Securing Fog and Cloud Communication Using Attribute Based Access Control and Re-encryption

被引:0
作者
Vohra, Kunal [1 ]
Dave, Mayank [1 ]
机构
[1] Natl Inst Technol, Dept Comp Engn, Kurukshetra, Haryana, India
来源
PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT) | 2018年
关键词
Attribute Based Encryption; Proxy Re-encryption; Access Control; Secure Fog Computing;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Fog Computing is a type of distributed computing that reduces computation on the cloud by creating a new layer between the Internet of Things (IoTs) devices and the cloud. This helps to deliver the services more efficiently and effectively. The security concerns in fog computing are inherited from the cloud itself as the fog computing is derived from cloud computing. So, a major security concern in fog computing is during sharing of data, as illegitimate users could get access while the data is being shared. Attribute Based Encryption (ABE) method is proved to be beneficial for securing the data, but ABE method alone is not sufficient as there are various security concerns such as forward issue and backward issue. Various methods have been proposed by researchers to solve the problem, one such efficient solution is re-encryption. In this paper we propose a scheme that uses Ciphertext-policy Attribute based Encryption along with re-encryption for providing access control in fog and cloud communication. The analysis of the proposed scheme reveals better security and performance. We have also implemented the proposed scheme to show its effectiveness.
引用
收藏
页码:307 / 312
页数:6
相关论文
共 15 条
[1]   An Attribute-Based Encryption Scheme to Secure Fog Communications [J].
Alrawais, Arwa ;
Alhothaily, Abdulrahman ;
Hu, Chunqiang ;
Xing, Xiaoshuang ;
Cheng, Xiuzhen .
IEEE ACCESS, 2017, 5 :9131-9138
[2]   Fog Computing for the Internet of Things: Security and Privacy Issues [J].
Alrawais, Arwa ;
Alhothaily, Abdulrahman ;
Hu, Chunqiang ;
Cheng, Xiuzhen .
IEEE INTERNET COMPUTING, 2017, 21 (02) :34-42
[3]  
[Anonymous], 2008, P INT C PRACT THEOR
[4]  
[Anonymous], 1984, LNCS
[5]  
[Anonymous], 2012, P 8 INT ICST C SEC P
[6]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[7]  
Boldyreva A, 2008, CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P417
[8]  
Bonomi F., 2012, P MCCWORKSHOP MOB CL, P13, DOI 10.1145/2342509.2342513
[9]  
Goyal V., 2006, P 2006 INT C PRIVACY, P1
[10]   Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems [J].
Hur, Junbeom ;
Noh, Dong Kun .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2011, 22 (07) :1214-1221