Adaptive time-bound access control for internet of things in fog computing architecture

被引:2
作者
AboDoma N. [1 ,2 ]
Shaaban E. [1 ]
Mostafa A. [2 ]
机构
[1] Ain Shams University, Cairo
[2] The British University in Egypt, Cairo
关键词
attribute-based encryption; cloud storage; fine-grained access control; fog computing; Internet of things;
D O I
10.1080/1206212X.2021.1935653
中图分类号
学科分类号
摘要
This paper proposes an adaptive Time-Bound Attribute-Based Encryption Scheme (TB-ABE). TB-ABE is a fine-grained data access control scheme that maintains a secure data exchange environment between IoT devices. The lifetime of the system is divided into equal periods of time slots with unique encryption keys. TB-ABE combines Cyphertext-Policy Attribute Based Encryption with Time-bound keys. It only permits data users with attributes that satisfy the access policy set by the data owner to access the data for a specific period. It also proposes an efficient indirect revocation handling mechanism with minimal computations. The proposed scheme is implemented in Fog-Cloud computing architecture, where fog devices are used for partial outsourcing of encryption and decryption operations. This paper provides security and performance analysis for the proposed scheme in terms of computation, storage, communication and energy overheads. Analysis of proposed scheme proves its feasibility for limited-resource devices, while maintaining a secure communication between IoT devices. © 2021 Informa UK Limited, trading as Taylor & Francis Group.
引用
收藏
页码:779 / 790
页数:11
相关论文
共 25 条
  • [1] Rayes A., Salam S., Internet of things–from Hype to Reality, (2016)
  • [2] Hu C.T., Ferraiolo D.F., Kuhn D.R.
  • [3] Sahai A., Waters B., Fuzzy identity-based encryption, Lecture Notes in Computer Science, 3494, (2005)
  • [4] Dong C., Russello G., Dulay N., Shared and searchable encrypted data for untrusted servers, Data and Applications Security XXII. Dbsec, (2008)
  • [5] Attrapadung N., Imai H., Attribute-based encryption supporting direct/indirect revocation modes, Cryptography and Coding, (2009)
  • [6] Liu J., Yuen T., Zhang P.
  • [7] Zhang P., Chen Z., Liang K.
  • [8] Ma H., Dong E., Liu Z.
  • [9] Wang S., Yao L., Zhang Y., Attribute-based encryption scheme with multi-keyword search and supporting attribute revocation in cloud storage, Plos ONE, 13, (2018)
  • [10] Abodoma N., Mostafa A., Shaaban E., Adaptive time-bound key management scheme for the internet of things, IEEE 88Th Vehicular Technology Conference (Vtc-Fall), pp. 1-5, (2018)