Expressive Bilateral Access Control for Internet-of-Things in Cloud-Fog Computing

被引:31
作者
Xu, Shengmin [1 ]
Ning, Jianting [1 ,3 ]
Ma, Jinhua [1 ]
Huang, Xinyi [1 ]
Pang, Hwee Hwa [2 ]
Deng, Robert H. [2 ]
机构
[1] Fujian Normal Univ, Fuzhou, Fujian, Peoples R China
[2] Singapore Management Univ, Singapore, Singapore
[3] Chinese Acad Sci, State Key Lab Informat Secur, Inst Informat Engn, Beijing 100093, Peoples R China
来源
PROCEEDINGS OF THE 26TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, SACMAT 2021 | 2021年
关键词
Internet-of-Things; Bilateral Access Control; Cloud-Fog Computing; ATTRIBUTE; SECURITY;
D O I
10.1145/3450569.3463561
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
As a versatile system architecture, cloud-fog Internet-of-Things (IoT) enables multiple resource-constrained devices to communicate and collaborate with each other. By outsourcing local data and immigrating expensive workloads to cloud service providers and fog nodes (FNs), resource-constrained devices can enjoy data services with low latency and minimal cost. To protect data security and privacy in the untrusted cloud-fog environment, many cryptographic mechanisms have been invented. Unfortunately, most of them are impractical when directly applied to cloud-fog IoT computing, mainly due to the large number of resource-constrained end-devices (EDs). In this paper, we present a secure cloud-fog IoT data sharing system with bilateral access control based on a new cryptographic tool called lightweight matchmaking encryption. Our system enforces both sender access control and receiver access control simultaneously and adapts to resource-constrained EDs by outsourcing costly workloads to FNs. We conduct extensive experiments to demonstrate the superior performance of our system to the most relevant solutions in the literature.
引用
收藏
页码:143 / 154
页数:12
相关论文
共 34 条
[1]   FAME: Fast Attribute-based Message Encryption [J].
Agrawal, Shashank ;
Chase, Melissa .
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, :665-682
[2]   Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications [J].
Al-Fuqaha, Ala ;
Guizani, Mohsen ;
Mohammadi, Mehdi ;
Aledhari, Mohammed ;
Ayyash, Moussa .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (04) :2347-2376
[3]   Match Me if You Can: Matchmaking Encryption and Its Applications [J].
Ateniese, Giuseppe ;
Francati, Danilo ;
Nunez, David ;
Venturi, Daniele .
ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT II, 2019, 11693 :701-731
[4]  
Attrapadung N, 2009, LECT NOTES COMPUT SC, V5536, P168, DOI 10.1007/978-3-642-01957-9_11
[5]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[6]  
Bodei C, 1999, LECT NOTES COMPUT SC, V1578, P120
[7]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[8]  
Bonomi F., 2012, P MCC WORKSH MOB CLO, P13, DOI [10.1145/2342509.2342513, DOI 10.1145/2342509.2342513]
[9]   Leakage-Abuse Attacks Against Searchable Encryption [J].
Cash, David ;
Grubbs, Paul ;
Perry, Jason ;
Ristenpart, Thomas .
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, :668-679
[10]   Access Control Encryption: Enforcing Information Flow with Cryptography [J].
Damgard, Ivan ;
Haagh, Helene ;
Orlandi, Claudio .
THEORY OF CRYPTOGRAPHY, TCC 2016-B, PT II, 2016, 9986 :547-576