processing (between 21 ms and 46 ms), and a high acceptance rate (60%) for critical devices during power outages, outperforming standard ABAC implementations in terms of responsiveness and prioritization. BACS-HP contributes to advancing access control mechanisms in smart grids and highlights the potential of blockchain to meet the security and performance demands of modern energy systems.
现代电网对智能插头和智能电表的依赖日益增加,这带来了重大的安全漏洞,因为未经授权的访问可能会损害电网的可靠性和稳定性。传统的访问控制模型不适用于智能电网的分散性和动态性。本文介绍了BACS-HP,这是一种新型的基于区块链的智能电网访问控制模型,通过结合特权级别和高峰时间属性来提高安全性。在能源限制期间,特权级别优先考虑对关键设备的访问,而高峰时间属性使自适应决策能够在高需求期间优化能源分配。与现有的基于区块链的访问控制解决方案不同,BACS-HP独特地结合了这些上下文感知属性,提供针对智能电网特定需求的细粒度访问控制。该模型利用区块链技术确保访问权限的安全和分散存储,并通过智能合约执行策略,减少单点故障。实证结果表明,BACS-HP实现了低延迟的安全规则更新(在42 ms到46 ms之间),快速的访问请求处理(在21 ms到46 ms之间),以及在断电期间关键设备的高接受率(60%),在响应性和优先级方面优于标准ABAC实现。BACS-HP有助于推进智能电网中的访问控制机制,并突出区块链在满足现代能源系统安全和性能需求方面的潜力。
{"title":"Blockchain-based access control model for smart grids using peak hour and privilege level attributes (BACS-HP)","authors":"Sarra Namane ,&nbsp;Imed Ben Dhaou","doi":"10.1016/j.jisa.2025.104261","DOIUrl":"10.1016/j.jisa.2025.104261","url":null,"abstract":"<div><div>The increasing reliance on smart plugs and smart meters in modern electricity grids introduces significant security vulnerabilities, as unauthorized access can compromise grid reliability and stability. Traditional access control models are ill-suited for smart grids’ decentralized and dynamic nature. This paper introduces BACS-HP, a novel Blockchain-Based Access Control Model for Smart Grids that enhances security by incorporating <em>privilege levels</em> and <em>peak hour</em> attributes. Privilege levels prioritize access to critical devices during energy constraints, while the peak hour attribute enables adaptive decision-making to optimize energy allocation during periods of high demand. Unlike existing blockchain-based access control solutions, BACS-HP uniquely combines these context-aware attributes to provide fine-grained access control tailored to the specific needs of smart grids. The model leverages blockchain technology to ensure the secure and decentralized storage of access rights and enforces policies via smart contracts, mitigating single points of failure. Empirical results demonstrate that BACS-HP achieves low-latency security rule updates (between 42 ms and 46 ms), rapid access request processing (between 21 ms and 46 ms), and a high acceptance rate (60%) for critical devices during power outages, outperforming standard ABAC implementations in terms of responsiveness and prioritization. BACS-HP contributes to advancing access control mechanisms in smart grids and highlights the potential of blockchain to meet the security and performance demands of modern energy systems.</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"96 ","pages":"Article 104261"},"PeriodicalIF":3.7,"publicationDate":"2026-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145520877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Information Security and Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1