Efficient and privacy preserving access control scheme for fog-enabled IoT

被引:65
作者
Fan, Kai [1 ]
Xu, Huiyue [1 ]
Gao, Longxiang [2 ]
Li, Hui [1 ]
Yang, Yintang [3 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks, Xian, Shaanxi, Peoples R China
[2] Deakin Univ, Sch Informat Technol, Geelong, Vic, Australia
[3] Xidian Univ, Key Lab Minist Educ Wide Band Gap Semicon Mat & D, Xian, Shaanxi, Peoples R China
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2019年 / 99卷
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
Cloud computing; Fog computing; Access control; Attribute-based encryption; Privacy preserving; Decryption outsourcing; ATTRIBUTE-BASED-ENCRYPTION;
D O I
10.1016/j.future.2019.04.003
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The fog-to-things paradigm is introduced to mitigate the heavy burden on the edge of cloud-based network due to the centralized processing and storing of the massive volume of IoT data. Fog-enabled IoT architectures ensure small latency and enough computing resource that enables real time devices and applications. However, there still exist security and privacy challenges on data access control for fog-enabled IoT. Ciphertext-policy attribute-based encryption (CP-ABE) can be adopted to realize data access control in cloud-fog computing systems. In this paper, we propose an efficient and privacy preserving outsourced multi-authority access control scheme, named PPO-MACS. All attributes of users are transformed to be anonymous and authenticable to realize privacy preserving. And the verifiable outsourced decryption is introduced to reduce computation overheads on the end user side. Meanwhile, an efficient user revocation method is proposed. Security and performance analysis show that our scheme is secure and highly efficient. (C) 2019 Elsevier B.V. All rights reserved.
引用
收藏
页码:134 / 142
页数:9
相关论文
共 37 条
[1]   Charm: a framework for rapidly prototyping cryptosystems [J].
Akinyele, Joseph A. ;
Garman, Christina ;
Miers, Ian ;
Pagano, Matthew W. ;
Rushanan, Michael ;
Green, Matthew ;
Rubin, Aviel D. .
JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2013, 3 (02) :111-128
[2]   Access Control Models for Virtual Object Communication in Cloud-Enabled IoT [J].
Alshehri, Asma ;
Sandhu, Ravi .
2017 IEEE 18TH INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IEEE IRI 2017), 2017, :16-25
[3]  
[Anonymous], 2019, IEEE Access
[4]  
[Anonymous], 2018, FUTURE GENER COMP SY, DOI DOI 10.1016/j.future.2016.10.028
[5]  
[Anonymous], CRIT STUD ASIA PAC S
[6]  
[Anonymous], 1996, SECURE SCHEMES SECRE
[7]  
[Anonymous], ACCESS CONTROL MODEL
[8]  
[Anonymous], 2017, 2017 IEEE INT C SMAR
[9]  
[Anonymous], IEEE COMMUN SURV TUT
[10]  
[Anonymous], INTERNET THINGS EXTE