A fine-grained and lightweight data access control scheme for WSN-integrated cloud computing

被引:15
作者
He, Heng [1 ,2 ]
Zhang, Ji [1 ,2 ]
Gu, Jinguang [1 ,2 ]
Hu, Yan [1 ,2 ]
Xu, Fangfang [1 ,2 ]
机构
[1] Wuhan Univ Sci & Technol, Coll Comp Sci & Technol, Wuhan, Peoples R China
[2] Hubei Prov Key Lab Intelligent Informat Proc & Re, Wuhan, Peoples R China
来源
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS | 2017年 / 20卷 / 02期
基金
中国国家自然科学基金;
关键词
Access control; WSN-integrated cloud computing; Attribute-based encryption; Attribute-based signature; ATTRIBUTE-BASED SIGNATURES;
D O I
10.1007/s10586-017-0863-y
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
WSN-integrated cloud computing (WCC) has become a promising cloud service architecture, in which sensors and mobile devices are utilized as the data collecting and processing nodes for the cloud service model, while cloud servers can provide computing services and storage services with high performance and reliability. However, since cloud servers are not fully trusted, and sensors and mobile devices have very limited computing capability and storage capacity, WCC brings forth new challenges for data confidentiality, data integrity and access control when sensors store important data for sharing in the WCC environment. Moreover, there are still no proper solutions for fine-grained, efficient and secure data access control in WCC. To solve this issue, we propose a fine-grained and lightweight data access control scheme for WCC, namely FLAC, which includes a ciphertext-policy attribute-based encryption algorithm for data confidentiality and fine-grained data access control, and an attribute-based signature algorithm for data integrity and the many-read-many-write case of data access. By delegating most computation intensive tasks to cloud services, FLAC enables resource constrained sensors and mobile devices to perform security operations rapidly. The security assessment and performance evaluation demonstrate that FLAC is secure, highly efficient and well suited for WSN applications.
引用
收藏
页码:1457 / 1472
页数:16
相关论文
共 44 条
  • [1] [Anonymous], IACR CRYPTOL
  • [2] [Anonymous], 2009, INT J VOMMUNICATION
  • [3] [Anonymous], J U ELECT SCI TECHNO
  • [4] Ateniese G., 2006, ACM Transactions on Information and Systems Security, V9, P1, DOI 10.1145/1127345.1127346
  • [5] Ciphertext-policy attribute-based encryption
    Bethencourt, John
    Sahai, Amit
    Waters, Brent
    [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +
  • [6] Boneh D, 2005, LECT NOTES COMPUT SC, V3621, P258
  • [7] Boneh D., 2001, Advances in Cryptology - CRTPTO 2001. 21st Annual International Cryptology Conference, Proceedings (Lecture Notes in Computer Science Vol.2139), P213
  • [8] Butun I., 2011, 2011 IEEE Consumer Communications and Networking Conference (CCNC 2011), P1118, DOI 10.1109/CCNC.2011.5766345
  • [9] Chase M, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P121
  • [10] Chatterjee S, 2014, 2014 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), P2074, DOI 10.1109/ICACCI.2014.6968242