Adaptively secure multi-authority attribute-based broadcast encryption in fog computing

被引:2
作者
Chen, Jie [1 ]
Niu, Jiaxu [1 ]
Lei, Hao [2 ]
Lin, Li [2 ]
Ling, Yunhao [1 ]
机构
[1] East China Normal Univ, Sch Software Engn, Shanghai Key Lab Trustworthy Comp, Shanghai 200062, Peoples R China
[2] Ant Grp, Hangzhou 310023, Peoples R China
基金
中国国家自然科学基金;
关键词
Attributed-based broadcast encryption; Fog computing; Multi-authority; Adaptively secure; DUAL SYSTEM ENCRYPTION; INTERNET; HIBE;
D O I
10.1016/j.comnet.2023.109844
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Fog computing is considered an important development in cloud computing, with shorter response times, less data transfer load and a more secure distributed service architecture that can be accessed by a wide range of end devices. As with cloud computing, it also faces the challenge of how to securely distribute sensitive data. Ciphertext-Policy Attribute-based Broadcast Encryption (CP-ABBE) can protect sensitive data and provide fine-grained access control with user revocation. However, existing CP-ABBE schemes suffer many limitations when implemented in a fog computing environment: a single authority performs poorly in handling requests or data from many IoT devices, leading to system delays or limited functionality; expensive decryption costs make the computation and storage overheads unfriendly to devices with limited resources; these schemes are only proven selectively secure, meaning that security was proven in a weaker model. In this paper, using threshold secret sharing and decryption delegation, we propose an adaptively secure attribute-based multi-authority broadcast encryption (MA-ABBE) scheme that breaks through these limitations. The comparison and analysis results show that our scheme is practical and achieves adaptive security, enables user-side fast decryption and low storage overhead, and provides a secure and efficient option for protecting sensitive data in fog computing environments.
引用
收藏
页数:12
相关论文
共 55 条
[1]   Charm: a framework for rapidly prototyping cryptosystems [J].
Akinyele, Joseph A. ;
Garman, Christina ;
Miers, Ian ;
Pagano, Matthew W. ;
Rushanan, Michael ;
Green, Matthew ;
Rubin, Aviel D. .
JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2013, 3 (02) :111-128
[2]   IoT transaction processing through cooperative concurrency control on fog-cloud computing environment [J].
Al-Qerem, Ahmad ;
Alauthman, Mohammad ;
Almomani, Ammar ;
Gupta, B. B. .
SOFT COMPUTING, 2020, 24 (08) :5695-5711
[3]   Fog Computing for the Internet of Things: Security and Privacy Issues [J].
Alrawais, Arwa ;
Alhothaily, Abdulrahman ;
Hu, Chunqiang ;
Cheng, Xiuzhen .
IEEE INTERNET COMPUTING, 2017, 21 (02) :34-42
[4]   Lightweight and secure authentication scheme for IoT network based on publish-subscribe fog computing model [J].
Amanlou, Sanaz ;
Hasan, Mohammad Kamrul ;
Abu Bakar, Khairul Azmi .
COMPUTER NETWORKS, 2021, 199
[5]   Hybrid GSW and DM based fully homomorphic encryption scheme for handling false data injection attacks under privacy preserving data aggregation in fog computing [J].
Amuthan, A. ;
Sendhil, R. .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020, 11 (11) :5217-5231
[6]  
Attrapadung N, 2014, LECT NOTES COMPUT SC, V8441, P557, DOI 10.1007/978-3-642-55220-5_31
[7]  
Attrapadung N, 2009, LECT NOTES COMPUT SC, V5921, P278, DOI 10.1007/978-3-642-10868-6_17
[8]  
Attrapadung N, 2009, LECT NOTES COMPUT SC, V5671, P248, DOI 10.1007/978-3-642-03298-1_16
[9]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[10]  
Boldyreva A., 2008, CCS08 P 15 ACM C CCS08 P 15 ACM C CCS08 P 15 ACM C CCS08 P 15 ACM C CCS08 P 15 ACM C CCS08 P 15 ACM C CCS08 P 15 ACM C CCS08 P 15 ACM C CCS08 P 15 ACM C CCS08 P 15 ACM C CCS08 P 15 ACM C CCS08 P 15 ACM C CCS08 P 15 ACM C CCS08 P 15 ACM C CCS08 P 15 ACM C CCS08 P 15 ACM C, P417, DOI 10.1145/1455770.1455823