A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing

被引:62
作者
Fan, Kai [1 ]
Wang, Junxiong [1 ]
Wang, Xin [1 ]
Li, Hui [1 ]
Yang, Yintang [2 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Shaanxi, Peoples R China
[2] Xidian Univ, Key Lab, Minist Educ Wide Band Gap Semicond Mat & Devices, Xian 710071, Shaanxi, Peoples R China
基金
中国国家自然科学基金;
关键词
fog computing; cloud computing; access control; attribute-based encryption; verifiable outsource; revocation; MULTI-AUTHORITY SYSTEMS; CIPHERTEXT;
D O I
10.3390/s17071695
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
With the rapid development of big data and Internet of things (IOT), the number of networking devices and data volume are increasing dramatically. Fog computing, which extends cloud computing to the edge of the network can effectively solve the bottleneck problems of data transmission and data storage. However, security and privacy challenges are also arising in the fog-cloud computing environment. Ciphertext-policy attribute-based encryption (CP-ABE) can be adopted to realize data access control in fog-cloud computing systems. In this paper, we propose a verifiable outsourced multi-authority access control scheme, named VO-MAACS. In our construction, most encryption and decryption computations are outsourced to fog devices and the computation results can be verified by using our verification method. Meanwhile, to address the revocation issue, we design an efficient user and attribute revocation method for it. Finally, analysis and simulation results show that our scheme is both secure and highly efficient.
引用
收藏
页数:15
相关论文
共 35 条
[1]   Fog Computing and Smart Gateway Based Communication for Cloud of Things [J].
Aazam, Mohammad ;
Huh, Eui-Nam .
2014 INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD (FICLOUD), 2014, :464-470
[2]   Charm: a framework for rapidly prototyping cryptosystems [J].
Akinyele, Joseph A. ;
Garman, Christina ;
Miers, Ian ;
Pagano, Matthew W. ;
Rushanan, Michael ;
Green, Matthew ;
Rubin, Aviel D. .
JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2013, 3 (02) :111-128
[3]  
[Anonymous], J COMPUTING INFORM T
[4]   Fog of Everything: Energy-Efficient Networked Computing Architectures, Research Challenges, and a Case Study [J].
Baccarelli, Enzo ;
Naranjo, Paola G. Vinueza ;
Scarpiniti, Michele ;
Shojafar, Mohammad ;
Abawajy, Jemal H. .
IEEE ACCESS, 2017, 5 :9882-9910
[5]  
Beimel A., 1996, SECURE SCHEMES SECRE, P22
[6]  
Bellare M, 1998, LECT NOTES COMPUT SC, V1403, P236, DOI 10.1007/BFb0054130
[7]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[8]  
Bonomi F, 2012, P 1 ED MCC WORKSH MO, P13, DOI [DOI 10.1145/2342509.2342513, 10.1145/2342509.2342513]
[9]  
Chase M, 2007, LECT NOTES COMPUT SC, V4392, P515
[10]  
Chen YL, 2016, CHINA COMMUN, V13, P146, DOI 10.1109/CC.2016.7405733