Access Control Scheme Supporting Userand Attribute Revocation in Fog Computing

被引:0
|
作者
Wang Z. [1 ]
Li L. [1 ]
Li N. [2 ]
机构
[1] College of Information and Computer, Taiyuan University of Technology, Jinzhong
[2] State Grid Shanxi Electric Power Company, Taiyuan
来源
Li, Ling (liling_li_ling@163.com) | 1600年 / Beijing University of Posts and Telecommunications卷 / 43期
关键词
Access control; Attribute-based encryption; Fog computing; Outsourcing; Revocation;
D O I
10.13190/j.jbupt.2020-092
中图分类号
学科分类号
摘要
In fog computing, attribute-based encryption technology not only solves the problem of fine-grained access control of data, but also brings the problem of user and attribute revocation. To solve this problem, an access control scheme that supports user and attribute revocation in fog computing is proposed. The proposed scheme improves the existing access control scheme based on attribute group revocation attributes, making it used in fog computing and improving the efficiency of key update. In addition, users can be revoked by fog nodes. In order to reduce the burden on the user side, part of the calculation overhead is transferred from the user side to the adjacent fog node. The security analysis based on the decisional bilinear diffie-hellman (DBDH) assumption shows that the proposed scheme can resist chosen plaintext attack. Finally, the scheme is analyzed in both theory and experiment. The analysis results show that the proposed scheme has high revocation efficiency and practical value. © 2020, Editorial Department of Journal of Beijing University of Posts and Telecommunications. All right reserved.
引用
收藏
页码:88 / 95
页数:7
相关论文
共 16 条
  • [1] Bonomi F, Milito R, Jiang Zhu, Et al., Fog computing and its role in the internet of things, Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, pp. 13-16, (2012)
  • [2] Bethencourt J, Sahai A, Waters B., Ciphertext -policy attribute-based encryption, 2007 IEEE Symposium on Security and Privacy(SP'07), pp. 321-334, (2007)
  • [3] Ostrovsky R, Sahai A, Waters B., Attribute-based encryption with non-monotonic access structures, Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 195-203, (2007)
  • [4] Li Yang, Zhu Jianming, Wang Xiuli, Et al., Optimized ciphertext- policy attribute-based encryption with efficient revocation, International Journal of Security & Its Applications, 7, 6, pp. 385-394, (2013)
  • [5] Chen Hongsong, Shen Qianglei, A new type of attribute-based encryption scheme supporting efficient revocation in cloud computing environment, Journal of Beijing University of Posts and Telecommunications, 41, 3, pp. 113-118, (2018)
  • [6] Zhao Zhiyuan, Zhu Zhiqiang, Wang Jianhua, Et al., Research on keyless escrow and revocable attribute-based encryption scheme in cloud storage environment, Journal of Electronics and Information, 40, 1, pp. 1-10, (2018)
  • [7] Attrapadung N, Imai H., Conjunctive broadcast and attribute-based encryption, International Conference on Pairing-Based Cryptography, pp. 248-265, (2009)
  • [8] Liu Zhen, Wong Duncan S., Practical attribute-based encryption: traitor tracing, revocation and large universe, The Computer Journal, 59, 7, pp. 983-1004, (2016)
  • [9] Debnath S, Bhuyan B., Large universe attribute based encryption enabled secured data access control for cloud storage with computation outsourcing, Multiagent and Grid Systems, 15, 2, pp. 99-119, (2019)
  • [10] Dhal K, Pattnaik P K, Rai S C., RACC: An efficient and revocable fine grained access control model for cloud storage, International Journal of Knowledge-Based and Intelligent Engineering Systems, 23, 1, pp. 21-32, (2019)