A revocable and outsourced multi-authority attribute-based encryption scheme in fog computing

被引:50
作者
Tu, Shanshan [1 ]
Waqas, Muhammad [1 ,2 ]
Huang, Fengming [1 ]
Abbas, Ghulam [2 ]
Abbas, Ziaul Haq [3 ]
机构
[1] Beijing Univ Technol, Fac Informat Technol, Engn Res Ctr Intelligent Percept & Autonomous Con, Beijing 100124, Peoples R China
[2] Ghulam Ishaq Khan Inst Engn Sci & Technol, Fac Comp Sci & Engn, Topi 23460, Pakistan
[3] Ghulam Ishaq Khan Inst Engn Sci & Technol, Fac Elect Engn, Topi 23460, Pakistan
基金
中国博士后科学基金; 北京市自然科学基金;
关键词
Mobile fog computing; Multi-authority attribute-based encryption; Attribute revocation; SECURITY; COMMUNICATION; REVOCATION; USER;
D O I
10.1016/j.comnet.2021.108196
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Fog computing is a revolutionary technology for the next generation to bridge the gap between cloud data centers and end-users. Fog computing is not a counterfeit for cloud computing but a persuasive counterpart. It also accredits by utilizing the network edge while still rendering the possibility to interact with the cloud. Nevertheless, the features of fog computing are encountering several security challenges. The security of end-users and/or fog servers brings a significant dilemma in implementing fog computing. Moreover, in conventional cloud computing, the attribute-based encryption (ABE) technology is not appropriate for end users due to restricted computing resources, i.e., limited resources, high end-to-end delay, and transmission capability. Hence, the revocation and outsourcing mechanisms become inappropriate between end-users and cloud servers. In this regard, this paper recommends a multi-authority attribute-based encryption (MA-ABE) technique to support revocation and outsource the attributes to fog computation. We present an attribute revocation scheme based on cipher-text attribute-based encryption by introducing the attribute group keys. In this process, the secret keys are dynamically altered and realized the requirement of immediate attribute revocations. Hence, we provide the complete encryption and decryption process for end-users and fog servers based on multi-authority, attribute revocation, and outsourcing computation, while most of the existing scheme lack to incorporate all these parameters. Our scheme also outsources the complicated encryption and decryption tasks to the fog server that significantly improves the overall computation efficiency compared to the state-of-the-art work.
引用
收藏
页数:8
相关论文
共 41 条
[1]   A fully distributed hierarchical attribute-based encryption scheme [J].
Ali, Mohammad ;
Mohajeri, Javad ;
Sadeghi, Mohammad-Reza ;
Liu, Ximeng .
THEORETICAL COMPUTER SCIENCE, 2020, 815 :25-46
[2]   An Attribute-Based Encryption Scheme to Secure Fog Communications [J].
Alrawais, Arwa ;
Alhothaily, Abdulrahman ;
Hu, Chunqiang ;
Xing, Xiaoshuang ;
Cheng, Xiuzhen .
IEEE ACCESS, 2017, 5 :9131-9138
[3]  
Bag A, IEEE T COMPUT
[4]   Private blockchain-envisioned multi-authority CP-ABE-based user access control scheme in IIoT [J].
Banerjee, Soumya ;
Bera, Basudeb ;
Das, Ashok Kumar ;
Chattopadhyay, Samiran ;
Khan, Muhammad Khurram ;
Rodrigues, Joel J. P. C. .
COMPUTER COMMUNICATIONS, 2021, 169 :99-113
[5]  
Green M., 2011, 20 USENIX SECURITY S
[6]  
Guo R, 2021, IEEE INTERNET THINGS
[7]   Security and Privacy in Device-to-Device (D2D) Communication: A Review [J].
Haus, Michael ;
Waqas, Muhammad ;
Ding, Aaron Yi ;
Li, Yong ;
Tarkoma, Sasu ;
Ott, Jorg .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2017, 19 (02) :1054-1079
[8]  
Hei Y, COMPUT NETW, V191
[9]   Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems [J].
Hur, Junbeom ;
Noh, Dong Kun .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2011, 22 (07) :1214-1221
[10]   On Several Verifiable Random Functions and the q-decisional Bilinear Diffie-Hellman Inversion Assumption [J].
Lauer, Sebastian .
APKC'18: PROCEEDINGS OF THE 5TH ACM ASIA PUBLIC-KEY CRYPTOGRAPHY WORKSHOP, 2018, :45-51