Enabling Efficient and Distributed Access Control for Pervasive Edge Computing Services

被引:2
作者
Liu, Lingshuang [1 ]
Huang, Cheng [2 ]
Zhu, Dan [3 ]
Liu, Dongxiao [4 ]
Ni, Jianbing [5 ,6 ]
Shen, Xuemin [1 ]
机构
[1] Univ Waterloo, Dept Elect & Comp Engn, Waterloo, ON N2L 3G1, Canada
[2] Fudan Univ, Sch Comp Sci, Shanghai 200438, Peoples R China
[3] Northwestern Polytech Univ, Sch Cybersecur, Xian 710060, Shaanxi, Peoples R China
[4] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 610054, Sichuan, Peoples R China
[5] Queens Univ, Dept Elect & Comp Engn, Kingston, ON K7L 3N6, Canada
[6] Queens Univ, Ingenu Labs Res Inst, Kingston, ON K7L 3N6, Canada
关键词
Access control; authorization; key aggregation; mutual authentication; pervasive edge computing; CONTROL MECHANISM; SECURE; FRAMEWORK;
D O I
10.1109/TMC.2024.3395388
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose an efficient and distributed service access control framework (E-DAC) in the pervasive edge computing (PEC) environment, where the resources of peer devices at the network edge are integrated to provide latency-sensitive computing services to the nearby devices on behalf of edge servers. E-DAC addresses the challenge of efficient and distributed service access control, comprising edge service authorization, service access authorization, and mutual authentication between edge servers and edge devices. In dong so, E-DAC first extends a key-aggregate cryptosystem to enable batch service authorization, in which a service provider can aggregate the authorization keys of different services to produce a constant-size aggregate key for an edge server. Second, E-DAC enables users to acquire authorization from the service provider for service access on edge servers by using efficient secret sharing. Third, edge servers and users can authenticate with each other without interacting with a centralized server, while enabling secure zero-round trip communication, so that the service data is protected and the communication bandwidth cost is low. In addition, the service provider is capable of efficiently revoking the authorization of the dropout or compromised edge servers or users in response to the dynamics of the PEC environment. Finally, we prove the security of service access control in E-DAC, including unforgeability of service authorization and confidentiality of service data, and conduct extensive analysis and experiments to demonstrate that E-DAC is highly computational and communication-efficient on service authorization, authentication, and revocation.
引用
收藏
页码:11342 / 11356
页数:15
相关论文
共 38 条
  • [1] Bhattacharyya D, 2009, INT J GRID DISTRIB, V2, P13
  • [2] Camenisch J, 1997, LECT NOTES COMPUT SC, V1294, P410
  • [3] Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
    Chu, Cheng-Kang
    Chow, Sherman S. M.
    Tzeng, Wen-Guey
    Zhou, Jianying
    Deng, Robert H.
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (02) : 468 - 477
  • [4] Towards Scaling Blockchain Systems via Sharding
    Dang, Hung
    Tien Tuan Anh Dinh
    Loghin, Dumitrel
    Chang, Ee-Chien
    Lin, Qian
    Ooi, Beng Chin
    [J]. SIGMOD '19: PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON MANAGEMENT OF DATA, 2019, : 123 - 140
  • [5] APECS: A Distributed Access Control Framework for Pervasive Edge Computing Services
    Dougherty, Sean
    Tourani, Reza
    Panwar, Gaurav
    Vishwanathan, Roopa
    Misra, Satyajayant
    Srikanteswara, Srikathyayani
    [J]. CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, : 1405 - 1420
  • [6] Attribute-Based Encryption With Parallel Outsourced Decryption for Edge Intelligent IoV
    Feng, Chaosheng
    Yu, Keping
    Aloqaily, Moayad
    Alazab, Mamoun
    Lv, Zhihan
    Mumtaz, Shahid
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (11) : 13784 - 13795
  • [7] Access Control for Electronic Health Records with Hybrid Blockchain-Edge Architecture
    Guo, Hao
    Li, Wanxin
    Nejad, Mark
    Shen, Chien-Chung
    [J]. 2019 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN (BLOCKCHAIN 2019), 2019, : 44 - 51
  • [8] A Data Security Enhanced Access Control Mechanism in Mobile Edge Computing
    Hou, Yichen
    Garg, Sahil
    Hui, Lin
    Jayakody, Dushantha Nalin K.
    Jin, Rui
    Hossain, M. Shamim
    [J]. IEEE ACCESS, 2020, 8 : 136119 - 136130
  • [9] Reconfigurable Security: Edge-Computing-Based Framework for IoT
    Hsu, Ruei-Hau
    Lee, Jemin
    Quek, Tony Q. S.
    Chen, Jyh-Cheng
    [J]. IEEE NETWORK, 2018, 32 (05): : 92 - 99
  • [10] Blockchain-Assisted Transparent Cross-Domain Authorization and Authentication for Smart City
    Huang, Cheng
    Xue, Liang
    Liu, Dongxiao
    Shen, Xuemin
    Zhuang, Weihua
    Sun, Rob
    Ying, Bidi
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (18) : 17194 - 17209