A revocable multi-authority fine-grained access control architecture against ciphertext rollback attack for mobile edge computing

被引:0
|
作者
Zhang, Zhishuo [1 ]
Huang, Wen [2 ]
Zhou, Shijie [1 ]
Liao, Yongjian [1 ]
机构
[1] School of Information and Software Engineering, University of Electronic Science and Technology of China (UESTC), Chengdu, China
[2] Chengde University of Information Technology, Chengdu, China
来源
关键词
Access control - Computational complexity - Computer architecture - Cryptography - Efficiency - Network architecture - Outsourcing;
D O I
暂无
中图分类号
学科分类号
摘要
Mobile edge computing is an emerging decentralized cloud paradigm that can provide real-time mobile services for users. But there are some limitations in the existing access control architectures for mobile edge computing, such as low efficiency, poor expansibility and high algorithm complexity. Therefore in this paper, we propose a decentralized ciphertext-policy attribute-based encryption scheme which with mutually verifiable outsourced decryption and non-delegated computing mode attribute revocation as the fine-grained access control model for the mobile edge cloud. Compared with the state-of-art access control models with revocation function, first, our scheme is based on Type-3 pairing, which has higher efficiency and stronger security. Second, our outsourcing decryption algorithm can realize mutual verification, that is, not only the server can verify the validity of the user's outsourcing key, but also the user can verify the correctness of the decrypted plaintext. Thirdly, our revocation algorithm can not only resist ciphertext rollback attacks to achieve the genuine backward and forward security, but also does not need the assistance of any intermediate proxy server, which greatly simplifies the network topology. © 2022 Elsevier B.V.
引用
收藏
相关论文
共 50 条
  • [41] Fine-grained user access control in ciphertext-policy attribute-based encryption
    Hur, Junbeom
    Park, Chanil
    Hwang, Seong Oun
    SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (03) : 253 - 261
  • [42] Fine-grained flexible access control: ciphertext policy attribute based encryption for arithmetic circuits
    MahdaviOliaee, Mahdi
    Ahmadian, Zahra
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2023, 19 (04) : 515 - 528
  • [43] Fine-grained flexible access control: ciphertext policy attribute based encryption for arithmetic circuits
    Mahdi MahdaviOliaee
    Zahra Ahmadian
    Journal of Computer Virology and Hacking Techniques, 2023, 19 : 515 - 528
  • [44] Fine-grained attribute update and outsourcing computing access control scheme in fog computing
    Du R.
    Yan P.
    Liu Y.
    Tongxin Xuebao/Journal on Communications, 2021, 42 (03): : 160 - 170
  • [45] Fine Grained Access Control Based on Smart Contract for Edge Computing
    Zhu, Yong
    Wu, Xiao
    Hu, Zhihui
    ELECTRONICS, 2022, 11 (01)
  • [46] ERACMA: Expressive and Revocable Access Control With Multi-Authority for AIoT-Enabled Human Centric Consumer Electronics
    Zhuang, Yue
    Wang, Chen
    Zheng, Wenying
    Victor, Nancy
    Gadekallu, Thippa Reddy
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2024, 70 (01) : 1102 - 1111
  • [47] FedGreen: Federated Learning with Fine-Grained Gradient Compression for Green Mobile Edge Computing
    Li, Peichun
    Huang, Xumin
    Pant, Miao
    Yu, Rong
    2021 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2021,
  • [48] Distributed DNN Inference With Fine-Grained Model Partitioning in Mobile Edge Computing Networks
    Li, Hui
    Li, Xiuhua
    Fan, Qilin
    He, Qiang
    Wang, Xiaofei
    Leung, Victor C. M.
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2024, 23 (10) : 9060 - 9074
  • [49] Efficient revocable and grantable attribute-based encryption from lattices with fine-grained access control
    Wang, Shangping
    Zhang, Xia
    Zhang, Yaling
    IET INFORMATION SECURITY, 2018, 12 (02) : 141 - 149
  • [50] A Secure Revocable Personal Health Record System With Policy-Based Fine-Grained Access Control
    Debnath, Mitu Kumar
    Samet, Saeed
    Vidyasankar, Krishnamurthy
    2015 THIRTEENTH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2015, : 109 - 116