Certificateless and Revocable Bilateral Access Control for Privacy-Preserving Edge-Cloud Computing

被引:0
作者
Huang, Qi-An [1 ]
Si, Yain-Whar [1 ]
机构
[1] Univ Macau, Dept Comp & Informat Sci, Macau, Peoples R China
来源
IEEE INTERNET OF THINGS JOURNAL | 2025年 / 12卷 / 08期
关键词
Cloud computing; Encryption; Access control; Internet of Things; Security; Outsourcing; Servers; Privacy; Data privacy; Protection; Bilateral access control; edge-cloud computing; privacy-preserving; revocation; ENCRYPTION; SECURITY;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid advancement of intelligent devices and cloud services, a novel edge-cloud computing paradigm is emerging, finding widespread adoption in numerous advanced applications. Despite its considerable convenience and benefits, edge-cloud computing raises security and privacy concerns. Although many cryptographic solutions have been proposed for the Internet of Things and cloud services, ensuring diverse access control in an untrusted edge-cloud environment and realizing flexible revocation and efficient outsourcing remain challenging. In this article, we propose a certificateless attribute-based matchmaking encryption scheme (CRO-ABME) that supports fine-grained bilateral access control, attribute and identity revocation, and cryptographic workload outsourcing. Leveraging CRO-ABME, we design an edge-cloud data sharing system that ensures secure data uploading with privacy protection between end-users, such that only authorized matchers can access the data in edge-cloud computing. Furthermore, rigorous security proofs for CRO-ABME are provided, and experimental analyses demonstrate the efficiency and flexibility of our proposed scheme.
引用
收藏
页码:10333 / 10348
页数:16
相关论文
共 34 条
[1]   Charm: a framework for rapidly prototyping cryptosystems [J].
Akinyele, Joseph A. ;
Garman, Christina ;
Miers, Ian ;
Pagano, Matthew W. ;
Rushanan, Michael ;
Green, Matthew ;
Rubin, Aviel D. .
JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2013, 3 (02) :111-128
[2]   Match Me if You Can: Matchmaking Encryption and Its Applications [J].
Ateniese, Giuseppe ;
Francati, Danilo ;
Nunez, David ;
Venturi, Daniele .
ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT II, 2019, 11693 :701-731
[3]   A Survey on Edge and Edge-Cloud Computing Assisted Cyber-Physical Systems [J].
Cao, Kun ;
Hu, Shiyan ;
Shi, Yang ;
Colombo, Armando ;
Karnouskos, Stamatis ;
Li, Xin .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 17 (11) :7806-7819
[4]   CL-ME: Efficient Certificateless Matchmaking Encryption for Internet of Things [J].
Chen, Biwen ;
Xiang, Tao ;
Ma, Mimi ;
He, Debiao ;
Liao, Xiaofeng .
IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (19) :15010-15023
[5]  
Fortune Bus. Insights Pune India, Internet of Things (lot) Market Size, Share & COVID-19 Impact Analysis, by Component (Platform, Solution & Services), by End-Use Industry (bfsi, Retail, Government, Healthcare, Manufacturing, Agriculture, Sustainable Energy, Transportation, It & Telecom, and others), and Regional Forecast, 2023-2030
[6]  
Goyal V., 2006, P 2006 INT C PRIVACY, P1
[7]   Leveraging the edge and cloud for V2X-based real-time object detection in autonomous driving [J].
Hawlader, Faisal ;
Robinet, Francois ;
Frank, Raphael .
COMPUTER COMMUNICATIONS, 2024, 213 :372-381
[8]  
Joint Task Force Interagency Working Group, 2020, document SP 800-53
[9]   EMK-ABSE: Efficient Multikeyword Attribute-Based Searchable Encryption Scheme Through Cloud-Edge Coordination [J].
Liu, Jingwei ;
Li, Yating ;
Sun, Rong ;
Pei, Qingqi ;
Zhang, Ning ;
Dong, Mianxiong ;
Leung, Victor C. M. .
IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (19) :18650-18662
[10]   Wearable Activity Trackers: A Survey on Utility, Privacy, and Security [J].
Niksirat, Kavous Salehzadeh ;
Velykoivanenko, Lev ;
Zufferey, Noe ;
Cherubini, Mauro ;
Huguenin, Kevin ;
Humbert, Mathias .
ACM COMPUTING SURVEYS, 2024, 56 (07)